The Study of Network Information System Security Strategy Based on Trusted Cloud Computing

2014 ◽  
Vol 571-572 ◽  
pp. 400-403
Author(s):  
Yan Fei Cao ◽  
Jun Ming Pan

This paper analyzed functions of the network information system based on trusted computing and trusted computing platform based on cloud computing. Raised the propose to expand the application of trusted computing technology to network information system, to meet the needs of cloud computing of trusted computing, trusted cloud computing, implement the trusted cloud computing. In our design, will take the Trusted Computing Platform (TCP) as the basis of cloud computing system, provide some important security functions to ensure the communication and data security.Finally put forward the implement methods.

2012 ◽  
Vol 532-533 ◽  
pp. 1064-1068
Author(s):  
Hui Hong Lu

In this paper, the application of Trusted Computing Platform is discussed. It is pointed out that the purpose of network management information system by trusted Computing platform is to set up a trusted network system. Based on the analysis of the environment of the trusted network information management system, we employ a trusted computing model in the information system of graduate student at our university. The implementation of network trusted management information system indicates that this method will improve the security of information system.


Author(s):  
Arumugam So Raman

This paper is documenting the potential of Fog Computing in Education. First, this study explores the difference between cloud computing and Fog Computing. Then the features of computing explained briefly. A tremendous increase in Internet usage among the people does not allow the sustainability to continue depending on Cloud Computing as a centralized web server, due to the truth that Cloud Computing system allows access to internet data as well as therefore making it feasible for users to availability, share along with store information in remote servers. With Fog Computing, multiple users, gadgets such as automobiles, wearable gizmos, sensing units, wise gadgets, an organization can accept one another utilizing their very own Fog facilities. In the educational sector, Fog computing technology boosts educational operations and provides a platform with agility, versus slowing them down or quitting them. Fog computing is a modern technology that is set for high development in the future, as well as will substantially improve day-to-day procedures for many sectors, including education. Finally, security issues and challenges of implementation Fog computing discussed.


2012 ◽  
Vol 170-173 ◽  
pp. 3390-3397
Author(s):  
Zhi Gang Si ◽  
Ying Wan ◽  
Yun Shuai Shi ◽  
Ping Li

Regional sharing in electronic medical records (EMR) system are the main problems that the system must face in the development. This paper comprehensive analyzes the existing secure sharing program of EMR, and based on it this paper proposes the program that uses the Trusted Computing technology to ensure the secure sharing of EMR. For ordinary computer can not build trusted computing platform, the embedded trusted system based on the USB interface is used to build trusted computing platform, and based on it this paper proposes the EMR secure sharing scheme based on the embedded trusted system.


2014 ◽  
Vol 687-691 ◽  
pp. 3062-3065
Author(s):  
Li Na Zhang ◽  
Bo Yang

Cloud computing system uses new technologies such as the models of shared services and virtualization. Therefore, the security issues of cloud computing are also different with other systems. In order to guarantee the security of information sharing and interaction, we need to study the security of agricultural information sharing platform in depth direction. This paper will study the security protection system of agricultural information platform based on Cloud Computing, and the data security strategy and the service security strategy of agricultural information sharing platform.


2013 ◽  
Vol 427-429 ◽  
pp. 2767-2770
Author(s):  
Hui Xia

Traditional appllications of deep packet inspection technology in the cloud is unscientific and unreasonable.In this paper,an intelligent cloud-cooperation framework of DPI is designed, given characteristics of cloud computing like distributed computing and user configurability. The overall efficiency is improved since it coordinates the configuration intelligently according to diversity of resources in the back end of cloud computing system and provides a scheduler for cooperative processing and defenses of repeated assaults. By comparing our design with traditional framework in virtual cloud computing platform, we prove the advantages of cloud-cooperation framework on space and time performance.


Sign in / Sign up

Export Citation Format

Share Document