Research on the security mechanism of cloud computing service model

被引:3
|
作者
Zhang Y. [1 ,2 ]
机构
[1] Computer and Information Engineering College of Hohai University, Nanjing, Jiangsu
[2] Agricultural and Animal Husbandry College of Tibet University, Tibet
关键词
cloud computing; efficiency; security; service model;
D O I
10.3103/S0146411616020085
中图分类号
学科分类号
摘要
With the development of network technology, cloud computing as an emerging network technology has drawn more and more attention. At the same time, the security and efficiency of cloud computing technology has become major issues restricting the rapid development and popularization of cloud computing technology. By exploring the security of cloud computing service model, this study puts forward the architecture of a service model based on cloud computing. In order to implement the service model safely, a hybrid encryption algorithm is designed to ensure that data cannot be easily stolen during transmission and storage. Besides, this thesis also discusses different implementation mechanisms on data security storage, isolation and backup. © 2016, Allerton Press, Inc.
引用
收藏
页码:98 / 106
页数:8
相关论文
共 50 条
  • [1] Research on Service-Oriented Cloud Computing Information Security Mechanism
    Xiao-Tao, Xu
    Zhe, Chen
    Fei, Jiang
    Hui-Tao, Wang
    [J]. 2016 2ND IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATIONS (ICCC), 2016, : 2697 - 2701
  • [2] The Research on Cloud computing data security mechanism
    Xu Xiaoping
    Yan Junhu
    Liu Lan
    [J]. ADVANCES IN MECHATRONICS, AUTOMATION AND APPLIED INFORMATION TECHNOLOGIES, PTS 1 AND 2, 2014, 846-847 : 1595 - 1599
  • [3] The Research of Cloud Computing Service Model
    Zhang, Yuan
    Huang, Lei
    [J]. MECHATRONICS ENGINEERING, COMPUTING AND INFORMATION TECHNOLOGY, 2014, 556-562 : 6262 - 6265
  • [4] The Research on Cloud computing security model and Countermeasures
    Tang, JianGang
    [J]. SENSORS, MECHATRONICS AND AUTOMATION, 2014, 511-512 : 1196 - 1200
  • [5] Research of Security Model and Cloud Computing Strategy
    Ma Yingrui
    [J]. MECHATRONICS ENGINEERING, COMPUTING AND INFORMATION TECHNOLOGY, 2014, 556-562 : 6196 - 6198
  • [6] The Research of Data Security Mechanism Based on Cloud Computing
    Guo, Changyou
    Zheng, Xuefeng
    [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (03): : 363 - 370
  • [7] Research on a security mechanism for cloud computing based on virtualization
    Du, Ye
    Zhang, Ruhui
    Li, Meihong
    [J]. TELECOMMUNICATION SYSTEMS, 2013, 53 (01) : 19 - 24
  • [8] Research on a security mechanism for cloud computing based on virtualization
    Ye Du
    Ruhui Zhang
    Meihong Li
    [J]. Telecommunication Systems, 2013, 53 : 19 - 24
  • [9] Security as a Service Model for Virtualization Vulnerabilities in Cloud Computing
    Paikrao, Rahul L.
    Patil, Varsha H.
    [J]. 2018 INTERNATIONAL CONFERENCE ON ADVANCES IN COMMUNICATION AND COMPUTING TECHNOLOGY (ICACCT), 2018, : 559 - 562
  • [10] Security Issues In Service Model Of Cloud Computing Environment
    Krishna, B. Hari
    Kiran, S.
    Murali, G.
    Reddy, R. Pradeep Kumar
    [J]. FOURTH INTERNATIONAL CONFERENCE ON RECENT TRENDS IN COMPUTER SCIENCE & ENGINEERING (ICRTCSE 2016), 2016, 87 : 246 - 251