Research on the Optimal Design of Computing Security based on Cloud Computing
- DOI
- 10.2991/isci-15.2015.57How to use a DOI?
- Keywords
- computing validation; cloud computing; Optimal Design
- Abstract
This paper analyzes the current problems in the data security and privacy of cloud computing. On the basis, this paper mainly research about the legitimacy and validity of research cloud computing process. First of all, this paper understand the concept of cloud computing technology, according to the working principle of the structure model of the cloud computing service analyzes the existence of data security and privacy. Cloud computing service providers for cost savings, or application access layer has invasion of illegal users, so cloud computing task submitted by the legitimate user will not be executed or not executed completely, and the users will get that a random outcome, and task submitted by illegal users may be was carried out. Research on the remote computing verification problem, analysis of the existing research on security work, found that the existing calculation in advance and the second validation of remote computing method for cloud computing users spending too big, this paper combines the characteristics of cloud computing mass data processing, puts forward the remote computing verification method based on the third-party certification, efficient and low consumption to ensure security.
- Copyright
- © 2015, the Authors. Published by Atlantis Press.
- Open Access
- This is an open access article distributed under the CC BY-NC license (http://creativecommons.org/licenses/by-nc/4.0/).
Cite this article
TY - CONF AU - Fan Yang AU - Yutai Rao PY - 2015/01 DA - 2015/01 TI - Research on the Optimal Design of Computing Security based on Cloud Computing BT - Proceedings of the 2015 International Symposium on Computers & Informatics PB - Atlantis Press SP - 421 EP - 426 SN - 2352-538X UR - https://doi.org/10.2991/isci-15.2015.57 DO - 10.2991/isci-15.2015.57 ID - Yang2015/01 ER -