Proceedings of the The 1st International Workshop on Cloud Computing and Information Security

+ Advanced search
126 articles
Proceedings Article

The Research on Information Collection and Retrieval Technology of Big Data based Cloud Computing

Chen Hongjun, Huang Kun
Abstract— with the rapid development of cloud computing, information shows explosive growth. The Cheap cloud storage and computing power, also contributed to the generation and applications of big data. The big data is unstructured data more than 50%, so much of them are stored as files in the file system....
Proceedings Article

Optimizing Live Migration of Virtual Machines with Context Based Prediction Algorithm

Cui Yong, Lin Yusong, Guo Yi, Li Runzhi, Wang Zongmin
With the increasing use of Virtual Machine (VM) in data center, live migration of virtual machine has become a powerful and essential instrument for resource management. Although the prevailing Pre-copy algorithm might perform well on the stage of lightweight, it cannot guarantee a desirable performance...
Proceedings Article

A Design and Application of Tilt Angle Algorithm Based on the 3-axis Acceleration Sensor

Wu Xianzhen, Wu Zejun, Zhao Boya, Wang Mingjiang
This article proposes an algorithm for detecting the direction and the magnitude of the tilt angle based on BMA 150—a 3-axis acceleration sensor, and a page-turning function in Android daily application software is implemented based on this algorithm. This paper firstly introduces the architecture of...
Proceedings Article

Security and Strategies in Air Logistics Based on Cloud Computing

Zhao Ming, Wu Jing
In this paper, firstly, we analyze and design an air logistics system based on Cloud Computing platform. As Cloud Computing referred to both the applications delivered as services over the Internet and the infrastructures that provide those services, secondly, we present the security and privacy issues...
Proceedings Article

TCPI: A Novel Method of Encrypted Page Identification

Xia Wei, Yuan Zhenlong, Xue Yibo
Encrypted Page Identification (EPI) has been increasingly attracted much attention in recent years. Traditional methods now face challenges due to the emergence and development of HTTPS and Cloud Computing. To address this issue, we analyze HTTPS communication mechanism and present algorithm of Calculation...
Proceedings Article

The Design and Realization of the Test Scheme OpenVPN, Based on Message Simulation

Zhan-sheng Hou, Min Xu, Li-peng Zhu, Lin Peng, Bin Hu
This paper studied the SSL protocol and the principle of OpenVPN, proposed a hardware-based encryption access system OpenVPN, which drawn the block diagram of design structure, In view of the problem of OpenVPN concurrent test, general concurrent test based on the recording and playback mechanism, constitute...
Proceedings Article

Digital image watermarking in power system security

Ping Xie, Xi Wang, Ying Wang, Jiehui Liu
In this paper, the digital image watermarking algorithm based on lifting scheme wavelet transform and singular value decomposition (SDV) is proposed and performed on the transmission of the electricity price.It scrambles electricity price to get a set of random watermark signal sequence, uses the ideas...
Proceedings Article

The Feasibility Study of Building Sharing, Premium Teaching Repository Based on Cloud Computing

Nie Jing
The construction of sharing, premium teaching repository is an important constituent part in the development of both the Chinese Universities’ quality engineering and key higher vocational colleges. Given the status quo of the application of cloud computing in informatization development of higher education,...
Proceedings Article

Based on PSO cloud computing service discovering

Jia jie Shen, Zhi yun Chen
Aiming to problem how to discover service which user wants in cloud computing situation, using method of modeling and theoretical analysis, an improved PSO (particle swarm optimization) algorithm is designed to handle this problem. Though theoretical derivation, the correctness of improved PSO algorithm...
Proceedings Article

Research on the Model for Cloud Security Based on SLA

Tang Guo-Chun, Wu Yan-Ping
The cloud computing applications brings a new set of information security problems. The cloud security model based on SLA (Service Level Agreement) was studied. From the security challenges of cloud computing , cloud computing security threats was analyzed comprehensively, the service level agreements...
Proceedings Article

Study on Similarity Compute and File Filtering Based on Cloud Computing Method

Yuanyuan Ma, Bo Zhang, Yufei Wang
Text similarity computing has been widely used in confidential document filtering to enhance the safety of an enterprise information system. And the accuracy rate and performance of the similarity computing has always been the crucial problem in the research of document filtering. With the approaching...
Proceedings Article

Data Deduplication in Cloud Computing Systems

Shang Yingdan, Li Huiba
Cloud computing is a paradigm shift in the Internet technology. Data deduplication can save storage space and reduce the amount of bandwidth of data transfer. There always exists a trade-off between deduplcation efficiency and system performance since data deduplication also brings high system overhead....
Proceedings Article

TEM: A Novel Measurement Method for Java Applications on demand in Cloud Computing

Ba Haihe, Mei Songzhu, Ren Jiangchun, Wang Zhiying
While Cloud computing brings much convenience to companies; it also produces many a threat to information security. TEM is a Java-based architecture that gives strong safety guarantees to high-assurance Java applications in cloud computing. TEM advances the state of the art in Java Virtual Machine in...
Proceedings Article

Research on the Performance of Encryption Techniques for High-Bandwidth Multicast Video Streaming

Li Shanxi, Chen Wenbo, Shang Zhihao
Recently, high-bandwidth streaming media security is becoming more important to the continuous increase of the wide application of multimedia and the improvement of image processing on the internet. However the tradition data encryption solutions are not appropriate for such a high-bandwidth streaming...
Proceedings Article

An Improved Scheme for Range Queries on Encrypted Data

Xiong Ye, Gu Dawu, Lu Haining
With the prevalence of cloud computing, more and more data are outsourced to the untrusted cloud servers, which raises a security issue that how can data owners ensure the privacy of their data in cloud. A straightforward way is to encrypt the data before uploading, but it will face new challenge when...
Proceedings Article

The digital library cloud storage based on Hadoop

Ge Shen, Wang Hongbo, Wang Yufei, Lu Chen
This paper studies analyzes the relevant theories of library digital resource storage for its needs and characteristics, and constructs the digital model based on a"cloud storage" library, and makes an experiment and demonstration of the library "cloud storage" architecture model , at last deals with...
Proceedings Article

Research on the Vulnerability of MIMO Secrecy using AN Matrix Blind Space Elimination

Chen Xiao, Zhu Yan, Yin Xinxing, Li Fangbiao, Xue Zhi, Zhou Yongkai, Pang Liang
The security problem of Gaussian MIMO (multiple-inputs multiple-outputs) channel is considered where a transmitter is communicating to a receiver in the presence of an eavesdropper. All the nodes are equipped with multiple antennas. Through utilizing some of the available power to produce ‘artificial...
Proceedings Article

Analysis of Privacy Preserving for Big Data in the Environment of Power Systems

Ye Yun, Yang Wei, Lin Wei-min, Zhang Tao
As the development of Smart Grid deeply progressing, the data in power systems grows extremely fast. Information security has become a very important support for smart grid’s safely and stably operation. To build unified, reasonable, safe and efficient information facilities is necessary for safeguarding...
Proceedings Article

Initially Cognitive Computation with Self-Organization Strategy for Securely Humanized Human-Machine Interactions

Z.-Z. Liu Charles
This brief paper addresses the issue of human machine interaction with consideration of security and humanization both. Initially Cognitive Computation (ICC) has been proposed and described with an illustration combining with a surveillance ICC framework with its application scene and process. Considering...
Proceedings Article

Research and application of the location information in the intelligent transportation

Wang Junhan, Qiao Fei, Lu Jianfeng
the traffic system is becoming quite complicated due to the increasing of roads and vehicles. Many countries realized Intelligent Transport Systems to make better use of existing transport resources. As Intelligent Transport Systems has mass traffic information data, it is a worthy study problem that...
Proceedings Article

The Applied Research on the Virtualization Technology in Cloud Computing

Huang Kun, Chen Hongjun
Cloud computing is emerging as a new business model, it continues to be researched and practiced with. And the virtualization technology is the foundation to achieve cloud computing resource isomerism, pooling and on-demand services. The paper discusses the cloud computing virtualization technology:...
Proceedings Article

Mimicking User Keystrokes to Detect Keyloggers with Dendritic Cell Algorithm

Fu Jun, Yang Huan, Liang Yiwen, Tan Chengyu
Evasive software keyloggers hide their malicious behaviors to defeat run-time detection. In this paper, based on the analysis of the evasion mechanisms used by common software keyloggers, we established a framework for their detection. Mimicking user keystrokes, the framework we built could induce keyloggers...
Proceedings Article

Vulnerability Mining Techniques in Android Platform

Zhang Wei, Cao Chengzhi, Liu Wenqing, Jin Yiran
Android is a mainstream smart phone platform. Vulnerability mining work in android platform has become one of the most careful subjects in information security field. This paper combined the vulnerability mining research results of traditional PC platform with the features of android platform to analyze...
Proceedings Article

A replica pre-placement strategy based on correlation analysis in cloud environment

Wu Shaochun, Shuai Xiang, Chen Liang, Ye Ling, Yuan Bowen
Currently, The data placement of cloud storage environment encounters some problems. Based on analyzing the requests of upload files of users, we can dig out the relevance of files. For the purpose of increasing the efficiency of data access, we try to place the relevant files to the nodes that users...
Proceedings Article

A Lightweight Inter-domain Direct Anonymous Attestation Scheme for Machine-to-Machine Networks

Chen Liquan, Hu Aiqun, Huang Jie, Virkki Johanna
As an important application mode of Internet of Things, Machine-to-Machine (M2M) networks have gained more and more concerns. However, the security problems such as privacy protection and platform authentication in M2M networks are not fulfilled the requirements yet. Since the M2M devices are always...
Proceedings Article

Data Replica Placement in Cloud Storage System

Tao Zhang
As a main applicational way of cloud computing, cloud storage system can provide highly available data services. And data replicas replacement strategy has played a significant role in a cloud storage system. Data replicas placement strategy has been discussed in this paper, and a heuristic method of...