A Security Architecture Research Based on Roles
Security has always been the top issue against the cloud computing, scientific security architecture is the foundation of other security technologies. Comparing existed cloud computing security architectures and traditional security architectures, there are some common ground and new problems. In cl...
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
EDP Sciences
2017-01-01
|
Series: | MATEC Web of Conferences |
Online Access: | https://doi.org/10.1051/matecconf/201710005068 |
_version_ | 1818452383300059136 |
---|---|
author | Tao Linbo Shen Jianjing Liu Bo Zhou Zhenyu |
author_facet | Tao Linbo Shen Jianjing Liu Bo Zhou Zhenyu |
author_sort | Tao Linbo |
collection | DOAJ |
description | Security has always been the top issue against the cloud computing, scientific security architecture is the foundation of other security technologies. Comparing existed cloud computing security architectures and traditional security architectures, there are some common ground and new problems. In cloud computing environment, different users need different security requirements, so if we can assign them reasonable authority, there will be great efficiency improvement for data security and system efficiency. Role is an authority division and management method, it gains very good effect for its classification to user and data operations. Inspired by this, a security cloud computing architecture based on role has been designed, the security of the architecture has been evaluated at last. |
first_indexed | 2024-12-14T21:22:13Z |
format | Article |
id | doaj.art-aac5c36bc9704a3584f1719fe0c9a9a4 |
institution | Directory Open Access Journal |
issn | 2261-236X |
language | English |
last_indexed | 2024-12-14T21:22:13Z |
publishDate | 2017-01-01 |
publisher | EDP Sciences |
record_format | Article |
series | MATEC Web of Conferences |
spelling | doaj.art-aac5c36bc9704a3584f1719fe0c9a9a42022-12-21T22:46:54ZengEDP SciencesMATEC Web of Conferences2261-236X2017-01-011000506810.1051/matecconf/201710005068matecconf_gcmm2017_05068A Security Architecture Research Based on RolesTao Linbo0Shen Jianjing1Liu Bo2Zhou Zhenyu3School of Arts and sciences, Information Engineering UniversitySchool of Arts and sciences, Information Engineering UniversityShenyang NanChang High SchoolSchool of Arts and sciences, Information Engineering UniversitySecurity has always been the top issue against the cloud computing, scientific security architecture is the foundation of other security technologies. Comparing existed cloud computing security architectures and traditional security architectures, there are some common ground and new problems. In cloud computing environment, different users need different security requirements, so if we can assign them reasonable authority, there will be great efficiency improvement for data security and system efficiency. Role is an authority division and management method, it gains very good effect for its classification to user and data operations. Inspired by this, a security cloud computing architecture based on role has been designed, the security of the architecture has been evaluated at last.https://doi.org/10.1051/matecconf/201710005068 |
spellingShingle | Tao Linbo Shen Jianjing Liu Bo Zhou Zhenyu A Security Architecture Research Based on Roles MATEC Web of Conferences |
title | A Security Architecture Research Based on Roles |
title_full | A Security Architecture Research Based on Roles |
title_fullStr | A Security Architecture Research Based on Roles |
title_full_unstemmed | A Security Architecture Research Based on Roles |
title_short | A Security Architecture Research Based on Roles |
title_sort | security architecture research based on roles |
url | https://doi.org/10.1051/matecconf/201710005068 |
work_keys_str_mv | AT taolinbo asecurityarchitectureresearchbasedonroles AT shenjianjing asecurityarchitectureresearchbasedonroles AT liubo asecurityarchitectureresearchbasedonroles AT zhouzhenyu asecurityarchitectureresearchbasedonroles AT taolinbo securityarchitectureresearchbasedonroles AT shenjianjing securityarchitectureresearchbasedonroles AT liubo securityarchitectureresearchbasedonroles AT zhouzhenyu securityarchitectureresearchbasedonroles |