Data Security Strategy Based on Artificial Immune Algorithm for Cloud Computing

被引:0
|
作者
Chen Jinyin [1 ]
Yang Dongyong [1 ]
机构
[1] Zhejiang Univ Technol, Coll Informat Engn, Hangzhou 310023, Zhejiang, Peoples R China
来源
APPLIED MATHEMATICS & INFORMATION SCIENCES | 2013年 / 7卷
关键词
Data security; Artificial immune; Cloud computing; HDFS; Cloudsim;
D O I
暂无
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
With the fast development of cloud computing and its wide application, data security plays an important role in cloud computing. This paper brought up a novel data security strategy based on artificial immune algorithm on architecture of HDFS for cloud computing. Firstly, we explained the main factors influence data security in cloud environment. Then we introduce HDFS architecture, data security model and put forward an improved security model for cloud computing. In the third section, artificial immune algorithm related with negative selection and dynamic selection algorithm that adopted in our system and how they applied to cloud computing are depicted in detail. Finally simulations are taken by two steps. Former simulations are carried out to prove the performance of artificial immune algorithm brought up in this paper, the latter simulation are running on Cloudsim platform to testify that data security strategy based on artificial immune algorithm for cloud computing is efficient.
引用
收藏
页码:149 / 153
页数:5
相关论文
共 50 条
  • [1] Study on Strategy of Cloud Computing Data Storage Security
    Liu, Sha
    Zhu, Shuhua
    PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON MATERIALS ENGINEERING AND INFORMATION TECHNOLOGY APPLICATIONS, 2015, 28 : 64 - 67
  • [2] Adaptive Artificial Bee Colony Algorithm-Based Enhancement of Data Security in Cloud Computing
    Geetha J.S.
    SN Computer Science, 5 (1)
  • [3] Cloud Computing Security Evaluation Based on Multidimensional Immune Algorithm (MIA)
    Wang, Xiaoyu
    Wang, Heng
    2023 3RD ASIA-PACIFIC CONFERENCE ON COMMUNICATIONS TECHNOLOGY AND COMPUTER SCIENCE, ACCTCS, 2023, : 246 - 250
  • [4] Study of Data Security Based On Cloud Computing
    Wang, Honghua
    PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION APPLICATIONS (ICCIA 2012), 2012, : 1609 - 1611
  • [5] Data Security in Cloud Computing
    Sathyanarayana, T. V.
    Sheela, L. Mary Immaculate
    2013 INTERNATIONAL CONFERENCE ON GREEN COMPUTING, COMMUNICATION AND CONSERVATION OF ENERGY (ICGCE), 2013, : 822 - 827
  • [6] Data Security in Cloud Computing
    Albugmi, Ahmed
    Alassafi, Madini O.
    Walters, Robert
    Wills, Gary
    2016 FIFTH INTERNATIONAL CONFERENCE ON FUTURE COMMUNICATION TECHNOLOGIES (FGCT), 2016, : 55 - 59
  • [7] Data security in cloud computing
    Meng, Du
    PROCEEDINGS OF THE 2013 8TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE & EDUCATION (ICCSE 2013), 2013, : 810 - 813
  • [8] The Research of Data Security Mechanism Based on Cloud Computing
    Guo, Changyou
    Zheng, Xuefeng
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (03): : 363 - 370
  • [9] Security of Big Data Based on the Technology of Cloud Computing
    Zhou, Xiaojun
    Lin, Ping
    Li, Zhiyong
    Wang, Yunpeng
    Tan, Wei
    Huang, Meng
    2019 4TH INTERNATIONAL CONFERENCE ON MECHANICAL, CONTROL AND COMPUTER ENGINEERING (ICMCCE 2019), 2019, : 703 - 706
  • [10] A Data Placement Strategy Based on Genetic Algorithm in Cloud Computing Platform
    Guo, Wei
    Wang, Xinjun
    2013 10TH WEB INFORMATION SYSTEM AND APPLICATION CONFERENCE (WISA 2013), 2013, : 369 - 372