{"created":"2020-09-01T15:00:00.805979+00:00","id":4515,"links":{},"metadata":{"_buckets":{"deposit":"a64d06e0-b32b-45d4-9218-5de3f818b486"},"_deposit":{"id":"4515","owners":[],"pid":{"revision_id":0,"type":"recid","value":"4515"},"status":"published"},"_oai":{"id":"oai:meral.edu.mm:recid/4515","sets":["1582963302567:1597824273898"]},"communities":["ucsy"],"item_1583103067471":{"attribute_name":"Title","attribute_value_mlt":[{"subitem_1551255647225":"Privacy Control Model for Academic Information in Private Cloud System","subitem_1551255648112":"en_US"}]},"item_1583103085720":{"attribute_name":"Description","attribute_value_mlt":[{"interim":"Cloud computing is one of today’s most attractivetechnology areas due to its many advantages like Highlyscalable, on-demand, web-accessed IT resources withmajor cost / cash and flexibility. In this paper, the privacypolicies and access control strategies for academic privatecloud system are proposed to reduce the risk such asstealing and misuse of the private personal data, userprofile management and accessing services offered on theprivate cloud environment. This system has beenconfigured with Eucalyptus open source cloudinfrastructure in which the privacy policies and accesscontrol strategies are enhanced. In order to solve thesesecurity problems on the private cloud model, we can takeadvantages of the existing Eucalyptus cloud infrastructureand security in which we can elect to store highly sensitivedata of the university in the private storage cloud and lesssensitive data in public storage of the private cloud. Themain idea of privacy enhancement on a private cloudcomputing model is applying the role-based access controlmodel as well as deploying privacy policies and securityconstraints into the sensitive resources. For securitypurpose, this paper extends the Role Based Access Controlmodel with role relationships and delegation for accessrights."}]},"item_1583103108160":{"attribute_name":"Keywords","attribute_value_mlt":[{"interim":"Privacy"},{"interim":"Eucalyptus"},{"interim":"Role-based Access Control"},{"interim":"Private Cloud"}]},"item_1583103120197":{"attribute_name":"Files","attribute_type":"file","attribute_value_mlt":[{"accessrole":"open_access","date":[{"dateType":"Available","dateValue":"2019-11-15"}],"displaytype":"preview","filename":"10096.pdf","filesize":[{"value":"743 Kb"}],"format":"application/pdf","licensetype":"license_note","mimetype":"application/pdf","url":{"url":"https://meral.edu.mm/record/4515/files/10096.pdf"},"version_id":"46626960-245f-479c-bcc2-d07840cdc9fa"}]},"item_1583103131163":{"attribute_name":"Journal articles","attribute_value_mlt":[{"subitem_issue":"","subitem_journal_title":"Tenth International Conference On Computer Applications (ICCA 2012)","subitem_pages":"","subitem_volume":""}]},"item_1583103147082":{"attribute_name":"Conference papers","attribute_value_mlt":[{"subitem_acronym":"","subitem_c_date":"","subitem_conference_title":"","subitem_part":"","subitem_place":"","subitem_session":"","subitem_website":""}]},"item_1583103211336":{"attribute_name":"Books/reports/chapters","attribute_value_mlt":[{"subitem_book_title":"","subitem_isbn":"","subitem_pages":"","subitem_place":"","subitem_publisher":""}]},"item_1583103233624":{"attribute_name":"Thesis/dissertations","attribute_value_mlt":[{"subitem_awarding_university":"","subitem_supervisor(s)":[{"subitem_supervisor":""}]}]},"item_1583105942107":{"attribute_name":"Authors","attribute_value_mlt":[{"subitem_authors":[{"subitem_authors_fullname":"Mon, Ei Ei"},{"subitem_authors_fullname":"Naing, Thinn Thu"}]}]},"item_1583108359239":{"attribute_name":"Upload type","attribute_value_mlt":[{"interim":"Publication"}]},"item_1583108428133":{"attribute_name":"Publication type","attribute_value_mlt":[{"interim":"Article"}]},"item_1583159729339":{"attribute_name":"Publication date","attribute_value":"2012-02-28"},"item_1583159847033":{"attribute_name":"Identifier","attribute_value":"http://onlineresource.ucsy.edu.mm/handle/123456789/2440"},"item_title":"Privacy Control Model for Academic Information in Private Cloud System","item_type_id":"21","owner":"1","path":["1597824273898"],"publish_date":"2019-11-15","publish_status":"0","recid":"4515","relation_version_is_last":true,"title":["Privacy Control Model for Academic Information in Private Cloud System"],"weko_creator_id":"1","weko_shared_id":-1},"updated":"2021-12-13T01:53:38.845895+00:00"}