Simulation Research on Dynamic Security Model of Information System in Cloud Computing Environment

Article Preview

Abstract:

Cloud computing can dynamically allocate the software or hardware resource and information resource in accordance with the needs of different computer users, so as to expand the virtual resources of computer, but data information exists a big security risk in the process of data parallel calculation or the data sharing, so it needs to carry out the risk assessment on the security of signal. In cloud computing, this paper introduces the second-order difference quotient calculation principle in the model of information risk assessment that has accelerated the speed of information risk assessment, and adopts second order linear security authentication model that has strengthened the security of the cloud computing. In order to verify the validity and reliability of the model, this paper uses C program language to design the algorithm and inspects the cloud data with possible existing risk, and then it obtains the deviation curve of numerical calculation and theoretical value, which provides the technical reference for the research of cloud information security technology.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

3285-3290

Citation:

Online since:

August 2014

Authors:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] Yuanfang Pu, Wei Zhang, Shaohua Teng, Du Hongle. The detection of a cooperative network intrusion based on decision tree [J]. Journal of Jiangxi Normal University: Natural Science Edition, 2010, 34(3): 302-307.

DOI: 10.1109/jcpc.2009.5420129

Google Scholar

[2] Zhijun Zhu, Zichun Le, ran Zhu. Research and implementation of OBS network simulation platform based on NS2 [J]. Journal of communications, 2011, 30(9): 128-134.

Google Scholar

[3] Jun Liu, Zhe Li, Lei Yue. Design and implementation of self-organization network simulation platform [J]. Computer science, 2012, 35(1): 24-26, 30.

Google Scholar

[4] Di Wu, Xiaogang Zhao, Zhu Fengxian. Simulation study and realization of UAV Ad Hoc network in reencounter scenario [J]. Journal of system simulation, 2011, 20(23): 6409-6413.

Google Scholar

[5] Zhigao Luo, Binbin Fan, Xiaodong Guo, Xiang Wang, Ju Li. Analysis of the three-dimensional melting flow in injection cavity based on the wavelet finite element [J]. Chinese mechanical engineering, 2011, 20(10): 1244-1247.

Google Scholar

[6] Jianxin Xu, Dinghe Li, Xiang Lu, Guanghui Qing. Sensitivity analysis based on finite element of B-spline wavelets for piezoelectric laminates [J]. Engineering mechanics, 2010, 27(6): 194-201.

Google Scholar

[7] Qiong You, Zhiyu Shi, Shaoxiang Luo. Identification of moving load based on wavelet finite element method [J]. Journal of vibration engineering, 2010, 23(2): 188-193.

Google Scholar

[8] Qifeng Suo, Shangying Xie. Analysis of dynamic property of bridge structures using fuzzy finite element method [J]. Journal of highway and transportation research and development, 2010, 27(4): 56-72.

Google Scholar

[9] Daguo Qin, Xiaowu Chen, Bo Li, et al. Calculation of space situation and its visualization modeling [J]. Systems engineering and electronics, 2012, 31(12): 2904-2907.

Google Scholar

[10] Houqing Lu, Feng Wang, Yisheng Song, et al. Targets damage assessment system based on campaign simulation [J]. Journal of PLA University of Science and Technology: Natural Science Edition, 2011, 10(2): 139-143.

Google Scholar

[11] Huimo Wang, Yu Zhang. Research on situation data model in joint operations simulation [J]. Journal of system simulation, 2012, 20(15): 4186-4188.

Google Scholar

[12] Zemin Xu, Jun He. Design and realization of 3D graphics simulation system for battlefield situation [J]. Journal of computer applications, 2011, 29 (1): 313-316.

Google Scholar