Simulation Research on Dynamic Security Model of Information System in Cloud Computing Environment

2014 ◽  
Vol 602-605 ◽  
pp. 3285-3290
Author(s):  
Si Ping Liu

Cloud computing can dynamically allocate the software or hardware resource and information resource in accordance with the needs of different computer users, so as to expand the virtual resources of computer, but data information exists a big security risk in the process of data parallel calculation or the data sharing, so it needs to carry out the risk assessment on the security of signal. In cloud computing, this paper introduces the second-order difference quotient calculation principle in the model of information risk assessment that has accelerated the speed of information risk assessment, and adopts second order linear security authentication model that has strengthened the security of the cloud computing. In order to verify the validity and reliability of the model, this paper uses C program language to design the algorithm and inspects the cloud data with possible existing risk, and then it obtains the deviation curve of numerical calculation and theoretical value, which provides the technical reference for the research of cloud information security technology.

Author(s):  
Prasanta K. Manohari ◽  
Niranjan K. Ray

Cloud computing is one of the emerging technology in the recent times which has varieties of applications at different fields. It is an Internet dependent technology and it store and maintain the data in a cloud data center. Cloud center usually supports more numbers of user, applications and data. In the same time, it also suffered with numerous challenges. Security is a key requirement for cloud data center. Different security mechanisms are proposed for cloud computing environment. In this chapter, we address the background of cloud computing, security risk, requirements, issues, and some of the security techniques are discussed. We discuss different security issues and focus on some existing solutions.


2018 ◽  
Vol 24 (1) ◽  
pp. 739-743 ◽  
Author(s):  
Ganthan Narayana Samy ◽  
Bharanidharan Shanmugam ◽  
Nurazean Maarop ◽  
Pritheega Magalingam ◽  
Sundresan Perumal ◽  
...  

2014 ◽  
Vol 7 (11) ◽  
pp. 2114-2124 ◽  
Author(s):  
Sameer Hasan Albakri ◽  
Bharanidharan Shanmugam ◽  
Ganthan Narayana Samy ◽  
Norbik Bashah Idris ◽  
Azuan Ahmed

2014 ◽  
Vol 610 ◽  
pp. 707-711
Author(s):  
Chen Li ◽  
Zheng Tao Jiang ◽  
Xiao Li Huang

Cloud computing is an emerging technology, which has been the focus of the world since its birth. It is bound to bring tremendous and far-reaching changes to the field of information technology with its development. Because of its wide development space and huge appreciation potential, media cloud, as a branch of cloud computing, has become a research hotpot in recent years. It has achieved some preliminary results. As the rapid development and application of cloud computing becoming more in-depth, the disadvantages of cloud computing in security and personal privacy protection is much more obvious, which hinders the popularity and improvement of cloud computing. Those problems also exist in Media Cloud. This paper will analyze the characteristics of current media cloud and security problems based on the existing research at first. Then we propose a security framework model to solve this problem. At last, we will analyze the architecture of media cloud and try to investigate the security model for media cloud.


2013 ◽  
Vol 756-759 ◽  
pp. 1469-1473
Author(s):  
Hong Chen

Cloud computing has recently gained tremendous momentum because of the potential for significant cost reduction and the increased operating efficiency in computing. However along with these benefits come added security challenges. In this paper, we recommend enterprises assess the security risk of the cloud computing, discuss the standard information security risk assessment method and process and propose an information security risk assessment framework for cloud computing environments.


2018 ◽  
pp. 27-53
Author(s):  
Prasanta K. Manohari ◽  
Niranjan K. Ray

Cloud computing is one of the emerging technology in the recent times which has varieties of applications at different fields. It is an Internet dependent technology and it store and maintain the data in a cloud data center. Cloud center usually supports more numbers of user, applications and data. In the same time, it also suffered with numerous challenges. Security is a key requirement for cloud data center. Different security mechanisms are proposed for cloud computing environment. In this chapter, we address the background of cloud computing, security risk, requirements, issues, and some of the security techniques are discussed. We discuss different security issues and focus on some existing solutions.


Sign in / Sign up

Export Citation Format

Share Document