Log in
Language:

MERAL Myanmar Education Research and Learning Portal

  • Top
  • Universities
  • Ranking


Index Link

Index Tree

  • RootNode
    • Co-operative College, Mandalay
    • Cooperative College, Phaunggyi
    • Co-operative University, Sagaing
    • Co-operative University, Thanlyin
    • Dagon University
    • Kyaukse University
    • Laquarware Technological college
    • Mandalay Technological University
    • Mandalay University of Distance Education
    • Mandalay University of Foreign Languages
    • Maubin University
    • Mawlamyine University
    • Meiktila University
    • Mohnyin University
    • Myanmar Institute of Information Technology
    • Myanmar Maritime University
    • National Management Degree College
    • Naypyitaw State Academy
    • Pathein University
    • Sagaing University
    • Sagaing University of Education
    • Taunggyi University
    • Technological University, Hmawbi
    • Technological University (Kyaukse)
    • Technological University Mandalay
    • University of Computer Studies, Mandalay
    • University of Computer Studies Maubin
    • University of Computer Studies, Meikhtila
    • University of Computer Studies Pathein
    • University of Computer Studies, Taungoo
    • University of Computer Studies, Yangon
    • University of Dental Medicine Mandalay
    • University of Dental Medicine, Yangon
    • University of Information Technology
    • University of Mandalay
    • University of Medicine 1
    • University of Medicine 2
    • University of Medicine Mandalay
    • University of Myitkyina
    • University of Public Health, Yangon
    • University of Veterinary Science
    • University of Yangon
    • West Yangon University
    • Yadanabon University
    • Yangon Technological University
    • Yangon University of Distance Education
    • Yangon University of Economics
    • Yangon University of Education
    • Yangon University of Foreign Languages
    • Yezin Agricultural University
    • New Index

Please input email address.

WEKO

One fine body…

WEKO

One fine body…

Item

{"_buckets": {"deposit": "5b3ac480-efae-47d8-a3c7-5c285ba87061"}, "_deposit": {"id": "3975", "owners": [], "pid": {"revision_id": 0, "type": "recid", "value": "3975"}, "status": "published"}, "_oai": {"id": "oai:meral.edu.mm:recid/3975", "sets": ["user-ucsy"]}, "communities": ["ucsy"], "item_1583103067471": {"attribute_name": "Title", "attribute_value_mlt": [{"subitem_1551255647225": "The Security Enhancement for Privacy-Aware Access Control System on Private Cloud (PAAC)", "subitem_1551255648112": "en"}]}, "item_1583103085720": {"attribute_name": "Description", "attribute_value_mlt": [{"interim": "Cloud is a relatively new concept and so it isunsurprising that the information assurance,data protection, network security and privacyconcerns have yet to be fully addressed.Companies such as RedHat, Microsoft, Amazon,Google, and IBM are increasingly funding cloudcomputing infrastructure and research, making itimportant for students to gain the necessaryskills to work with cloud-based resources. Thispaper presents a free, educational private cloudusing an existing infrastructure. However,security is a huge issue for cloud users especiallyaccess control, user profile management andaccessing services offered by the private cloudenvironment. Therefore, this paper proposes aprivate cloud control, privacy and access for thecloud user who are involved in the academicinstitution private cloud system. This systemintends to reduce the risk such as stealing andmisuse of the private personal data. This systemuses Eucalyptus Cloud Infrastructure as atestbed. The main ideas of this system (in term ofsecurity and privacy) are to minimize theconfidential information of cloud users, tomaximize the access control and to specify thedata usage."}]}, "item_1583103108160": {"attribute_name": "Keywords", "attribute_value_mlt": [{"interim": "private cloud"}, {"interim": "privacy"}, {"interim": "eucalyptus"}, {"interim": "role-based access control"}, {"interim": "rule-based access control"}]}, "item_1583103120197": {"attribute_name": "Files", "attribute_type": "file", "attribute_value_mlt": [{"accessrole": "open_access", "date": [{"dateType": "Available", "dateValue": "2019-07-03"}], "displaytype": "preview", "download_preview_message": "", "file_order": 0, "filename": "9047.pdf", "filesize": [{"value": "102 Kb"}], "format": "application/pdf", "future_date_message": "", "is_thumbnail": false, "licensetype": "license_free", "mimetype": "application/pdf", "size": 102000.0, "url": {"url": "https://meral.edu.mm/record/3975/files/9047.pdf"}, "version_id": "4529d723-627d-43b7-8dc8-48cd8b86b49f"}]}, "item_1583103131163": {"attribute_name": "Journal articles", "attribute_value_mlt": [{"subitem_issue": "", "subitem_journal_title": "Ninth International Conference On Computer Applications (ICCA 2011)", "subitem_pages": "", "subitem_volume": ""}]}, "item_1583103147082": {"attribute_name": "Conference papers", "attribute_value_mlt": [{"subitem_acronym": "", "subitem_c_date": "", "subitem_conference_title": "", "subitem_part": "", "subitem_place": "", "subitem_session": "", "subitem_website": ""}]}, "item_1583103211336": {"attribute_name": "Books/reports/chapters", "attribute_value_mlt": [{"subitem_book_title": "", "subitem_isbn": "", "subitem_pages": "", "subitem_place": "", "subitem_publisher": ""}]}, "item_1583103233624": {"attribute_name": "Thesis/dissertations", "attribute_value_mlt": [{"subitem_awarding_university": "", "subitem_supervisor(s)": [{"subitem_supervisor": ""}]}]}, "item_1583105942107": {"attribute_name": "Authors", "attribute_value_mlt": [{"subitem_authors": [{"subitem_authors_fullname": "Mon, Ei Ei"}, {"subitem_authors_fullname": "Naing, Thinn Thu"}]}]}, "item_1583108359239": {"attribute_name": "Upload type", "attribute_value_mlt": [{"interim": "Publication"}]}, "item_1583108428133": {"attribute_name": "Publication type", "attribute_value_mlt": [{"interim": "Article"}]}, "item_1583159729339": {"attribute_name": "Publication date", "attribute_value": "2011-05-05"}, "item_1583159847033": {"attribute_name": "Identifier", "attribute_value": "http://onlineresource.ucsy.edu.mm/handle/123456789/169"}, "item_title": "The Security Enhancement for Privacy-Aware Access Control System on Private Cloud (PAAC)", "item_type_id": "21", "owner": "1", "path": ["1597824273898"], "permalink_uri": "http://hdl.handle.net/20.500.12678/0000003975", "pubdate": {"attribute_name": "Deposited date", "attribute_value": "2019-07-03"}, "publish_date": "2019-07-03", "publish_status": "0", "recid": "3975", "relation": {}, "relation_version_is_last": true, "title": ["The Security Enhancement for Privacy-Aware Access Control System on Private Cloud (PAAC)"], "weko_shared_id": -1}
  1. University of Computer Studies, Yangon
  2. Conferences

The Security Enhancement for Privacy-Aware Access Control System on Private Cloud (PAAC)

http://hdl.handle.net/20.500.12678/0000003975
http://hdl.handle.net/20.500.12678/0000003975
1466fb05-ecbf-498c-96b9-79589e509edd
5b3ac480-efae-47d8-a3c7-5c285ba87061
None
Preview
Name / File License Actions
9047.pdf 9047.pdf (102 Kb)
Publication type
Article
Upload type
Publication
Title
Title The Security Enhancement for Privacy-Aware Access Control System on Private Cloud (PAAC)
Language en
Publication date 2011-05-05
Authors
Mon, Ei Ei
Naing, Thinn Thu
Description
Cloud is a relatively new concept and so it isunsurprising that the information assurance,data protection, network security and privacyconcerns have yet to be fully addressed.Companies such as RedHat, Microsoft, Amazon,Google, and IBM are increasingly funding cloudcomputing infrastructure and research, making itimportant for students to gain the necessaryskills to work with cloud-based resources. Thispaper presents a free, educational private cloudusing an existing infrastructure. However,security is a huge issue for cloud users especiallyaccess control, user profile management andaccessing services offered by the private cloudenvironment. Therefore, this paper proposes aprivate cloud control, privacy and access for thecloud user who are involved in the academicinstitution private cloud system. This systemintends to reduce the risk such as stealing andmisuse of the private personal data. This systemuses Eucalyptus Cloud Infrastructure as atestbed. The main ideas of this system (in term ofsecurity and privacy) are to minimize theconfidential information of cloud users, tomaximize the access control and to specify thedata usage.
Keywords
private cloud, privacy, eucalyptus, role-based access control, rule-based access control
Identifier http://onlineresource.ucsy.edu.mm/handle/123456789/169
Journal articles
Ninth International Conference On Computer Applications (ICCA 2011)
Conference papers
Books/reports/chapters
Thesis/dissertations
Back
0
0
views
downloads
See details
Views Downloads

Versions

Ver.1 2020-09-01 13:49:47.698226
Show All versions

Share

Mendeley Twitter Facebook Print Addthis

Export

OAI-PMH
  • OAI-PMH DublinCore
Other Formats
  • JSON

Confirm


Back to MERAL


Back to MERAL