TITLE

The Framework of Information Resource View in Cloud Computing Environment

AUTHOR(S)
Yong Ai; Chengyu Tan; Hongbin Dong; Sai Liu; Yiwen Liang; Jiaqi Qu; Jinhua Xiong
PUB. DATE
February 2013
SOURCE
Journal of Convergence Information Technology;Feb2013, Vol. 8 Issue 3, p1
SOURCE TYPE
Academic Journal
DOC. TYPE
Article
ABSTRACT
In Internet environment, the information resource could be modified, divided and integrated while transmitting. This would result in that origins of different sections within an information resource are different. Users cannot trace the path of propagation of the information resource, so they are unable to compute its reliability. Besides, the DAC (Discretionary Access Control) model is generally adopted in information system. In these systems, user can create a duplication of the confidential document. Then, he/she can authorize others to access the duplication. Consequently, the security attributes of information resource may be modified, which may lead to inadvertently disclosure. The concept of "Information Resource View" is proposed to resolve these problems mentioned above which uses "File View" as reference. Cloud computing has been a new commercial application in recent years. It is the typical information system in Internet environment. This paper discusses the technologies and services in cloud computing. Then, considering the characteristics in cloud computing platform, this paper discusses the hierarchy of cloud computing service. Finally, this paper proposes a multi-layers mapping mechanism of information resource view in cloud computing environment. This mechanism could improve the feasibility and security in cloud computing environment.
ACCESSION #
100142159

 

Related Articles

  • Development of Multimedia Application for Smartphones. Mohamed, M. A.; Abdel-Fatah, A. I.; El-Den, Bassant M. // International Journal of Computer Applications;Jun2014, Vol. 95, p4 

    Information security and verify the user's identity has become one of the biggest concerns of institutions and individuals; this interest emerged many types of authentication. Security field uses three different ways; in the oldest documentation of these methods depending on the specific...

  • Businesses bound by their legacy IT could find salvation in the cloud. Walton, Alisdair // Computer Weekly;6/17/2014, p13 

    The article presents an excerpt of an article available online by Allsdair Walton concerning upgrading of information technology (IT) infrastructure by companies that postponed IT investments after the economic downturn of 2008 and the use of cloud computing as a method of upgrading IT.

  • DOES EXTINCTION BECKON FOR THE IN-HOUSE DATACENTRE? Venkatraman, Archana // Computer Weekly;7/8/2014, p16 

    The article examines information technology management in Great Britain. The advantages and disadvantages of companies creating their own in-house data libraries and information storage and retrieval systems versus contracting our such systems or creating a cloud computing based information...

  • Privilege Management System in Cloud Computing using OAuth. Jeong-Kyung Moon; Hwang-Rae Kim; Jin-Mook Kim // International Journal of Security & Its Applications;2014, Vol. 8 Issue 3, p221 

    OAuth protocol has been developed of fast and easy-to-use proxy authentication structure over a surge in user demand for mobile cloud. However, OAuth involves some security and privacy problems. So, we propose ADAMS for user user authentication system mobile environments that can support user...

  • Towards Smart Card Based Mutual Authentication Schemes in Cloud Computing. Haoxing Li; Fenghua Li; Chenggen Song; Yalong Yan // KSII Transactions on Internet & Information Systems;Jul2015, Vol. 9 Issue 7, p2719 

    In the cloud environment, users pay more attentions to their data security since all of them are stored in the cloud server. Researchers have proposedmany mutual authentication schemes for the access control of the cloud server by using the smart card to protect the sensitive data. However, few...

  • On Retaining Data Control to the Client in Infrastructure Clouds. Descher, Marco; Masser, Philip; Feilhauer, Thomas; Huemer, David; Tjoa, A. Min // Journal of Information System Security;2009, Vol. 5 Issue 4, p27 

    Cloud computing allows delivering information technology power on demand. Be it either the hosting of a certain web application or the outsourcing of an entire server or data center by means of virtualization. Applying these techniques however goes along with handing over the ultimate control of...

  • Historical Interpretations of the IS Discipline: An Introduction to the Special Issue. Hirschheim, Rudy; Saunders, Carol; Straub, Detmar // Journal of the Association for Information Systems;Apr2012, Vol. 13 Issue 4, p1 

    An introduction to the special issue of the Historical Interpretations of the Information Systems (IS) discipline is presented.

  • IT Struggling With File Management. McCafferty, Dennis // CIO Insight;1/30/2014, p1 

    The article reveals that information technology (IT) departments are having a difficult time staying abreast of the latest in file management, according to a 2014 survey by cloud service provider Hightail. Highlights of the survey include the continued expansion of mobile devices and cloud-based...

  • ABAC and RBAC: Scalable, Flexible, and Auditable Access Management. Coyne, Ed; Weil, Timothy R. // IT Professional;May/Jun2013, Vol. 15 Issue 3, p14 

    Is it possible to obtain the flexibility and advantages of attribute-based access control while maintaining role-based access control's advantages for analysis and risk control?

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics