A Secure and LightWeight Approach for Critical Data Security in Cloud
Identifikátory výsledku
Kód výsledku v IS VaVaI
<a href="https://www.isvavai.cz/riv?ss=detail&h=RIV%2F61989100%3A27740%2F12%3A86084779" target="_blank" >RIV/61989100:27740/12:86084779 - isvavai.cz</a>
Výsledek na webu
<a href="http://dx.doi.org/10.1109/CASoN.2012.6412421" target="_blank" >http://dx.doi.org/10.1109/CASoN.2012.6412421</a>
DOI - Digital Object Identifier
<a href="http://dx.doi.org/10.1109/CASoN.2012.6412421" target="_blank" >10.1109/CASoN.2012.6412421</a>
Alternativní jazyky
Jazyk výsledku
angličtina
Název v původním jazyce
A Secure and LightWeight Approach for Critical Data Security in Cloud
Popis výsledku v původním jazyce
Cloud computing is a model that provides ubiquitous, on demand access to a shared pool of computing resources including networks, servers, storage, application and services that can be easily provisioned and released. As Cloud is a shared and distributedenvironment, the need for ensuring security of its critical infrastructure that includes computing, network and storage is immense. One of the critical resources to look after in cloud environment is the data which is stored in files. The files can be configuration file at servers, or private user confidential files at users own work space but they all have a risk of data modification associated with them. If user data is modified through an attack then it will decline the trust of user on cloud services and if the important configuration files are modified, they will disrupt the functioning of cloud environment, like attacker can escalate its privileges and access to critical resources through such tampering and modifications to impor
Název v anglickém jazyce
A Secure and LightWeight Approach for Critical Data Security in Cloud
Popis výsledku anglicky
Cloud computing is a model that provides ubiquitous, on demand access to a shared pool of computing resources including networks, servers, storage, application and services that can be easily provisioned and released. As Cloud is a shared and distributedenvironment, the need for ensuring security of its critical infrastructure that includes computing, network and storage is immense. One of the critical resources to look after in cloud environment is the data which is stored in files. The files can be configuration file at servers, or private user confidential files at users own work space but they all have a risk of data modification associated with them. If user data is modified through an attack then it will decline the trust of user on cloud services and if the important configuration files are modified, they will disrupt the functioning of cloud environment, like attacker can escalate its privileges and access to critical resources through such tampering and modifications to impor
Klasifikace
Druh
D - Stať ve sborníku
CEP obor
IN - Informatika
OECD FORD obor
—
Návaznosti výsledku
Projekt
<a href="/cs/project/ED1.1.00%2F02.0070" target="_blank" >ED1.1.00/02.0070: Centrum excelence IT4Innovations</a><br>
Návaznosti
P - Projekt vyzkumu a vyvoje financovany z verejnych zdroju (s odkazem do CEP)
Ostatní
Rok uplatnění
2012
Kód důvěrnosti údajů
S - Úplné a pravdivé údaje o projektu nepodléhají ochraně podle zvláštních právních předpisů
Údaje specifické pro druh výsledku
Název statě ve sborníku
Proceedings of the 2012 4th International Conference on Computational Aspects of Social Networks, CASoN 2012 : 21 ? 23 November 2012, S?o Carlos, Brazil
ISBN
978-1-4673-4793-8
ISSN
—
e-ISSN
—
Počet stran výsledku
6
Strana od-do
315-320
Název nakladatele
IEEE
Místo vydání
New York
Místo konání akce
Sao Carlos
Datum konání akce
21. 11. 2012
Typ akce podle státní příslušnosti
WRD - Celosvětová akce
Kód UT WoS článku
—