Research on Cloud Computing Strategy Based on Security Model

Article Preview

Abstract:

Based on the threats of cloud computing security, combined with the principle of private cloud computing, this paper introduces the variable dimension fractal theory into the cloud computing and security policy model, and puts forwards multidimensional data model C2MDSM of the cloud computation. The model can protect 2D and 3D protection of user information in a private cloud space. Through the 3D fractal it greatly improves the user use of cloud resources, and improves the security of information, which realizes the true sense of the reasonable distribution for cloud resources. In order to verify the validity of the mathematical model and the algorithm designed in this paper, we use the MATLAB software to draw 2D and 3D fractal, and obtain the number of cloud users, security level and calculation residual results. It provides the technical reference for the research on cloud computing.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

1835-1839

Citation:

Online since:

September 2014

Authors:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] Fan Zhaolei, Wang Hongyong. The error analysis of two variables fractal interpolation function based on parameter perturbation [J]. Journal of Anhui University (NATURAL SCIENCE EDITION), 2010, 34(4): 34-36.

Google Scholar

[2] Pu Yuanfang, Zhang Wei, Teng Shaohua, Du Hongle. A cooperative network intrusion detection based on decision tree [J]. Journal of Jiangxi Normal University: Natural Science Edition, 2010, 34(3): 302-307.

DOI: 10.1109/jcpc.2009.5420129

Google Scholar

[3] Xu Jianxin, Li Dinghe, Lu Xiang, Qing Guanghui. Piezoelectric laminates sensitivity analysis based on B spline wavelet finite element [J]. Engineering mechanics, 2010, 27(6): 194-201.

Google Scholar

[4] Feng Zhigang, Pang Xinxing. Fractal interpolation function and the vertical compression factor [J]. Journal of Lanzhou University of Technology, 2010, 36(3): 101-103.

Google Scholar

[5] Zhu Zhijun, Le Zichun, Zhu Ran. Research and implementation of network simulation platform based on OBS NS2 [J]. Journal of communication, 2011, 30(9): 128-134.

Google Scholar

[6] Liu Jun, Li Zhe, Yue Lei. Design and implementation of self-organization network simulation platform [J]. Computer science, 2012, 35(1): 24-26.

Google Scholar

[7] Wu Di, Zhao Xiaogang, Zhu Fengxian. The Ad Hoc network simulation research and realization of UAV in setting environment [J]. System simulation, 2011, 20(23): 6409-6413.

Google Scholar

[8] Luo Zhigao, Fan Binbin, Guo Xiaodong, Wang Xiang, Li Ju. 3D flow analysis of the injection cavity melt based on wavelet finite element [J]. Chinese mechanical engineering, 2011, 20(10): 1244-1247.

Google Scholar

[9] Zhang Xing Shen Changxiang. A new trusted platform control module design [J]. Geometrics and information science of Wuhan University, 2011, 33(10): 1011-1014.

Google Scholar

[10] Wang Wei, Gao Neng, Jiang Lina. Research and analysis on security requirements of cloud computing [J]. Information network security, 2012, 2(3): 122-126.

Google Scholar