Service Outsourcing Character Oriented Privacy Conflict Detection Method in Cloud Computing
نویسندگان
چکیده
منابع مشابه
Privacy-Preserving Data Outsourcing in Cloud Computing
In cloud computing, data owners are motivated to outsource their complex data management systems from local sites to the commercial public cloud for great flexibility and economic savings. But for protecting data privacy, sensitive data has to be encrypted before outsourcing, which obsoletes traditional data utilization based on plaintext keyword search. Thus, enabling an encrypted cloud data s...
متن کاملA Service-oriented Identity Authentication Privacy Protection Method in Cloud Computing
Cloud computing provides elastic, scalable on-demand IT services for individuals and organizations. In the cloud computing, everything is as the service. Cloud clients enjoy convenience and efficiency service, but at the same time encounter new issues. Cloud clients needs to provide authentication information to access to service, which often contains a lot of sensitive information. The service...
متن کاملWorkflow Scheduling for Service Oriented Cloud Computing
Service Orientation (SO) and grid computing are two computing paradigms that when put together using Internet technologies promise to provide a scalable yet flexible computing platform for a diverse set of distributed computing applications. This practice gives rise to the notion of a computing cloud that addresses some previous limitations of interoperability, resource sharing and utilization ...
متن کاملService-oriented computing (SOC) in a cloud computing environment
Service-Oriented Computing (SOC) is an emerging paradigm for developing software systems that employ services. The distinction between SOC and traditional computing is that application builders no longer construct software from scratch using a programming language. Instead, they specify the application logic in a high-level specification language, utilizing standard services as components. This...
متن کاملRequirement-Oriented Privacy Protection Analysis Architecture in Cloud Computing
—As a new software paradigm, cloud computing provides services dynamically according to user requirements. However, it is difficult to control personal privacy information because of the opening, virtualization, multi-tenancy and service outsourcing characters. Therefore, how to protect user privacy information has become a research focus. In this paper, we propose requirement-oriented privacy...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of Applied Mathematics
سال: 2014
ISSN: 1110-757X,1687-0042
DOI: 10.1155/2014/240425