Applied-Information System in Accounting Data Security via Cloud Computing Systems

Article Preview

Abstract:

This paper presents a static data authentication protection, SaaS dynamic data protection and trusted cloud computing platform for building and other programs designed by the existing trusted cloud computing platform software and hardware transformation and security enhancements, build a data security for cloud computing protection prototype system to verify the practicality and feasibility of the proposed text view is reasonable, and the theory program.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

253-256

Citation:

Online since:

August 2014

Authors:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] M. Whaiduzzaman, M. Sookhak, A. Gani, R. Buyya: A survey on vehicular cloud computing, Journal of Network and Computer Applications, Vol. 40 (2014), pp.325-344.

DOI: 10.1016/j.jnca.2013.08.004

Google Scholar

[2] V. Chang, R. J. Walters, G. Wills: The development that leads to the Cloud Computing Business Framework, International Journal of Information Management, Vol. 33 (2013), pp.524-538.

DOI: 10.1016/j.ijinfomgt.2013.01.005

Google Scholar

[3] C. L. P. Chen, C. Y. Zhang: Data-intensive applications, challenges, techniques and technologies: A survey on Big Data, Information Sciences, Vol. 275 (2014), pp.314-347.

DOI: 10.1016/j.ins.2014.01.015

Google Scholar

[4] R. V. Bossche, K. Vanmechelen, J. Broeckhove: Online cost-efficient scheduling of deadline-constrained workloads on hybrid clouds, Future Generation Computer Systems, Vol. 29 (2013), pp.973-985.

DOI: 10.1016/j.future.2012.12.012

Google Scholar

[5] R. G. Tinedo, M. S. Artigas, A. Ramírez, A. M. Martínez: Giving form to social cloud storage through experimentation: Issues and insights, Future Generation Computer Systems, Vol. 40 (2014), pp.1-16.

DOI: 10.1016/j.future.2014.05.001

Google Scholar

[6] X. Xu: From cloud computing to cloud manufacturing, Robotics and Computer-Integrated Manufacturing, Vol. 28 (2012), pp.75-86.

DOI: 10.1016/j.rcim.2011.07.002

Google Scholar

[7] C. Modi, D. Patel, B. Borisaniya, H. Patel, A. Patel, M. Rajarajan: A survey of intrusion detection techniques in Cloud, Journal of Network and Computer Applications, Vol. 36 (2013), pp.42-57.

DOI: 10.1016/j.jnca.2012.05.003

Google Scholar