Study on data privacy monitoring of cloud computing and access control strategy

2Citations
Citations of this article
10Readers
Mendeley users who have this article in their library.

Abstract

With the development of information network, cloud computing has been widely spread, however the cloud security incidents are followed, which brought serious threat to the user data privacy security in cloud computing. In order to improve the reliability of cloud computing services, preventing malicious attacks, joint attacks, illegal access, tampering with data and other malicious acts of information and other malicious acts, we must use an effective method to solve these problems, so that the user’s privacy data can be protected. In this paper, it takes rhe overview of cloud computing as the breakthrough point, describing the data security threats that the cloud computing has to face, discussing the privacy protection methods under the computer environment, demonstrating the data privacy protection technology, so as to enhance the user’s safety index of using cloud computing.

Author supplied keywords

Cite

CITATION STYLE

APA

Lu, K. (2016). Study on data privacy monitoring of cloud computing and access control strategy. International Journal of Grid and Distributed Computing, 9(7), 237–242. https://doi.org/10.14257/ijgdc.2016.9.7.24

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free