版权所有:内蒙古大学图书馆 技术提供:维普资讯• 智图
内蒙古自治区呼和浩特市赛罕区大学西街235号 邮编: 010021
作者机构:Umm Al Qura Univ Coll Engn & Comp Al Qunfudah Dept Comp Sci Mecca Saudi Arabia
出 版 物:《THERMAL SCIENCE》 (Therm. Sci.)
年 卷 期:2024年第28卷第6B期
页 面:4969-4977页
核心收录:
学科分类:080702[工学-热能工程] 08[工学] 0807[工学-动力工程及工程热物理]
主 题:access control cloud computing network risks edge computing single points of failure trusted systems distributed systems
摘 要:Since its discovery, computer technology has played a key role in changing the lifestyles of people and continues to provide countless benefits. Nevertheless, computer technology systems that facilitate smooth integration, such as, cloud computing;are prone to cyber breaches, which has negatively affected its reputation and perception. Therefore, computer technology systems that are secure are needed to curb cyber threats and increase user trust. The primary issue in computer technology systems is that, unlike alternative methods, most cloud access control mechanisms are inadequate. Furthermore, transitioning to a trust-based mechanism is not only complicated and costly but a significantly decision intensive process. As such, this present study investigates how network risks and threats analysis, edge computing and Arbiter, a mandatory access control mechanism, can be integrated into cloud computing to prevent single points offailure. It also examines how these integrating components can decrease the costs and effort required to change an entire operating system to meet the requirements of a trusted system.