2016
DOI: 10.5762/kais.2016.17.9.12
|View full text |Cite
|
Sign up to set email alerts
|

A Design of Authority Management Protocol for Secure Storage Access Control in Cloud Environment

Abstract: With the enhancements in existing major industries, cloud computing-based converging services have been created, as well as value-added industries. A variety of converging services are now provided, from personalized services up to industrial services. In Korea, they have become the driving force behind existing industries throughout the whole economy, but mainly in finance, mobile systems, social computing, and home services, based on cloud services. However, not only denial of service (DOS) and distributed D… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2022
2022
2022
2022

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 7 publications
0
1
0
Order By: Relevance
“…Devices connected to IoT network should be able to detect and respond to hacking attacks in the IoT service environment, which consists of gateways with different security functions. Monitoring and management technology of the network is needed to prevent distributed denial-of-service attacks (DDoS) by object bots infected with malicious codes [6]. IoT Platform Security: IoT service also needs to provide mutual authentication and access control between components (services and devices, users), and privacy (data, location, ID) protection.…”
Section: Figure 3: Iot Interfacementioning
confidence: 99%
“…Devices connected to IoT network should be able to detect and respond to hacking attacks in the IoT service environment, which consists of gateways with different security functions. Monitoring and management technology of the network is needed to prevent distributed denial-of-service attacks (DDoS) by object bots infected with malicious codes [6]. IoT Platform Security: IoT service also needs to provide mutual authentication and access control between components (services and devices, users), and privacy (data, location, ID) protection.…”
Section: Figure 3: Iot Interfacementioning
confidence: 99%