Proceedings of the 2016 International Conference on Communications, Information Management and Network Security

Session: Cloud Computing and Cloud Security

7 articles
Proceedings Article

Factor Analysis on Enterprises Adopting Cloud Computing

Hsin-Pin Fu, Tien-Hsiang Chang, Tsung-Sheng Chang, Li-Chun Liu
To enhance the successful rate of enterprises adopting cloud computing, understanding factors influencing enterprises adopting cloud computing is important. Therefore, this study collects the factors affecting the use of the cloud computing service from literature review to establish a three-layer hierarchy...
Proceedings Article

Ciphertext Query Method Based on Multi-Attribute Keywords

Haoyu Li, Longjun Zhang, Qingpeng Li, Zhiqiang Gao
Following the widespread application of cloud computing, many users outsource local data to cloud server. Users encrypt their data before outsourcing makes the traditional query method failure. Aiming at the problem of slow query speed and low accuracy of ciphertext query, an improved ciphertext query...
Proceedings Article

The Construction of Power Cloud Integrated with Heterogeneous Application Service Systems

Ling Zheng, Jiangang Yao
As the smart grid develops rapidly in China, modern power system has been turning into an information system with massive and heterogeneous data. In this paper, the integration of heterogeneous service software and internet-of-things application platforms has been proposed to build private cloud for...
Proceedings Article

Improved Fully Homomorphic Encryption Algorithm for Cloud Storage

Renyuan Hu, Longjun Zhang, Yongzhen Qin
Fully homomorphic encryption has important applications in cloud storage, the cipher text retrieval and other aspects. In order to get a better fully homomorphic encryption scheme for cloud storage, an improved fully homomorphic encryption (FHE) scheme based on DGHV scheme is proposed by analyzing and...
Proceedings Article

Research on Construction of E-Government Cloud under the Background of Internet Plus

Wei Wang, Bo Liu, Gang Li
Duplication of investment, redundant construction, and the waste of resources has been the outstanding problems of construction of the domestic E-government, as the rapid development and the thorough application of the cloud computing which represent a new generation of information technology, the field...
Proceedings Article

Cloud Data Life Cycle Security Issues and Research of Encryption Technology

Nengneng Li, Yongsheng Zhang, Yueqin Fan, Liang Chang
With the further development of the cloud computing, the security of the cloud computing is becoming increasingly prominent. Based on analyzing the development status of cloud computing, this article will focus on studying the security of cloud computing in data, and discuss the data security problems...
Proceedings Article

Browser Identification Based on Encrypted Traffic

Changjiang Liu, Jiesi Han, Qiang Wei
Network traffic encryption brings security to network communication, however it also brings challenges to network monitoring. As more and more major websites use encryption protocol to protect imformation of visitors, it is a burning issue to identify client when session is encrypted. In this paper,...