Log in
Language:

MERAL Myanmar Education Research and Learning Portal

  • Top
  • Universities
  • Ranking
To
lat lon distance
To

Field does not validate



Index Link

Index Tree

Please input email address.

WEKO

One fine body…

WEKO

One fine body…

Item

{"_buckets": {"deposit": "a64d06e0-b32b-45d4-9218-5de3f818b486"}, "_deposit": {"id": "4515", "owners": [], "pid": {"revision_id": 0, "type": "recid", "value": "4515"}, "status": "published"}, "_oai": {"id": "oai:meral.edu.mm:recid/4515", "sets": ["user-ucsy"]}, "communities": ["ucsy"], "item_1583103067471": {"attribute_name": "Title", "attribute_value_mlt": [{"subitem_1551255647225": "Privacy Control Model for Academic Information in Private Cloud System", "subitem_1551255648112": "en_US"}]}, "item_1583103085720": {"attribute_name": "Description", "attribute_value_mlt": [{"interim": "Cloud computing is one of today’s most attractivetechnology areas due to its many advantages like Highlyscalable, on-demand, web-accessed IT resources withmajor cost / cash and flexibility. In this paper, the privacypolicies and access control strategies for academic privatecloud system are proposed to reduce the risk such asstealing and misuse of the private personal data, userprofile management and accessing services offered on theprivate cloud environment. This system has beenconfigured with Eucalyptus open source cloudinfrastructure in which the privacy policies and accesscontrol strategies are enhanced. In order to solve thesesecurity problems on the private cloud model, we can takeadvantages of the existing Eucalyptus cloud infrastructureand security in which we can elect to store highly sensitivedata of the university in the private storage cloud and lesssensitive data in public storage of the private cloud. Themain idea of privacy enhancement on a private cloudcomputing model is applying the role-based access controlmodel as well as deploying privacy policies and securityconstraints into the sensitive resources. For securitypurpose, this paper extends the Role Based Access Controlmodel with role relationships and delegation for accessrights."}]}, "item_1583103108160": {"attribute_name": "Keywords", "attribute_value_mlt": [{"interim": "Privacy"}, {"interim": "Eucalyptus"}, {"interim": "Role-based Access Control"}, {"interim": "Private Cloud"}]}, "item_1583103120197": {"attribute_name": "Files", "attribute_type": "file", "attribute_value_mlt": [{"accessrole": "open_access", "date": [{"dateType": "Available", "dateValue": "2019-11-15"}], "displaytype": "preview", "download_preview_message": "", "file_order": 0, "filename": "10096.pdf", "filesize": [{"value": "743 Kb"}], "format": "application/pdf", "future_date_message": "", "is_thumbnail": false, "licensetype": "license_free", "mimetype": "application/pdf", "size": 743000.0, "url": {"url": "https://meral.edu.mm/record/4515/files/10096.pdf"}, "version_id": "46626960-245f-479c-bcc2-d07840cdc9fa"}]}, "item_1583103131163": {"attribute_name": "Journal articles", "attribute_value_mlt": [{"subitem_issue": "", "subitem_journal_title": "Tenth International Conference On Computer Applications (ICCA 2012)", "subitem_pages": "", "subitem_volume": ""}]}, "item_1583103147082": {"attribute_name": "Conference papers", "attribute_value_mlt": [{"subitem_acronym": "", "subitem_c_date": "", "subitem_conference_title": "", "subitem_part": "", "subitem_place": "", "subitem_session": "", "subitem_website": ""}]}, "item_1583103211336": {"attribute_name": "Books/reports/chapters", "attribute_value_mlt": [{"subitem_book_title": "", "subitem_isbn": "", "subitem_pages": "", "subitem_place": "", "subitem_publisher": ""}]}, "item_1583103233624": {"attribute_name": "Thesis/dissertations", "attribute_value_mlt": [{"subitem_awarding_university": "", "subitem_supervisor(s)": [{"subitem_supervisor": ""}]}]}, "item_1583105942107": {"attribute_name": "Authors", "attribute_value_mlt": [{"subitem_authors": [{"subitem_authors_fullname": "Mon, Ei Ei"}, {"subitem_authors_fullname": "Naing, Thinn Thu"}]}]}, "item_1583108359239": {"attribute_name": "Upload type", "attribute_value_mlt": [{"interim": "Publication"}]}, "item_1583108428133": {"attribute_name": "Publication type", "attribute_value_mlt": [{"interim": "Article"}]}, "item_1583159729339": {"attribute_name": "Publication date", "attribute_value": "2012-02-28"}, "item_1583159847033": {"attribute_name": "Identifier", "attribute_value": "http://onlineresource.ucsy.edu.mm/handle/123456789/2440"}, "item_title": "Privacy Control Model for Academic Information in Private Cloud System", "item_type_id": "21", "owner": "1", "path": ["1597824273898"], "permalink_uri": "http://hdl.handle.net/20.500.12678/0000004515", "pubdate": {"attribute_name": "Deposited date", "attribute_value": "2019-11-15"}, "publish_date": "2019-11-15", "publish_status": "0", "recid": "4515", "relation": {}, "relation_version_is_last": true, "title": ["Privacy Control Model for Academic Information in Private Cloud System"], "weko_shared_id": -1}
  1. University of Computer Studies, Yangon
  2. Conferences

Privacy Control Model for Academic Information in Private Cloud System

http://hdl.handle.net/20.500.12678/0000004515
http://hdl.handle.net/20.500.12678/0000004515
405871c3-45f7-46dd-8ba5-a18bd57a8167
a64d06e0-b32b-45d4-9218-5de3f818b486
None
Preview
Name / File License Actions
10096.pdf 10096.pdf (743 Kb)
Publication type
Article
Upload type
Publication
Title
Title Privacy Control Model for Academic Information in Private Cloud System
Language en_US
Publication date 2012-02-28
Authors
Mon, Ei Ei
Naing, Thinn Thu
Description
Cloud computing is one of today’s most attractivetechnology areas due to its many advantages like Highlyscalable, on-demand, web-accessed IT resources withmajor cost / cash and flexibility. In this paper, the privacypolicies and access control strategies for academic privatecloud system are proposed to reduce the risk such asstealing and misuse of the private personal data, userprofile management and accessing services offered on theprivate cloud environment. This system has beenconfigured with Eucalyptus open source cloudinfrastructure in which the privacy policies and accesscontrol strategies are enhanced. In order to solve thesesecurity problems on the private cloud model, we can takeadvantages of the existing Eucalyptus cloud infrastructureand security in which we can elect to store highly sensitivedata of the university in the private storage cloud and lesssensitive data in public storage of the private cloud. Themain idea of privacy enhancement on a private cloudcomputing model is applying the role-based access controlmodel as well as deploying privacy policies and securityconstraints into the sensitive resources. For securitypurpose, this paper extends the Role Based Access Controlmodel with role relationships and delegation for accessrights.
Keywords
Privacy, Eucalyptus, Role-based Access Control, Private Cloud
Identifier http://onlineresource.ucsy.edu.mm/handle/123456789/2440
Journal articles
Tenth International Conference On Computer Applications (ICCA 2012)
Conference papers
Books/reports/chapters
Thesis/dissertations
Back
0
0
views
downloads
See details
Views Downloads

Versions

Ver.1 2020-09-01 15:00:07.124803
Show All versions

Share

Mendeley Twitter Facebook Print Addthis

Export

OAI-PMH
  • OAI-PMH DublinCore
Other Formats
  • JSON

Confirm


Back to MERAL


Back to MERAL