Research on Security Strategies of Digital Library Based on Cloud Computing Platform

Article Preview

Abstract:

Based on the application of cloud computing, digital library is a cloud with a powerful computing capability, which is integrated from many relatively low cost computing entities through network. This cloud can be applied to store all types of document resources and conduct computing application, so as to unify the management by the means of resources sharing. The users can use a variety of terminal equipment to access it without any limitation of time and place, and it can carry on the service charge process based on the use of resources. The framework of digital library based on cloud platform can be divided into 3 layers: core service, service management as well as user access interface. Digital library based on the cloud computing platform is confronted with some security problems, such as data security, user privacy leaks, virtualization security etc. The paper discusses the corresponding strategies from the perspectives of WEB browser security, data encryption, identity authentication and authorization decision, virtual security technology, and establishment of cloud computing security standards and evaluation system.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 734-737)

Pages:

3171-3174

Citation:

Online since:

August 2013

Authors:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Meiko Jensen, Jorg Schwenk, Nils Gruschka, etal. Cloud, 2009 IEEE International Conference on Cloud Computing, 2009: 109 -116.

DOI: 10.1109/cloud.2009.60

Google Scholar

[2] Citron D, Zlotnick A. IBM Journal of Research & Development. November 2011; 55(6): 6: 1-6: 10.

Google Scholar

[3] Cusumano M. Communications of the ACM. April 2010; 53(4): 27-29.

Google Scholar

[4] Ke L, Hai J, Jinjun C, Xiao L, Dong Y, Yun Y. International Journal of High Performance Computing Applications. November 2010; 24(4): 445-456.

DOI: 10.1177/1094342010369114

Google Scholar