The Legitimacy Detection for Multilevel Hybrid Cloud Algorithm Based Data Access
Title | The Legitimacy Detection for Multilevel Hybrid Cloud Algorithm Based Data Access |
Publication Type | Conference Paper |
Year of Publication | 2015 |
Authors | Na, L., Yunwei, D., Tianwei, C., Chao, W., Yang, G. |
Conference Name | Reliability and Security - Companion 2015 IEEE International Conference on Software Quality |
Date Published | aug |
Publisher | IEEE |
Keywords | Access Control, access violation, Algorithm design and analysis, cloud computing, data access, decision making, detection algorithm, detection algorithms, formal representation, Frequency modulation, global flow diagram, global flow graph, graph theory, legitimacy detection, multilevel hybrid cloud algorithm, pubcrawl170107, pubcrawl170108, security of data, unauthorized access, unauthorized access risks, Virtual machining |
Abstract | In this paper a joint algorithm was designed to detect a variety of unauthorized access risks in multilevel hybrid cloud. First of all, the access history is recorded among different virtual machines in multilevel hybrid cloud using the global flow diagram. Then, the global flow graph is taken as auxiliary decision-making basis to design legitimacy detection algorithm based data access and is represented by formal representation, Finally the implement process was specified, and the algorithm can effectively detect operating against regulations such as simple unauthorized level across, beyond indirect unauthorized and other irregularities. |
URL | http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=7322139&isnumber=7322103 |
DOI | 10.1109/QRS-C.2015.44 |
Citation Key | na_legitimacy_2015 |
- global flow diagram
- Virtual machining
- unauthorized access risks
- unauthorized access
- security of data
- pubcrawl170108
- pubcrawl170107
- multilevel hybrid cloud algorithm
- legitimacy detection
- graph theory
- global flow graph
- Access Control
- Frequency modulation
- formal representation
- detection algorithms
- detection algorithm
- Decision Making
- data access
- Cloud Computing
- Algorithm design and analysis
- access violation