Data Security Strategy Based on Artificial Immune Algorithm for Cloud Computing

被引:0
|
作者
Chen Jinyin [1 ]
Yang Dongyong [1 ]
机构
[1] Zhejiang Univ Technol, Coll Informat Engn, Hangzhou 310023, Zhejiang, Peoples R China
来源
APPLIED MATHEMATICS & INFORMATION SCIENCES | 2013年 / 7卷
关键词
Data security; Artificial immune; Cloud computing; HDFS; Cloudsim;
D O I
暂无
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
With the fast development of cloud computing and its wide application, data security plays an important role in cloud computing. This paper brought up a novel data security strategy based on artificial immune algorithm on architecture of HDFS for cloud computing. Firstly, we explained the main factors influence data security in cloud environment. Then we introduce HDFS architecture, data security model and put forward an improved security model for cloud computing. In the third section, artificial immune algorithm related with negative selection and dynamic selection algorithm that adopted in our system and how they applied to cloud computing are depicted in detail. Finally simulations are taken by two steps. Former simulations are carried out to prove the performance of artificial immune algorithm brought up in this paper, the latter simulation are running on Cloudsim platform to testify that data security strategy based on artificial immune algorithm for cloud computing is efficient.
引用
收藏
页码:149 / 153
页数:5
相关论文
共 50 条
  • [21] A Data Security Framework for Cloud Computing Adoption: Mozambican Government Cloud Computing
    Vumo, Ambrosio Patricia
    Spillner, Josef
    Koepsell, Stefan
    PROCEEDINGS OF THE 18TH EUROPEAN CONFERENCE ON CYBER WARFARE AND SECURITY (ECCWS 2019), 2019, : 720 - 729
  • [22] Empirical Analysis of Security Enabled Cloud Computing Strategy Using Artificial Intelligence
    Tadeo, Diego Antonio Garcia
    John, S. Franklin
    Bhaumik, Ankan
    Neware, Rahul
    Yamsani, Nagendar
    Kapila, Dhiraj
    2021 INTERNATIONAL CONFERENCE ON COMPUTING SCIENCES (ICCS 2021), 2021, : 83 - 85
  • [23] DATA MINING ALGORITHM BASED ON CLOUD COMPUTING
    Hao, Y. J.
    LATIN AMERICAN APPLIED RESEARCH, 2018, 48 (04) : 281 - 285
  • [24] Research on the key technology of data security protection based on cloud computing
    Guo, Juan
    PROCEEDINGS OF THE 2015 3RD INTERNATIONAL CONFERENCE ON MACHINERY, MATERIALS AND INFORMATION TECHNOLOGY APPLICATIONS, 2015, 35 : 66 - 69
  • [25] Measuring Data Security for a Cloud Computing Service
    Shaikh, Rizwana A. R.
    Modak, Masooda M.
    2017 INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION, CONTROL AND AUTOMATION (ICCUBEA), 2017,
  • [26] The Research on Cloud computing data security mechanism
    Xu Xiaoping
    Yan Junhu
    Liu Lan
    ADVANCES IN MECHATRONICS, AUTOMATION AND APPLIED INFORMATION TECHNOLOGIES, PTS 1 AND 2, 2014, 846-847 : 1595 - 1599
  • [27] A Data Security Framework for Cloud Computing Services
    Bautista-Villalpando, Luis-Eduardo
    Abran, Alain
    COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2021, 37 (02): : 203 - 218
  • [28] Cloud Computing: Issues in Data Mobility and Security
    Mahmood, Zaigham
    Lallie, Harjinder Singh
    PROCEEDINGS OF THE SIXTH INTERNATIONAL CONFERENCE ON INTERNET AND WEB APPLICATIONS AND SERVICES (ICIW 2011), 2011, : 255 - 260
  • [29] Data Access Security in Cloud Computing: A Review
    Markandey, Anagha
    Dhamdhere, Prajakta
    Gajmal, Yogesh
    2018 INTERNATIONAL CONFERENCE ON COMPUTING, POWER AND COMMUNICATION TECHNOLOGIES (GUCON), 2018, : 633 - 636
  • [30] Data Security in Cloud Computing: Threats and Countermeasures
    Chen, Yi-Fan
    Suo, Hui
    Liu, Zhuo-Hua
    2016 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION SECURITY (CSIS 2016), 2016, : 181 - 185