Entity

Time filter

Source Type


Yu C.,China Institute of Technology | Yang L.,China Institute of Electronic Equipment System Engineering | Liu Y.,China Institute of Technology | Luo X.,China Institute of Technology | Luo X.,China Institute of Electronic Equipment System Engineering
IET Conference Publications | Year: 2014

Data security issue is a key bottleneck restricting the application of cloud computing promoting and applications. In this paper, states of the art of the techniques on cloud computing data security issues, such as data encryption, access control, integrity authentication and other issues is surveyed, on this basis, some important technical issues of the cloud computing data security should concern about and focus on are indicated.


Yang Z.,Institute of Command Automation | Yang Z.,China Institute of Electronic Equipment System Engineering | Yang L.,China Institute of Electronic Equipment System Engineering | Luo X.-Y.,China Institute of Electronic Equipment System Engineering | And 4 more authors.
Journal of Computers (Finland) | Year: 2013

Nowadays the significance of the access control technology in service oriented network is increasingly highlighted. The RBAC access control model has a variety of advantages such as easy management and high efficiency. With the expansion of the network scale, a network must be divided into autonomous multi-domains for convenient management. However, there is still a lack of studies on the domain based RBAC model as the barrier of applying the RBAC to multi-domain environment, and the corresponding supporting implementation technologies for the domain based RBAC are also in weak. In this paper, we proposed a model of domain based RBAC (D-RBAC) to better adapt to the security requirements of the multi-domain environment. We firstly introduced the domain concept and model and then gave a formal description to the proposed D-RBAC model. Secondly, we designed feasible implementation architecture for the D-RBAC model and based on this architecture we proposed two supporting technologies. The fuzzy role mapping method according to user's attributes has strong description abilities for role assignment and the convenience of realization. The dynamic collaboration domain construction framework can greatly improve the efficiency of inter-domain access control. The proposed D-RBAC model and the related supporting technologies can obviously facilitate the application of RBAC in multi-domain environment. © 2013 ACADEMY PUBLISHER.


Luo X.,China Institute of Electronic Equipment System Engineering | Luo X.,China Institute of Technology | Luo X.,Chinese Academy of Sciences | Yang L.,China Institute of Electronic Equipment System Engineering | And 3 more authors.
Journal of Networks | Year: 2014

Data security and virtualization security issues are two key bottlenecks restricting the application of cloud computing promoting and applications, especially for the Cloud-based media computing system. In this paper, states of the art of the techniques on cloud computing data security issues, such as data encryption, access control, integrity authentication and other issues is surveyed, on this basis, the key technical issues of the cloud computing data security should concern about and focus on are indicated, and some corresponding countermeasures and suggestions are presented. For the virtualization security problem introduced by private cloud computing, the security risks induced by virtualization are analyzed and classified, and then based on the divide-conquer idea, for each kind of security risk, some corresponding solutions are presented. © 2014 ACADEMY PUBLISHER.

Discover hidden collaborations