Proceedings of the 2015 International Symposium on Computers & Informatics

Research on the Optimal Design of Computing Security based on Cloud Computing

Authors
Fan Yang, Yutai Rao
Corresponding Author
Fan Yang
Available Online January 2015.
DOI
10.2991/isci-15.2015.57How to use a DOI?
Keywords
computing validation; cloud computing; Optimal Design
Abstract

This paper analyzes the current problems in the data security and privacy of cloud computing. On the basis, this paper mainly research about the legitimacy and validity of research cloud computing process. First of all, this paper understand the concept of cloud computing technology, according to the working principle of the structure model of the cloud computing service analyzes the existence of data security and privacy. Cloud computing service providers for cost savings, or application access layer has invasion of illegal users, so cloud computing task submitted by the legitimate user will not be executed or not executed completely, and the users will get that a random outcome, and task submitted by illegal users may be was carried out. Research on the remote computing verification problem, analysis of the existing research on security work, found that the existing calculation in advance and the second validation of remote computing method for cloud computing users spending too big, this paper combines the characteristics of cloud computing mass data processing, puts forward the remote computing verification method based on the third-party certification, efficient and low consumption to ensure security.

Copyright
© 2015, the Authors. Published by Atlantis Press.
Open Access
This is an open access article distributed under the CC BY-NC license (http://creativecommons.org/licenses/by-nc/4.0/).

Download article (PDF)

Volume Title
Proceedings of the 2015 International Symposium on Computers & Informatics
Series
Advances in Computer Science Research
Publication Date
January 2015
ISBN
10.2991/isci-15.2015.57
ISSN
2352-538X
DOI
10.2991/isci-15.2015.57How to use a DOI?
Copyright
© 2015, the Authors. Published by Atlantis Press.
Open Access
This is an open access article distributed under the CC BY-NC license (http://creativecommons.org/licenses/by-nc/4.0/).

Cite this article

TY  - CONF
AU  - Fan Yang
AU  - Yutai Rao
PY  - 2015/01
DA  - 2015/01
TI  - Research on the Optimal Design of Computing Security based on Cloud Computing
BT  - Proceedings of the 2015 International Symposium on Computers & Informatics
PB  - Atlantis Press
SP  - 421
EP  - 426
SN  - 2352-538X
UR  - https://doi.org/10.2991/isci-15.2015.57
DO  - 10.2991/isci-15.2015.57
ID  - Yang2015/01
ER  -