To improve the current security model and efficiency in cloud computing using access control matrix
Cloud computing is the new technique adopted recently by many IT companies and business organizations, with the intention to minimize the cost spent on the data stored. There are many cloud service providers like Amazon, Microsoft, etc. By moving to a cloud servers, a department of maintaining a own...
Saved in:
Published in | 2012 Third International Conference on Computing, Communication and Networking Technologies (ICCCNT'12) pp. 1 - 5 |
---|---|
Main Authors | , , , |
Format | Conference Proceeding |
Language | English |
Published |
IEEE
01.07.2012
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Summary: | Cloud computing is the new technique adopted recently by many IT companies and business organizations, with the intention to minimize the cost spent on the data stored. There are many cloud service providers like Amazon, Microsoft, etc. By moving to a cloud servers, a department of maintaining a own data center can be eliminated and core business can be concentrated more, because the data management will be done by the cloud service providers itself. The data stored in the cloud is private and should be allowed to access only after authorization, so that only legitimate users can access the data. The access control matrix method is used to authorize the users when a request is made toward the data stored in the cloud server. But access control matrix has little flaws, these flaws can be eliminated and few improvements can be made to make the access control matrix method still efficient. |
---|---|
DOI: | 10.1109/ICCCNT.2012.6395994 |