Index Link

  • RootNode
    • Co-operative College, Mandalay
    • Cooperative College, Phaunggyi
    • Co-operative University, Sagaing
    • Co-operative University, Thanlyin
    • Dagon University
    • Kyaukse University
    • Laquarware Technological college
    • Mandalay Technological University
    • Mandalay University of Distance Education
    • Mandalay University of Foreign Languages
    • Maubin University
    • Mawlamyine University
    • Meiktila University
    • Mohnyin University
    • Myanmar Institute of Information Technology
    • Myanmar Maritime University
    • National Management Degree College
    • Naypyitaw State Academy
    • Pathein University
    • Sagaing University
    • Sagaing University of Education
    • Taunggyi University
    • Technological University, Hmawbi
    • Technological University (Kyaukse)
    • Technological University Mandalay
    • University of Computer Studies, Mandalay
    • University of Computer Studies Maubin
    • University of Computer Studies, Meikhtila
    • University of Computer Studies Pathein
    • University of Computer Studies, Taungoo
    • University of Computer Studies, Yangon
    • University of Dental Medicine Mandalay
    • University of Dental Medicine, Yangon
    • University of Information Technology
    • University of Mandalay
    • University of Medicine 1
    • University of Medicine 2
    • University of Medicine Mandalay
    • University of Myitkyina
    • University of Public Health, Yangon
    • University of Veterinary Science
    • University of Yangon
    • West Yangon University
    • Yadanabon University
    • Yangon Technological University
    • Yangon University of Distance Education
    • Yangon University of Economics
    • Yangon University of Education
    • Yangon University of Foreign Languages
    • Yezin Agricultural University
    • New Index

Item

{"_buckets": {"deposit": "a64d06e0-b32b-45d4-9218-5de3f818b486"}, "_deposit": {"id": "4515", "owners": [], "pid": {"revision_id": 0, "type": "recid", "value": "4515"}, "status": "published"}, "_oai": {"id": "oai:meral.edu.mm:recid/4515", "sets": ["user-ucsy"]}, "communities": ["ucsy"], "item_1583103067471": {"attribute_name": "Title", "attribute_value_mlt": [{"subitem_1551255647225": "Privacy Control Model for Academic Information in Private Cloud System", "subitem_1551255648112": "en_US"}]}, "item_1583103085720": {"attribute_name": "Description", "attribute_value_mlt": [{"interim": "Cloud computing is one of today’s most attractivetechnology areas due to its many advantages like Highlyscalable, on-demand, web-accessed IT resources withmajor cost / cash and flexibility. In this paper, the privacypolicies and access control strategies for academic privatecloud system are proposed to reduce the risk such asstealing and misuse of the private personal data, userprofile management and accessing services offered on theprivate cloud environment. This system has beenconfigured with Eucalyptus open source cloudinfrastructure in which the privacy policies and accesscontrol strategies are enhanced. In order to solve thesesecurity problems on the private cloud model, we can takeadvantages of the existing Eucalyptus cloud infrastructureand security in which we can elect to store highly sensitivedata of the university in the private storage cloud and lesssensitive data in public storage of the private cloud. Themain idea of privacy enhancement on a private cloudcomputing model is applying the role-based access controlmodel as well as deploying privacy policies and securityconstraints into the sensitive resources. For securitypurpose, this paper extends the Role Based Access Controlmodel with role relationships and delegation for accessrights."}]}, "item_1583103108160": {"attribute_name": "Keywords", "attribute_value_mlt": [{"interim": "Privacy"}, {"interim": "Eucalyptus"}, {"interim": "Role-based Access Control"}, {"interim": "Private Cloud"}]}, "item_1583103120197": {"attribute_name": "Files", "attribute_type": "file", "attribute_value_mlt": [{"accessrole": "open_access", "date": [{"dateType": "Available", "dateValue": "2019-11-15"}], "displaytype": "preview", "download_preview_message": "", "file_order": 0, "filename": "10096.pdf", "filesize": [{"value": "743 Kb"}], "format": "application/pdf", "future_date_message": "", "is_thumbnail": false, "licensetype": "license_free", "mimetype": "application/pdf", "size": 743000.0, "url": {"url": "https://meral.edu.mm/record/4515/files/10096.pdf"}, "version_id": "46626960-245f-479c-bcc2-d07840cdc9fa"}]}, "item_1583103131163": {"attribute_name": "Journal articles", "attribute_value_mlt": [{"subitem_issue": "", "subitem_journal_title": "Tenth International Conference On Computer Applications (ICCA 2012)", "subitem_pages": "", "subitem_volume": ""}]}, "item_1583103147082": {"attribute_name": "Conference papers", "attribute_value_mlt": [{"subitem_acronym": "", "subitem_c_date": "", "subitem_conference_title": "", "subitem_part": "", "subitem_place": "", "subitem_session": "", "subitem_website": ""}]}, "item_1583103211336": {"attribute_name": "Books/reports/chapters", "attribute_value_mlt": [{"subitem_book_title": "", "subitem_isbn": "", "subitem_pages": "", "subitem_place": "", "subitem_publisher": ""}]}, "item_1583103233624": {"attribute_name": "Thesis/dissertations", "attribute_value_mlt": [{"subitem_awarding_university": "", "subitem_supervisor(s)": [{"subitem_supervisor": ""}]}]}, "item_1583105942107": {"attribute_name": "Authors", "attribute_value_mlt": [{"subitem_authors": [{"subitem_authors_fullname": "Mon, Ei Ei"}, {"subitem_authors_fullname": "Naing, Thinn Thu"}]}]}, "item_1583108359239": {"attribute_name": "Upload type", "attribute_value_mlt": [{"interim": "Publication"}]}, "item_1583108428133": {"attribute_name": "Publication type", "attribute_value_mlt": [{"interim": "Article"}]}, "item_1583159729339": {"attribute_name": "Publication date", "attribute_value": "2012-02-28"}, "item_1583159847033": {"attribute_name": "Identifier", "attribute_value": "http://onlineresource.ucsy.edu.mm/handle/123456789/2440"}, "item_title": "Privacy Control Model for Academic Information in Private Cloud System", "item_type_id": "21", "owner": "1", "path": ["1597824273898"], "permalink_uri": "http://hdl.handle.net/20.500.12678/0000004515", "pubdate": {"attribute_name": "Deposited date", "attribute_value": "2019-11-15"}, "publish_date": "2019-11-15", "publish_status": "0", "recid": "4515", "relation": {}, "relation_version_is_last": true, "title": ["Privacy Control Model for Academic Information in Private Cloud System"], "weko_shared_id": -1}

Privacy Control Model for Academic Information in Private Cloud System

http://hdl.handle.net/20.500.12678/0000004515
405871c3-45f7-46dd-8ba5-a18bd57a8167
a64d06e0-b32b-45d4-9218-5de3f818b486
None
Name / File License Actions
10096.pdf 10096.pdf (743 Kb)
Publication type
Article
Upload type
Publication
Title
Title Privacy Control Model for Academic Information in Private Cloud System
Language en_US
Publication date 2012-02-28
Authors
Mon, Ei Ei
Naing, Thinn Thu
Description
Cloud computing is one of today’s most attractivetechnology areas due to its many advantages like Highlyscalable, on-demand, web-accessed IT resources withmajor cost / cash and flexibility. In this paper, the privacypolicies and access control strategies for academic privatecloud system are proposed to reduce the risk such asstealing and misuse of the private personal data, userprofile management and accessing services offered on theprivate cloud environment. This system has beenconfigured with Eucalyptus open source cloudinfrastructure in which the privacy policies and accesscontrol strategies are enhanced. In order to solve thesesecurity problems on the private cloud model, we can takeadvantages of the existing Eucalyptus cloud infrastructureand security in which we can elect to store highly sensitivedata of the university in the private storage cloud and lesssensitive data in public storage of the private cloud. Themain idea of privacy enhancement on a private cloudcomputing model is applying the role-based access controlmodel as well as deploying privacy policies and securityconstraints into the sensitive resources. For securitypurpose, this paper extends the Role Based Access Controlmodel with role relationships and delegation for accessrights.
Keywords
Privacy, Eucalyptus, Role-based Access Control, Private Cloud
Identifier http://onlineresource.ucsy.edu.mm/handle/123456789/2440
Journal articles
Tenth International Conference On Computer Applications (ICCA 2012)
Conference papers
Books/reports/chapters
Thesis/dissertations
0
0
views
downloads
Views Downloads

Export

OAI-PMH
  • OAI-PMH DublinCore
Other Formats