{"title":"基于认证令牌的云环境下数据丢失预防与数据保护","authors":"Vlad Bucur, O. Stan, L. Miclea","doi":"10.1109/CSCS.2019.00128","DOIUrl":null,"url":null,"abstract":"Data leek issues represents a very high or critical importance within the cloud developers. Given the tremendous growth of cloud computing in the past 3 years the authors of this paper believe that an analysis of the implementation of modern security solutions for data leaks and data protection is of the utmost importance. Authentication tokens, provided by several different cloud providers and third parties, are one of the most common and useful tools that developers have in order to secure their applications. The goal of this paper is to analyze how these tokens are currently used and to provide a solution in order to improve their implementation by reviewing their compatibility with novel security concepts or challenges such as data tagging, hybrid data security algorithms, microservices deployment using Docker or serverless applications","PeriodicalId":352411,"journal":{"name":"2019 22nd International Conference on Control Systems and Computer Science (CSCS)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Data Loss Prevention and Data Protection in Cloud Environments Based on Authentication Tokens\",\"authors\":\"Vlad Bucur, O. Stan, L. Miclea\",\"doi\":\"10.1109/CSCS.2019.00128\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Data leek issues represents a very high or critical importance within the cloud developers. Given the tremendous growth of cloud computing in the past 3 years the authors of this paper believe that an analysis of the implementation of modern security solutions for data leaks and data protection is of the utmost importance. Authentication tokens, provided by several different cloud providers and third parties, are one of the most common and useful tools that developers have in order to secure their applications. The goal of this paper is to analyze how these tokens are currently used and to provide a solution in order to improve their implementation by reviewing their compatibility with novel security concepts or challenges such as data tagging, hybrid data security algorithms, microservices deployment using Docker or serverless applications\",\"PeriodicalId\":352411,\"journal\":{\"name\":\"2019 22nd International Conference on Control Systems and Computer Science (CSCS)\",\"volume\":\"33 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2019-05-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2019 22nd International Conference on Control Systems and Computer Science (CSCS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CSCS.2019.00128\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 22nd International Conference on Control Systems and Computer Science (CSCS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CSCS.2019.00128","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Data Loss Prevention and Data Protection in Cloud Environments Based on Authentication Tokens
Data leek issues represents a very high or critical importance within the cloud developers. Given the tremendous growth of cloud computing in the past 3 years the authors of this paper believe that an analysis of the implementation of modern security solutions for data leaks and data protection is of the utmost importance. Authentication tokens, provided by several different cloud providers and third parties, are one of the most common and useful tools that developers have in order to secure their applications. The goal of this paper is to analyze how these tokens are currently used and to provide a solution in order to improve their implementation by reviewing their compatibility with novel security concepts or challenges such as data tagging, hybrid data security algorithms, microservices deployment using Docker or serverless applications