Proceedings of the 1st International Conference on Information Technologies in Education and Learning

Research on Security Portocol of Scheduled Services on Cloud Computing

Authors
Yang Li, Xiang Chen, Xiaoying Lu, Yalin Xing, Chengbin Li
Corresponding Author
Yang Li
Available Online March 2016.
DOI
https://doi.org/10.2991/icitel-15.2016.17How to use a DOI?
Keywords
cloudy; encryption; authentication; security
Abstract
With the large growth of wireless sensor network, the current security architecture couldn't solve the problems. This paper provides a security protocol of scheduled service based on cloud computing. The system consists of three groups that are domain server domain register server domain and functional server domain. The system encrypts the server address by disconnected message. Then two algorithms are proposed for dynamic key change when system should re-calculate the login key. At last, the performance loss is measured for above algorithms. Then, the improvement of system is discussed by experiment results.
Open Access
This is an open access article distributed under the CC BY-NC license.

Download article (PDF)

Volume Title
Proceedings of the 1st International Conference on Information Technologies in Education and Learning
Series
Advances in Computer Science Research
Publication Date
March 2016
ISBN
978-94-6252-168-1
ISSN
2352-538X
DOI
https://doi.org/10.2991/icitel-15.2016.17How to use a DOI?
Open Access
This is an open access article distributed under the CC BY-NC license.

Cite this article

TY  - CONF
AU  - Yang Li
AU  - Xiang Chen
AU  - Xiaoying Lu
AU  - Yalin Xing
AU  - Chengbin Li
PY  - 2016/03
DA  - 2016/03
TI  - Research on Security Portocol of Scheduled Services on Cloud Computing
BT  - Proceedings of the 1st International Conference on Information Technologies in Education and Learning
PB  - Atlantis Press
SP  - 76
EP  - 80
SN  - 2352-538X
UR  - https://doi.org/10.2991/icitel-15.2016.17
DO  - https://doi.org/10.2991/icitel-15.2016.17
ID  - Li2016/03
ER  -