An Anti-Spam Electronic Commerce Security System in Cloud Computing Environment

Article Preview

Abstract:

The appearance of cloud security system makes the spread of computer viruses possess some new features. The open environment in cloud computing is much more complex, and can not fully adapt to the new application of computer network such as cloud computing. Cloud computing offers the advanced capabilities of sharing, where the computing and storage capabilities are outsourced on demand, With the wide use of cloud computing services, tenants require higher and higher security assurance. Through the research and analyss of security in cloud computing, the design model of anti-spam electronic commerce security system based on cloud computing is presented, and the functional modules of the system are analyzed. Lastly, the construction model of anti-spam electronic commerce security system is advanced.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

5797-5800

Citation:

Online since:

May 2014

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] ISAAC B, JAP W J, SUTANTO J H. Improved Bayesian anti-spam filter implementation and analysis on independent spam corpuses[C]/ /Proc of International Conference on Computer Engineering and Technology. Washington DC: IEEE Computer Society, 2009: 326-330.

DOI: 10.1109/iccet.2009.170

Google Scholar

[2] ALMEIDAL T A, YAMAKAMI A. Content-based spam filtering[C]/ /Proc of International Joint Conference on Neural Networks. 2010: 1-7.

DOI: 10.1109/ijcnn.2010.5596569

Google Scholar

[3] Jon Oberheide, Evan Cooke. CloudAV: N-Version Antivirus in the Network Cloud[ D] . Mich igan: University of Michigan, (2009).

Google Scholar

[4] E ucalyptus Open Source Cloud Computing In frast ructu re-An Overview[ D] . Calif ornia: Eucalyptus Systems, (2009).

Google Scholar

[5] DUAN Zhen-hai, DONG Ying-fei, KARTIK G. DMTP: controlling through message delivery differentiation[J]. Science Direct Computer Networks, 2007, 51( 10) : 2616-2630.

DOI: 10.1016/j.comnet.2006.11.015

Google Scholar

[6] AUN M T B, BOK-MIN G O I, KIM V T H. Cloud enabled spam filtering services: challenges and opportunities[C]/ /Proc of IEEE Conference on Sustainable Utilization and Development in Engineering and Technology. 2011: 63-68.

DOI: 10.1109/student.2011.6089326

Google Scholar

[7] GOMATHISANKARAN M, TYAGI A, NAMUDURI K. HORNS: a homomorphic encryption scheme for cloud computing using residue number system[C]/ /Proc of the 45th Annual Conference on Information Sciences and Systems. 2011: 1-5.

DOI: 10.1109/ciss.2011.5766176

Google Scholar

[8] LI Hong-xia, CHEN Jun-ming, JIN Xin. An outlook on network hone-ypot[C]/ /Proc of International Conference on Computer Science and Service System. 2011: 48-52.

Google Scholar

[9] GEORGIOU E, DIKAIAKOS M D, STASSOPOULOU A. On the properties of spam-advertised URL addresses [J]. Journal of Network and Computer Applications, 2008, 31( 4) : 966-985.

DOI: 10.1016/j.jnca.2007.01.003

Google Scholar