Research on the Optimal Design of Computing Security based on Cloud Computing

被引:0
|
作者
Yang, Fan [1 ]
Rao, Yutai [1 ]
机构
[1] Hubei Radio & TV Univ, Dept Elect & Informat Engn, Wuhan 430074, Hubei, Peoples R China
关键词
computing validation; cloud computing; Optimal Design;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper analyzes the current problems in the data security and privacy of cloud computing. On the basis, this paper mainly research about the legitimacy and validity of research cloud computing process. First of all, this paper understand the concept of cloud computing technology, according to the working principle of the structure model of the cloud computing service analyzes the existence of data security and privacy. Cloud computing service providers for cost savings, or application access layer has invasion of illegal users, so cloud computing task submitted by the legitimate user will not be executed or not executed completely, and the users will get that a random outcome, and task submitted by illegal users may be was carried out. Research on the remote computing verification problem, analysis of the existing research on security work, found that the existing calculation in advance and the second validation of remote computing method for cloud computing users spending too big, this paper combines the characteristics of cloud computing mass data processing, puts forward the remote computing verification method based on the third-party certification, efficient and low consumption to ensure security.
引用
收藏
页码:421 / 426
页数:6
相关论文
共 50 条
  • [1] Research on Security of the Client Based on Cloud Computing
    Xu Xiaoping
    Yan Junhu
    [J]. 2012 INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE AND SOFT COMPUTING (ICAISC 2012), 2012, 12 : 1 - 6
  • [2] Research On Cloud Computing And Security
    Yu, Ting-ting
    Zhu, Ying-Guo
    [J]. 2012 11TH INTERNATIONAL SYMPOSIUM ON DISTRIBUTED COMPUTING AND APPLICATIONS TO BUSINESS, ENGINEERING & SCIENCE (DCABES), 2012, : 314 - 316
  • [3] A Research on Cloud Computing Security
    Zhang, Ni
    Liu, Di
    Zhang, Yun-Yong
    [J]. 2013 INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY AND APPLICATIONS (ITA), 2013, : 370 - 373
  • [4] Concept Design and Case Studies of Testbed based on Cloud Computing for Security Research
    Cha, ByungRae
    Sim, SuJeong
    Kim, JongWon
    [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2014, 8 (02): : 107 - 114
  • [5] Research on the Data Storage Security based on Cloud Computing
    Ma, Xinqiang
    Huang, Yi
    Zhang, Yongdan
    Liu, Youyuan
    [J]. PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON ADVANCES IN MECHANICAL ENGINEERING AND INDUSTRIAL INFORMATICS, 2015, 15 : 326 - 331
  • [6] The Research Based on Security Model and Cloud Computing Strategy
    Pei, Aoqiu
    Yang, Min
    Tang, Yanbin
    [J]. ADVANCES IN MECHATRONICS, AUTOMATION AND APPLIED INFORMATION TECHNOLOGIES, PTS 1 AND 2, 2014, 846-847 : 1600 - 1603
  • [7] Research on Cloud Computing Security Based on the Remote Attestation
    Xie, Fu
    Du, Yunyun
    [J]. MECHATRONICS AND INDUSTRIAL INFORMATICS, PTS 1-4, 2013, 321-324 : 2657 - 2664
  • [8] The Research of Data Security Mechanism Based on Cloud Computing
    Guo, Changyou
    Zheng, Xuefeng
    [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (03): : 363 - 370
  • [9] Research on a security mechanism for cloud computing based on virtualization
    Du, Ye
    Zhang, Ruhui
    Li, Meihong
    [J]. TELECOMMUNICATION SYSTEMS, 2013, 53 (01) : 19 - 24
  • [10] Research on a security mechanism for cloud computing based on virtualization
    Ye Du
    Ruhui Zhang
    Meihong Li
    [J]. Telecommunication Systems, 2013, 53 : 19 - 24