Research of Data Security Model in Cloud Computing Platform for SMEs

被引:4
|
作者
Sun, Tao [1 ,2 ]
Wang, Xinjun [1 ]
机构
[1] Shandong Univ Jinan, Sch Comp Sci & Technol, Jinan 250101, Shandong, Peoples R China
[2] Qilu Univ Technol, Sch Informat, Jinan 250353, Shandong, Peoples R China
关键词
data security; cloud computing; integrity verification; cipher text retrieval;
D O I
10.14257/ijsia.2013.7.6.10
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In recent years, cloud computing has become a major mode to address SMEs inefficient and help improve their competitiveness. As cloud providers have priority access to data, so it is difficult to guarantee the confidentiality and integrity of users' data. For this reason this paper proposed a model to solve the problem of data security in cloud computing. The model adopts efficient encryption mechanisms to protect users' data. As the encrypted data is difficult to retrieve, we present a method of cipher text retrieval. Experimental results show that the model can better ensure data confidentiality and integrity.
引用
收藏
页码:97 / 107
页数:11
相关论文
共 50 条
  • [1] Research on Data Security Access Model of Cloud Computing Platform
    Zhu, Yangqing
    Zuo, Jun
    [J]. 2015 2ND INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE AND CONTROL ENGINEERING ICISCE 2015, 2015, : 424 - 428
  • [2] Data Security Model for Cloud Computing
    Dai Yuefa
    Wu Bo
    Gu Yaqiang
    Zhang Quan
    Tang Chaojing
    [J]. PROCEEDINGS OF 2009 INTERNATIONAL WORKSHOP ON INFORMATION SECURITY AND APPLICATION, 2009, : 141 - 144
  • [3] Blockchain-Based Cognitive Computing Model for Data Security on a Cloud Platform
    Guo, Xiangmin
    Liang, Guangjun
    Liu, Jiayin
    Chen, Xianyi
    [J]. CMC-COMPUTERS MATERIALS & CONTINUA, 2023, 77 (03): : 3305 - 3323
  • [4] Research and Implementation of Intelligent ERP Platform for SMEs Based on Cloud Computing
    Wen, Yong
    [J]. 2019 3RD INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE APPLICATIONS AND TECHNOLOGIES (AIAAT 2019), 2019, 646
  • [5] The Research on Cloud computing data security mechanism
    Xu Xiaoping
    Yan Junhu
    Liu Lan
    [J]. ADVANCES IN MECHATRONICS, AUTOMATION AND APPLIED INFORMATION TECHNOLOGIES, PTS 1 AND 2, 2014, 846-847 : 1595 - 1599
  • [6] The Research on Cloud computing security model and Countermeasures
    Tang, JianGang
    [J]. SENSORS, MECHATRONICS AND AUTOMATION, 2014, 511-512 : 1196 - 1200
  • [7] Research of Security Model and Cloud Computing Strategy
    Ma Yingrui
    [J]. MECHATRONICS ENGINEERING, COMPUTING AND INFORMATION TECHNOLOGY, 2014, 556-562 : 6196 - 6198
  • [8] Research on Cloud Computing and Network Security in Digital Manufacturing Platform
    Chang, Zhenyun
    Zhao, Yuling
    Qian, Dongmei
    Wang, Ning
    [J]. GREEN POWER, MATERIALS AND MANUFACTURING TECHNOLOGY AND APPLICATIONS III, PTS 1 AND 2, 2014, 484-485 : 219 - 222
  • [9] Research of Library Information Security Based on Cloud Computing Platform
    Yang Fangjing
    Liu Yinhong
    Chen Xinyan
    Zhang Ronghui
    [J]. PROCEEDINGS OF THE 2018 4TH INTERNATIONAL CONFERENCE ON SOCIAL SCIENCE AND HIGHER EDUCATION (ICSSHE 2018), 2018, 181 : 776 - 780
  • [10] SMEs' Perception of Cloud Computing: Potential and Security
    Sahandi, Reza
    Alkhalil, Adel
    Opara-Martins, Justice
    [J]. COLLABORATIVE NETWORKS IN THE INTERNET OF SERVICES, 2012, 380 : 186 - +