Congdong Lv1, *, Ji Zhang2, Zhoubao Sun1, Gang Qian1
CMC-Computers, Materials & Continua, Vol.65, No.3, pp. 2687-2705, 2020, DOI:10.32604/cmc.2020.011232
- 16 September 2020
Abstract Cloud computing provides services to users through Internet. This open mode
not only facilitates the access by users, but also brings potential security risks. In cloud
computing, the risk of data leakage exists between users and virtual machines. Whether
direct or indirect data leakage, it can be regarded as illegal information flow. Methods,
such as access control models can control the information flow, but not the covert
information flow. Therefore, it needs to use the noninterference models to detect the
existence of illegal information flow in cloud computing architecture. Typical
noninterference models are not suitable… More >