The Research Based on Security Model and Cloud Computing Strategy

Article Preview

Abstract:

Cloud computing based on a large number of distributed computer gathers a wide variety of computing resources data and builds huge virtual resources space and provides information technology resources for the majority of computer users through the Internet. Security issues is one of the core elements which constrains the depth development of cloud computing. It also is the hot issue of research in this field. This paper first analyzes the architecture and threat signatures of cloud computing system and data application model based on the data of cloud computing and data security threat characteristics. It builds a data security implementation model under cloud computing. Based on this, it builds information security model of cloud computing strategy and analyzes configuration program of the model in the cloud computing.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 846-847)

Pages:

1600-1603

Citation:

Online since:

November 2013

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] I. Damgard,M. Jurik, Efficient protocols based on probabilistic encryption using composite degree residue classes, Proceedings of International Conference on Green Power, Materials and Manufacturing Technology and Applications, Trans Tech Publications, July 17-19, 2012, pp.1355-1364.

DOI: 10.7146/brics.v7i5.20133

Google Scholar

[2] M. Hirt,U. Maurer, Complete characterization of adversaries tolerable in secure multi-party computation, Proceedings of the 16th ACMSymposium on Principles of Distributed Computing , IEEE Conference Publishing Services, August 15-17, 2007, pp.125-134.

DOI: 10.1145/259380.259412

Google Scholar

[3] S. Fehr, U. Maurer, Linear VSS and distributed commitment schemes based on secret sharing and pairwise checks, Lecture Notes in Computer Science, vol. 10, no. 2, 2010, pp.565-580.

DOI: 10.1007/3-540-45708-9_36

Google Scholar

[4] C. Crepeau, J. Kilian, Discreet solitary games, Lecture Notes in Computer Science, vol. 773, no. 8, 2009, pp.319-330.

DOI: 10.1007/3-540-48329-2_27

Google Scholar

[5] V. Niemi, A. Renvall, How to prevent buying of votes in computer elections, Lecture Notes in Computer Science, vol. 917, no. 5, 2010, pp.164-170.

DOI: 10.1007/bfb0000432

Google Scholar

[6] H. Nurmi, A. Salomaa,L. Santean, Secret ballot elections in computer networks, Comput. Security, vol. 5, no. 3, 2011, pp.553-560.

DOI: 10.1016/0167-4048(91)90081-n

Google Scholar

[7] Sung, W. T., Ou, S. C. , Web-based learning in the Computer Aided Design curriculum, Journal of Computer Assisted Learning, vol. 18, no. 2, pp.187-195. 175-187.

DOI: 10.1046/j.0266-4909.2002.00225.x

Google Scholar

[8] SorkaBizon, M., Geometry and Engineering graphics in engineering education illustrated by example of advanced 3D modeling course, Proceedings of International Conference on Engineering Education, July 3-7, 2010, pp.1425-1432.

Google Scholar