Proceedings of the 2016 International Conference on Communications, Information Management and Network Security
Session: Cloud Computing and Cloud Security
7 articles
Proceedings Article
Factor Analysis on Enterprises Adopting Cloud Computing
Hsin-Pin Fu, Tien-Hsiang Chang, Tsung-Sheng Chang, Li-Chun Liu
To enhance the successful rate of enterprises adopting cloud computing, understanding factors influencing enterprises adopting cloud computing is important. Therefore, this study collects the factors affecting the use of the cloud computing service from literature review to establish a three-layer hierarchy...
Proceedings Article
Ciphertext Query Method Based on Multi-Attribute Keywords
Haoyu Li, Longjun Zhang, Qingpeng Li, Zhiqiang Gao
Following the widespread application of cloud computing, many users outsource local data to cloud server. Users encrypt their data before outsourcing makes the traditional query method failure. Aiming at the problem of slow query speed and low accuracy of ciphertext query, an improved ciphertext query...
Proceedings Article
The Construction of Power Cloud Integrated with Heterogeneous Application Service Systems
Ling Zheng, Jiangang Yao
As the smart grid develops rapidly in China, modern power system has been turning into an information system with massive and heterogeneous data. In this paper, the integration of heterogeneous service software and internet-of-things application platforms has been proposed to build private cloud for...
Proceedings Article
Improved Fully Homomorphic Encryption Algorithm for Cloud Storage
Renyuan Hu, Longjun Zhang, Yongzhen Qin
Fully homomorphic encryption has important applications in cloud storage, the cipher text retrieval and other aspects. In order to get a better fully homomorphic encryption scheme for cloud storage, an improved fully homomorphic encryption (FHE) scheme based on DGHV scheme is proposed by analyzing and...
Proceedings Article
Research on Construction of E-Government Cloud under the Background of Internet Plus
Wei Wang, Bo Liu, Gang Li
Duplication of investment, redundant construction, and the waste of resources has been the outstanding problems of construction of the domestic E-government, as the rapid development and the thorough application of the cloud computing which represent a new generation of information technology, the field...
Proceedings Article
Cloud Data Life Cycle Security Issues and Research of Encryption Technology
Nengneng Li, Yongsheng Zhang, Yueqin Fan, Liang Chang
With the further development of the cloud computing, the security of the cloud computing is becoming increasingly prominent. Based on analyzing the development status of cloud computing, this article will focus on studying the security of cloud computing in data, and discuss the data security problems...
Proceedings Article
Browser Identification Based on Encrypted Traffic
Changjiang Liu, Jiesi Han, Qiang Wei
Network traffic encryption brings security to network communication, however it also brings challenges to network monitoring. As more and more major websites use encryption protocol to protect imformation of visitors, it is a burning issue to identify client when session is encrypted. In this paper,...