An approach and its implementation for cloud computing security

Yun Bai, Khaled M. Khan, Chunsheng Yang

    Research output: Chapter in Book / Conference PaperConference Paperpeer-review

    Abstract

    ![CDATA[With the increasing popularity of the datacenter provided by Cloud computing, the datacenter security is becoming an important issue. Also there are other issues to be concerned about such as its speed and standard, but data security is the biggest one. When an organization uses a remote datacenter provided by Cloud, it needs to maintain the confidentiality of the outsourced data and ensure only authorized user or client is allowed to access its data resource. In this paper, we investigate the security issue related to datacenter of cloud computing and propose a security approach for it. We use a formal logical method to specify the data and employ intelligent agents to enforce appropriate security rules on it. We outline the authentication mechanism and present a detailed authorization or access control approach. The implementation of the proposed approach will be discussed and investigated. The authentication and the authorization mechanisms work together to prevent any unauthorized attempt to data stored in the datacenter.]]
    Original languageEnglish
    Title of host publicationProceedings of the 2014 International Conference on Security and Management (SAM'14), Las Vegas, USA, 21-24 July 2014
    PublisherCSREA Press
    Pages365-370
    Number of pages6
    ISBN (Print)1601322631
    Publication statusPublished - 2014
    EventInternational Conference on Security and Management -
    Duration: 21 Jul 2014 → …

    Conference

    ConferenceInternational Conference on Security and Management
    Period21/07/14 → …

    Keywords

    • computer networks
    • security measures
    • knowledge representation
    • access control
    • cloud computing

    Fingerprint

    Dive into the research topics of 'An approach and its implementation for cloud computing security'. Together they form a unique fingerprint.

    Cite this