Research on Cloud Safe Storage Evaluation Model from Perspective of Internet Finance

被引:0
作者
Hu Yanqiang [1 ]
机构
[1] Fudan Univ Management, Postdoctoral Res Ctr Management Sci & Engn, Fudan, Peoples R China
来源
INTERNATIONAL JOURNAL OF GRID AND DISTRIBUTED COMPUTING | 2016年 / 9卷 / 07期
关键词
Internet finance; Cloud security; Evaluation model; HDFS;
D O I
10.14257/ijgdc.2016.9.7.14
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Cloud storage plays a role of file management and store backups with characteristics of scalability and flexibility. With increment of the formation the clients store in the cloud, cloud safe storage from perspective of Internet finance becomes the hot spot in the current researches. This paper proposes the cloud safe storage evaluation model, builds the fuzzy math comprehensive evaluation system from perspective of Internet finance, and establishes evaluation matrix in order to calculate discrete assessment values based on expert evaluation mechanism. The product of the weight vector and the evaluation vector is considered the comprehensive evaluation results of cloud storage model finally by the evaluation model. Secondly, taking a comparable analysis on HDFS safety storage model, DES encryption cloud safety storage model and AES encryption cloud safety storage model that are based on encrypting, will then provide a theoretical direction for customers to select suitable storage service.
引用
收藏
页码:133 / 140
页数:8
相关论文
共 15 条
[1]  
Coron JS, 2011, LECT NOTES COMPUT SC, V6841, P487, DOI 10.1007/978-3-642-22792-9_28
[2]  
Frenzel Christoph, 2013, Theory, Practice, and Applications of Rules on the Web. 7th International Symposium, RuleML 2013. Proceedings. LNCS 8035, P84, DOI 10.1007/978-3-642-39617-5_11
[3]   Fully Homomorphic Encryption without Squashing Using Depth-3 Arithmetic Circuits [J].
Gentry, Craig ;
Halevi, Shai .
2011 IEEE 52ND ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE (FOCS 2011), 2011, :107-116
[4]   Fully Homomorphic Encryption Using Ideal Lattices [J].
Gentry, Craig .
STOC'09: PROCEEDINGS OF THE 2009 ACM SYMPOSIUM ON THEORY OF COMPUTING, 2009, :169-178
[5]  
Hamdi M., 2012, 2012 International Conference on Collaboration Technologies and Systems (CTS), P1, DOI 10.1109/CTS.2012.6261019
[6]  
Kim J., 2013, IACR CRYPTOLOGY EPRI, V2013, P57
[7]  
Lei F, 2010, CLOUD COMPUTING APPL, P388
[8]  
Mansor A A, 2014, INT J INNOV COMPUT I, V4, P41
[9]  
Mather Tim, 2011, CLOUD SECURITY PRIVA
[10]  
Mell P., 2011, NIST SPECIAL PUBLICA, V800-145