Proceedings of the 2015 5th International Conference on Computer Sciences and Automation Engineering

Research on Data Security and Protection Technology under Cloud Environment

Authors
Qi Xu, Yuangen Xu, Yong Li
Corresponding Author
Qi Xu
Available Online February 2016.
DOI
10.2991/iccsae-15.2016.188How to use a DOI?
Keywords
Cloud Computing, Data Security, Protection Technique
Abstract

With the rapid and bursting development of computational science and data engineering related techniques, the transmission and protection of data is crucial in the computer science community. Cloud computing is becoming increasingly important for provision of services and storage of data in the Internet. However there are several significant challenges in securing cloud infrastructures from different types of attacks. The focus of this article is to cloud providers can provide security services infrastructure, its customers (tenant) to offset these attacks. Our main contribution is the security architecture which provides a flexible security as a service model, cloud providers can provide the tenant, tenant's customers. Our security as a service model while offering a baseline security to the provider to protect its own cloud infrastructure also provides flexibility to tenants to have additional security functionalities that suit their security requirements. In this paper, we generally describe the design and implementation of the security architecture. The experimental analysis illustrates the effectiveness of our proposed technique.

Copyright
© 2016, the Authors. Published by Atlantis Press.
Open Access
This is an open access article distributed under the CC BY-NC license (http://creativecommons.org/licenses/by-nc/4.0/).

Download article (PDF)

Volume Title
Proceedings of the 2015 5th International Conference on Computer Sciences and Automation Engineering
Series
Advances in Computer Science Research
Publication Date
February 2016
ISBN
10.2991/iccsae-15.2016.188
ISSN
2352-538X
DOI
10.2991/iccsae-15.2016.188How to use a DOI?
Copyright
© 2016, the Authors. Published by Atlantis Press.
Open Access
This is an open access article distributed under the CC BY-NC license (http://creativecommons.org/licenses/by-nc/4.0/).

Cite this article

TY  - CONF
AU  - Qi Xu
AU  - Yuangen Xu
AU  - Yong Li
PY  - 2016/02
DA  - 2016/02
TI  - Research on Data Security and Protection Technology under Cloud Environment
BT  - Proceedings of the 2015 5th International Conference on Computer Sciences and Automation Engineering
PB  - Atlantis Press
SP  - 1016
EP  - 1020
SN  - 2352-538X
UR  - https://doi.org/10.2991/iccsae-15.2016.188
DO  - 10.2991/iccsae-15.2016.188
ID  - Xu2016/02
ER  -