Home / Journals / CMC / Vol.65, No.3, 2020
Special lssues
Table of Content
  • Open AccessOpen Access

    ARTICLE

    Information Flow Security Models for Cloud Computing

    Congdong Lv1, *, Ji Zhang2, Zhoubao Sun1, Gang Qian1
    CMC-Computers, Materials & Continua, Vol.65, No.3, pp. 2687-2705, 2020, DOI:10.32604/cmc.2020.011232
    Abstract Cloud computing provides services to users through Internet. This open mode not only facilitates the access by users, but also brings potential security risks. In cloud computing, the risk of data leakage exists between users and virtual machines. Whether direct or indirect data leakage, it can be regarded as illegal information flow. Methods, such as access control models can control the information flow, but not the covert information flow. Therefore, it needs to use the noninterference models to detect the existence of illegal information flow in cloud computing architecture. Typical noninterference models are not suitable to certificate information flow in… More >

Per Page:

Share Link