Research on Security Portocol of Scheduled Services on Cloud Computing
Yang Li, Xiang Chen, Xiaoying Lu, Yalin Xing, Chengbin Li
Available Online March 2016.
- https://doi.org/10.2991/icitel-15.2016.17How to use a DOI?
- cloudy; encryption; authentication; security
- With the large growth of wireless sensor network, the current security architecture couldn't solve the problems. This paper provides a security protocol of scheduled service based on cloud computing. The system consists of three groups that are domain server domain register server domain and functional server domain. The system encrypts the server address by disconnected message. Then two algorithms are proposed for dynamic key change when system should re-calculate the login key. At last, the performance loss is measured for above algorithms. Then, the improvement of system is discussed by experiment results.
- Open Access
- This is an open access article distributed under the CC BY-NC license.
Cite this article
TY - CONF AU - Yang Li AU - Xiang Chen AU - Xiaoying Lu AU - Yalin Xing AU - Chengbin Li PY - 2016/03 DA - 2016/03 TI - Research on Security Portocol of Scheduled Services on Cloud Computing BT - Proceedings of the 1st International Conference on Information Technologies in Education and Learning PB - Atlantis Press SP - 76 EP - 80 SN - 2352-538X UR - https://doi.org/10.2991/icitel-15.2016.17 DO - https://doi.org/10.2991/icitel-15.2016.17 ID - Li2016/03 ER -