期刊
  出版年
  关键词
结果中检索 Open Search
Please wait a minute...
选择: 显示/隐藏图片
1. Preventing Data Leakage in a Cloud Environment
Fuzhi Cang, Mingxing Zhang, Yongwei Wu, and Weimin Zheng
ZTE Communications    2013, 11 (4): 27-31.   DOI: DOI:10.3969/j.issn.1673-5188.2013.04.004
摘要61)      PDF (346KB)(112)    收藏
Despite the multifaceted advantages of cloud computing, concerns about data leakage or abuse impedes its adoption for security-sensitive tasks. Recent investigations have revealed that the risk of unauthorized data access is one of the biggest concerns of users of cloud-based services. Transparency and accountability for data managed in the cloud is necessary. Specifically, when using a cloudhost service, a user typically has to trust both the cloud service provider and cloud infrastructure provider to properly handling private data. This is a multi-party system. Three particular trust models can be used according to the credibility of these providers. This paper describes techniques for preventing data leakage that can be used with these different models.
相关文章 | 多维度评价