Data Security Strategy Based on Artificial Immune Algorithm for Cloud Computing

被引:0
|
作者
Chen Jinyin [1 ]
Yang Dongyong [1 ]
机构
[1] Zhejiang Univ Technol, Coll Informat Engn, Hangzhou 310023, Zhejiang, Peoples R China
关键词
Data security; Artificial immune; Cloud computing; HDFS; Cloudsim;
D O I
暂无
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
With the fast development of cloud computing and its wide application, data security plays an important role in cloud computing. This paper brought up a novel data security strategy based on artificial immune algorithm on architecture of HDFS for cloud computing. Firstly, we explained the main factors influence data security in cloud environment. Then we introduce HDFS architecture, data security model and put forward an improved security model for cloud computing. In the third section, artificial immune algorithm related with negative selection and dynamic selection algorithm that adopted in our system and how they applied to cloud computing are depicted in detail. Finally simulations are taken by two steps. Former simulations are carried out to prove the performance of artificial immune algorithm brought up in this paper, the latter simulation are running on Cloudsim platform to testify that data security strategy based on artificial immune algorithm for cloud computing is efficient.
引用
收藏
页码:149 / 153
页数:5
相关论文
共 50 条
  • [1] Adaptive Artificial Bee Colony Algorithm-Based Enhancement of Data Security in Cloud Computing
    Geetha J.S.
    SN Computer Science, 5 (1)
  • [2] Cloud Computing Security Evaluation Based on Multidimensional Immune Algorithm (MIA)
    Wang, Xiaoyu
    Wang, Heng
    2023 3RD ASIA-PACIFIC CONFERENCE ON COMMUNICATIONS TECHNOLOGY AND COMPUTER SCIENCE, ACCTCS, 2023, : 246 - 250
  • [3] Study on Strategy of Cloud Computing Data Storage Security
    Liu, Sha
    Zhu, Shuhua
    PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON MATERIALS ENGINEERING AND INFORMATION TECHNOLOGY APPLICATIONS, 2015, 28 : 64 - 67
  • [4] A Data Placement Strategy Based on Genetic Algorithm in Cloud Computing Platform
    Guo, Wei
    Wang, Xinjun
    2013 10TH WEB INFORMATION SYSTEM AND APPLICATION CONFERENCE (WISA 2013), 2013, : 369 - 372
  • [5] Research of Data Security Strategy MC-R Based on Cloud Computing
    Li Ling
    Mei Shengmin
    Zhang Hairong
    Tang Haiyan
    COMPUTER SCIENCE AND TECHNOLOGY (CST2016), 2017, : 349 - 365
  • [6] Smart grid data security storage strategy based on cloud computing platform
    Jiang, Xin
    Yang, Qifan
    Ji, Wen
    Chen, Yanshu
    Cai, Yuxiang
    Li, Xiaoming
    2021 6TH INTERNATIONAL CONFERENCE ON SMART GRID AND ELECTRICAL AUTOMATION (ICSGEA 2021), 2021, : 69 - 74
  • [7] The Research Based on Security Model and Cloud Computing Strategy
    Pei, Aoqiu
    Yang, Min
    Tang, Yanbin
    ADVANCES IN MECHATRONICS, AUTOMATION AND APPLIED INFORMATION TECHNOLOGIES, PTS 1 AND 2, 2014, 846-847 : 1600 - 1603
  • [8] Study of Data Security Based On Cloud Computing
    Wang, Honghua
    PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION APPLICATIONS (ICCIA 2012), 2012, : 1609 - 1611
  • [9] A data placement strategy based on clustering and consistent hashing algorithm in Cloud Computing
    Li, Qiang
    Wang, Kun
    Wei, Suwei
    Han, Xuefeng
    Xu, Lili
    Gao, Min
    2014 9TH INTERNATIONAL CONFERENCE ON COMMUNICATIONS AND NETWORKING IN CHINA (CHINACOM), 2014, : 478 - 483
  • [10] SOA Security Strategy Based on Cloud Immune Protection
    Chen, Hui
    2021 13TH INTERNATIONAL CONFERENCE ON MEASURING TECHNOLOGY AND MECHATRONICS AUTOMATION (ICMTMA 2021), 2021, : 514 - 517