MERAL Myanmar Education Research and Learning Portal
Item
{"_buckets": {"deposit": "5b3ac480-efae-47d8-a3c7-5c285ba87061"}, "_deposit": {"id": "3975", "owners": [], "pid": {"revision_id": 0, "type": "recid", "value": "3975"}, "status": "published"}, "_oai": {"id": "oai:meral.edu.mm:recid/3975", "sets": ["user-ucsy"]}, "communities": ["ucsy"], "item_1583103067471": {"attribute_name": "Title", "attribute_value_mlt": [{"subitem_1551255647225": "The Security Enhancement for Privacy-Aware Access Control System on Private Cloud (PAAC)", "subitem_1551255648112": "en"}]}, "item_1583103085720": {"attribute_name": "Description", "attribute_value_mlt": [{"interim": "Cloud is a relatively new concept and so it isunsurprising that the information assurance,data protection, network security and privacyconcerns have yet to be fully addressed.Companies such as RedHat, Microsoft, Amazon,Google, and IBM are increasingly funding cloudcomputing infrastructure and research, making itimportant for students to gain the necessaryskills to work with cloud-based resources. Thispaper presents a free, educational private cloudusing an existing infrastructure. However,security is a huge issue for cloud users especiallyaccess control, user profile management andaccessing services offered by the private cloudenvironment. Therefore, this paper proposes aprivate cloud control, privacy and access for thecloud user who are involved in the academicinstitution private cloud system. This systemintends to reduce the risk such as stealing andmisuse of the private personal data. This systemuses Eucalyptus Cloud Infrastructure as atestbed. The main ideas of this system (in term ofsecurity and privacy) are to minimize theconfidential information of cloud users, tomaximize the access control and to specify thedata usage."}]}, "item_1583103108160": {"attribute_name": "Keywords", "attribute_value_mlt": [{"interim": "private cloud"}, {"interim": "privacy"}, {"interim": "eucalyptus"}, {"interim": "role-based access control"}, {"interim": "rule-based access control"}]}, "item_1583103120197": {"attribute_name": "Files", "attribute_type": "file", "attribute_value_mlt": [{"accessrole": "open_access", "date": [{"dateType": "Available", "dateValue": "2019-07-03"}], "displaytype": "preview", "download_preview_message": "", "file_order": 0, "filename": "9047.pdf", "filesize": [{"value": "102 Kb"}], "format": "application/pdf", "future_date_message": "", "is_thumbnail": false, "licensetype": "license_free", "mimetype": "application/pdf", "size": 102000.0, "url": {"url": "https://meral.edu.mm/record/3975/files/9047.pdf"}, "version_id": "4529d723-627d-43b7-8dc8-48cd8b86b49f"}]}, "item_1583103131163": {"attribute_name": "Journal articles", "attribute_value_mlt": [{"subitem_issue": "", "subitem_journal_title": "Ninth International Conference On Computer Applications (ICCA 2011)", "subitem_pages": "", "subitem_volume": ""}]}, "item_1583103147082": {"attribute_name": "Conference papers", "attribute_value_mlt": [{"subitem_acronym": "", "subitem_c_date": "", "subitem_conference_title": "", "subitem_part": "", "subitem_place": "", "subitem_session": "", "subitem_website": ""}]}, "item_1583103211336": {"attribute_name": "Books/reports/chapters", "attribute_value_mlt": [{"subitem_book_title": "", "subitem_isbn": "", "subitem_pages": "", "subitem_place": "", "subitem_publisher": ""}]}, "item_1583103233624": {"attribute_name": "Thesis/dissertations", "attribute_value_mlt": [{"subitem_awarding_university": "", "subitem_supervisor(s)": [{"subitem_supervisor": ""}]}]}, "item_1583105942107": {"attribute_name": "Authors", "attribute_value_mlt": [{"subitem_authors": [{"subitem_authors_fullname": "Mon, Ei Ei"}, {"subitem_authors_fullname": "Naing, Thinn Thu"}]}]}, "item_1583108359239": {"attribute_name": "Upload type", "attribute_value_mlt": [{"interim": "Publication"}]}, "item_1583108428133": {"attribute_name": "Publication type", "attribute_value_mlt": [{"interim": "Article"}]}, "item_1583159729339": {"attribute_name": "Publication date", "attribute_value": "2011-05-05"}, "item_1583159847033": {"attribute_name": "Identifier", "attribute_value": "http://onlineresource.ucsy.edu.mm/handle/123456789/169"}, "item_title": "The Security Enhancement for Privacy-Aware Access Control System on Private Cloud (PAAC)", "item_type_id": "21", "owner": "1", "path": ["1597824273898"], "permalink_uri": "http://hdl.handle.net/20.500.12678/0000003975", "pubdate": {"attribute_name": "Deposited date", "attribute_value": "2019-07-03"}, "publish_date": "2019-07-03", "publish_status": "0", "recid": "3975", "relation": {}, "relation_version_is_last": true, "title": ["The Security Enhancement for Privacy-Aware Access Control System on Private Cloud (PAAC)"], "weko_shared_id": -1}
The Security Enhancement for Privacy-Aware Access Control System on Private Cloud (PAAC)
http://hdl.handle.net/20.500.12678/0000003975
http://hdl.handle.net/20.500.12678/00000039751466fb05-ecbf-498c-96b9-79589e509edd
5b3ac480-efae-47d8-a3c7-5c285ba87061
Name / File | License | Actions |
---|---|---|
![]() |
|
Publication type | ||||||
---|---|---|---|---|---|---|
Article | ||||||
Upload type | ||||||
Publication | ||||||
Title | ||||||
Title | The Security Enhancement for Privacy-Aware Access Control System on Private Cloud (PAAC) | |||||
Language | en | |||||
Publication date | 2011-05-05 | |||||
Authors | ||||||
Mon, Ei Ei | ||||||
Naing, Thinn Thu | ||||||
Description | ||||||
Cloud is a relatively new concept and so it isunsurprising that the information assurance,data protection, network security and privacyconcerns have yet to be fully addressed.Companies such as RedHat, Microsoft, Amazon,Google, and IBM are increasingly funding cloudcomputing infrastructure and research, making itimportant for students to gain the necessaryskills to work with cloud-based resources. Thispaper presents a free, educational private cloudusing an existing infrastructure. However,security is a huge issue for cloud users especiallyaccess control, user profile management andaccessing services offered by the private cloudenvironment. Therefore, this paper proposes aprivate cloud control, privacy and access for thecloud user who are involved in the academicinstitution private cloud system. This systemintends to reduce the risk such as stealing andmisuse of the private personal data. This systemuses Eucalyptus Cloud Infrastructure as atestbed. The main ideas of this system (in term ofsecurity and privacy) are to minimize theconfidential information of cloud users, tomaximize the access control and to specify thedata usage. | ||||||
Keywords | ||||||
private cloud, privacy, eucalyptus, role-based access control, rule-based access control | ||||||
Identifier | http://onlineresource.ucsy.edu.mm/handle/123456789/169 | |||||
Journal articles | ||||||
Ninth International Conference On Computer Applications (ICCA 2011) | ||||||
Conference papers | ||||||
Books/reports/chapters | ||||||
Thesis/dissertations |