Study of Cloud Computing Security and Application in Safe City

Article Preview

Abstract:

A cloud-based security management and control platform is proposed, used in the Safe City security monitoring. The platform includes video monitoring and emergency command system. Video monitoring center, including command centers, branch centers, police center, monitoring the site, and through the client to complete audio and video viewing, playback and other services function. Emergency command system can complete handling emergencies, including tasking, information, resource scheduling, and other functions.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

299-303

Citation:

Online since:

March 2015

Authors:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2015 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] Kunlun Gao ; Jianming Liu ; Jian Guo ; Rui An, Study on data acquisition solution of network security monitoring system, Information Theory and Information Security (ICITIS), 2010 IEEE International Conference on, 2010 , Page(s): 674 - 677.

DOI: 10.1109/icitis.2010.5689487

Google Scholar

[2] Kunlun Gao ; Jianming Liu ; Jian Guo ; Rui An, Study on data acquisition solution of network security monitoring system , Information Theory and Information Security (ICITIS), 2010 IEEE International Conference on, 2010 , Page(s): 674 - 677.

DOI: 10.1109/icitis.2010.5689487

Google Scholar

[3] Xianxian Li ; Changhui Jiang ; Jianxin Li ; Bo Li, VMInsight: Hardware Virtualization-Based Process Security Monitoring System , Network Computing and Information Security (NCIS), 2011 International Conference on, 2011 , Page(s): 62 - 66.

DOI: 10.1109/ncis.2011.21

Google Scholar

[4] Petcu, D., A Taxonomy for SLA-Based Monitoring of Cloud Security, Computer Software and Applications Conference (COMPSAC), 2014 IEEE 38th Annual , 2014 , Page(s): 640 - 641.

DOI: 10.1109/compsac.2014.50

Google Scholar

[5] Lv Guangjuan ; Xu Ruzhi ; Zu Xiangrong ; Information Security Monitoring System Based on Data Mining, Information Assurance and Security, 2009. IAS '09. Fifth International Conference on, 2009 , Page(s): 472 - 475.

DOI: 10.1109/ias.2009.325

Google Scholar