首页> 外文会议> >Comparative Study of CIA and Revised-CIA Algorithm
【24h】

Comparative Study of CIA and Revised-CIA Algorithm

机译:CIA与Revised-CIA算法的比较研究

获取原文

摘要

Cloud computing is an emerging, on-demand and Internet based popular technology. It provides lots of services over Internet such as, software, hardware, network, data storage, and computing and memory management. Besides this companies are binding their business from cloud computing because the fear of data leakage. Due to lack of security control mechanism and weakness in safeguard which lead to many security issues in cloud computing. In internet world, Confidentiality, Integrity and availability is a model designed to guide policies for information security within business organization. CIA (Confidentiality, Integrity, Availability)[1] factors are used for data classification which is done by client before storing the data on server. The CIA factors are the measure part of CIA Algorithm. The client who wants to upload the data for storage needs to give the value of the factors C (confidentiality), I (integrity), and A (Availability). The value of C is depends on level of secrecy at each level of data accessing and prevents unauthorized access of files, value of I based on how much accuracy is provided, unauthorized modification is required and reliability of information, and value of A is depends on accessibility of file. With the help of proposed method, the priority rating is calculated. Accordingly if data having the higher priority rating is considered to be critical and 3D security is recommended on that data or file. After completion of this phase the data which is received by cloud user for storage, uses 3Dimentional system for accessibility.
机译:云计算是一种新兴的,按需且基于Internet的流行技术。它通过Internet提供许多服务,例如软件,硬件,网络,数据存储以及计算和内存管理。此外,由于担心数据泄漏,这些公司还将其业务与云计算绑定在一起。由于缺乏安全控制机制和保障措施不足,导致云计算中出现许多安全问题。在互联网世界中,机密性,完整性和可用性是一种旨在指导企业组织内信息安全策略的模型。 CIA(机密性,完整性,可用性)[1]因素用于数据分类,该分类由客户端在将数据存储到服务器之前完成。 CIA因素是CIA算法的量度部分。想要上载数据以进行存储的客户端需要提供因子C(机密性),I(完整性)和A(可用性)的值。 C的值取决于每个数据访问级别上的保密级别,并防止文件的未经授权的访问,I的值取决于提供的准确度,是否需要未经授权的修改以及信息的可靠性,而A的值取决于文件的可访问性。借助所提出的方法,可以计算优先级。因此,如果具有较高优先级的数据被认为是至关重要的,并且建议对该数据或文件进行3D安全性检查。完成此阶段后,云用户接收的用于存储的数据将使用3Dimentional系统进行访问。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号