Log in
Language:

MERAL Myanmar Education Research and Learning Portal

  • Top
  • Universities
  • Ranking
To
lat lon distance
To

Field does not validate



Index Link

Index Tree

Please input email address.

WEKO

One fine body…

WEKO

One fine body…

Item

{"_buckets": {"deposit": "4aa64bb2-c83d-4b17-b890-072d7b2e1378"}, "_deposit": {"id": "4321", "owners": [], "pid": {"revision_id": 0, "type": "recid", "value": "4321"}, "status": "published"}, "_oai": {"id": "oai:meral.edu.mm:recid/4321", "sets": ["user-ucsy"]}, "communities": ["ucsy"], "item_1583103067471": {"attribute_name": "Title", "attribute_value_mlt": [{"subitem_1551255647225": "A Framework for Secure Cloud Based Computing in Higher Educational Institution", "subitem_1551255648112": "en"}]}, "item_1583103085720": {"attribute_name": "Description", "attribute_value_mlt": [{"interim": "The students are becoming more technologyoriented and the classroom teaching is changing,therefore it’s changing to enhance. Because of itsvast advantages, one of the latest technologies ofstudents’ learning currently for education is cloudcomputing. By sharing IT services in the cloud,educational institution can offer the essential tools tostudents, teachers, faculty, and staff to help themsucceed. However, there is several securitychallenges associated with cloud environment thatinhibit the proper adoption of this technology. Mostlyorganization wants a framework to keep their datamore secure over cloud. This paper focuses on theattacks and risks of cloud computing on theeducation system and how can provide the qualityeducation by solving the security challenges of thistechnology. It presents proposed framework to avoidsecurity risks efficiently when adopting cloudcomputing in institutions of higher educationalservices. The proposed system identifies security andprivacy challenges, highlights cloud-specific attacksand threats and clearly illustrates how to mitigatethese attacks and threats."}]}, "item_1583103108160": {"attribute_name": "Keywords", "attribute_value_mlt": [{"interim": "Cloud Computing"}, {"interim": "Risks"}, {"interim": "Security"}, {"interim": "Threats"}, {"interim": "Attacks"}, {"interim": "Higher Educational Institution"}]}, "item_1583103120197": {"attribute_name": "Files", "attribute_type": "file", "attribute_value_mlt": [{"accessrole": "open_access", "date": [{"dateType": "Available", "dateValue": "2019-07-03"}], "displaytype": "preview", "download_preview_message": "", "file_order": 0, "filename": "19-27.pdf", "filesize": [{"value": "284 Kb"}], "format": "application/pdf", "future_date_message": "", "is_thumbnail": false, "licensetype": "license_free", "mimetype": "application/pdf", "size": 284000.0, "url": {"url": "https://meral.edu.mm/record/4321/files/19-27.pdf"}, "version_id": "585e29ef-e8e4-4b20-b43b-e674afa688f4"}]}, "item_1583103131163": {"attribute_name": "Journal articles", "attribute_value_mlt": [{"subitem_issue": "", "subitem_journal_title": "Sixteenth International Conferences on Computer Applications(ICCA 2018)", "subitem_pages": "", "subitem_volume": ""}]}, "item_1583103147082": {"attribute_name": "Conference papers", "attribute_value_mlt": [{"subitem_acronym": "", "subitem_c_date": "", "subitem_conference_title": "", "subitem_part": "", "subitem_place": "", "subitem_session": "", "subitem_website": ""}]}, "item_1583103211336": {"attribute_name": "Books/reports/chapters", "attribute_value_mlt": [{"subitem_book_title": "", "subitem_isbn": "", "subitem_pages": "", "subitem_place": "", "subitem_publisher": ""}]}, "item_1583103233624": {"attribute_name": "Thesis/dissertations", "attribute_value_mlt": [{"subitem_awarding_university": "", "subitem_supervisor(s)": [{"subitem_supervisor": ""}]}]}, "item_1583105942107": {"attribute_name": "Authors", "attribute_value_mlt": [{"subitem_authors": [{"subitem_authors_fullname": "San, Moe Moe"}, {"subitem_authors_fullname": "Win, Khin May"}]}]}, "item_1583108359239": {"attribute_name": "Upload type", "attribute_value_mlt": [{"interim": "Publication"}]}, "item_1583108428133": {"attribute_name": "Publication type", "attribute_value_mlt": [{"interim": "Article"}]}, "item_1583159729339": {"attribute_name": "Publication date", "attribute_value": "2018-02-22"}, "item_1583159847033": {"attribute_name": "Identifier", "attribute_value": "http://onlineresource.ucsy.edu.mm/handle/123456789/226"}, "item_title": "A Framework for Secure Cloud Based Computing in Higher Educational Institution", "item_type_id": "21", "owner": "1", "path": ["1597824273898"], "permalink_uri": "http://hdl.handle.net/20.500.12678/0000004321", "pubdate": {"attribute_name": "Deposited date", "attribute_value": "2019-07-03"}, "publish_date": "2019-07-03", "publish_status": "0", "recid": "4321", "relation": {}, "relation_version_is_last": true, "title": ["A Framework for Secure Cloud Based Computing in Higher Educational Institution"], "weko_shared_id": -1}
  1. University of Computer Studies, Yangon
  2. Conferences

A Framework for Secure Cloud Based Computing in Higher Educational Institution

http://hdl.handle.net/20.500.12678/0000004321
http://hdl.handle.net/20.500.12678/0000004321
8cf1e001-43ab-4162-9eae-d9d3220e99ec
4aa64bb2-c83d-4b17-b890-072d7b2e1378
None
Preview
Name / File License Actions
19-27.pdf 19-27.pdf (284 Kb)
Publication type
Article
Upload type
Publication
Title
Title A Framework for Secure Cloud Based Computing in Higher Educational Institution
Language en
Publication date 2018-02-22
Authors
San, Moe Moe
Win, Khin May
Description
The students are becoming more technologyoriented and the classroom teaching is changing,therefore it’s changing to enhance. Because of itsvast advantages, one of the latest technologies ofstudents’ learning currently for education is cloudcomputing. By sharing IT services in the cloud,educational institution can offer the essential tools tostudents, teachers, faculty, and staff to help themsucceed. However, there is several securitychallenges associated with cloud environment thatinhibit the proper adoption of this technology. Mostlyorganization wants a framework to keep their datamore secure over cloud. This paper focuses on theattacks and risks of cloud computing on theeducation system and how can provide the qualityeducation by solving the security challenges of thistechnology. It presents proposed framework to avoidsecurity risks efficiently when adopting cloudcomputing in institutions of higher educationalservices. The proposed system identifies security andprivacy challenges, highlights cloud-specific attacksand threats and clearly illustrates how to mitigatethese attacks and threats.
Keywords
Cloud Computing, Risks, Security, Threats, Attacks, Higher Educational Institution
Identifier http://onlineresource.ucsy.edu.mm/handle/123456789/226
Journal articles
Sixteenth International Conferences on Computer Applications(ICCA 2018)
Conference papers
Books/reports/chapters
Thesis/dissertations
Back
0
0
views
downloads
See details
Views Downloads

Versions

Ver.1 2020-09-01 14:30:26.331611
Show All versions

Share

Mendeley Twitter Facebook Print Addthis

Export

OAI-PMH
  • OAI-PMH DublinCore
Other Formats
  • JSON

Confirm


Back to MERAL


Back to MERAL