Data Security Strategy Based on Artificial Immune Algorithm for Cloud Computing

被引:0
|
作者
Chen Jinyin [1 ]
Yang Dongyong [1 ]
机构
[1] Zhejiang Univ Technol, Coll Informat Engn, Hangzhou 310023, Zhejiang, Peoples R China
来源
APPLIED MATHEMATICS & INFORMATION SCIENCES | 2013年 / 7卷
关键词
Data security; Artificial immune; Cloud computing; HDFS; Cloudsim;
D O I
暂无
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
With the fast development of cloud computing and its wide application, data security plays an important role in cloud computing. This paper brought up a novel data security strategy based on artificial immune algorithm on architecture of HDFS for cloud computing. Firstly, we explained the main factors influence data security in cloud environment. Then we introduce HDFS architecture, data security model and put forward an improved security model for cloud computing. In the third section, artificial immune algorithm related with negative selection and dynamic selection algorithm that adopted in our system and how they applied to cloud computing are depicted in detail. Finally simulations are taken by two steps. Former simulations are carried out to prove the performance of artificial immune algorithm brought up in this paper, the latter simulation are running on Cloudsim platform to testify that data security strategy based on artificial immune algorithm for cloud computing is efficient.
引用
收藏
页码:149 / 153
页数:5
相关论文
共 50 条
  • [31] Homomorphic Encryption for Data Security in Cloud Computing
    Chauhan, Kamal Kumar
    Sanger, Amit K. S.
    Verma, Ajai
    2015 14TH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY (ICIT 2015), 2015, : 206 - 209
  • [32] Research on the Data Storage Security based on Cloud Computing
    Ma, Xinqiang
    Huang, Yi
    Zhang, Yongdan
    Liu, Youyuan
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON ADVANCES IN MECHANICAL ENGINEERING AND INDUSTRIAL INFORMATICS, 2015, 15 : 326 - 331
  • [33] Data Security and Privacy Protection of Cloud Computing
    Dai Xuebing
    Wang Zhaojing
    Zhang Yan
    ADVANCES IN MECHATRONICS, AUTOMATION AND APPLIED INFORMATION TECHNOLOGIES, PTS 1 AND 2, 2014, 846-847 : 1570 - +
  • [34] Using a Modified Approach of Blowfish Algorithm for Data Security in Cloud Computing
    Corpuz, Reynaldo R.
    Gerardo, Bobby D.
    Medina, Ruji P.
    PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: IOT AND SMART CITY (ICIT 2018), 2018, : 157 - 162
  • [35] Voiceprint recognition and cloud computing data network security based on scheduling joint optimisation algorithm
    Ma, Yinhui
    INTERNATIONAL JOURNAL OF GLOBAL ENERGY ISSUES, 2023, 45 (06) : 602 - 626
  • [36] Cloud Computing Resource Schedule Strategy Based on PSO Algorithm
    Xiong, Yingyidu
    Wu, Yanyan
    APPLIED SCIENCE, MATERIALS SCIENCE AND INFORMATION TECHNOLOGIES IN INDUSTRY, 2014, 513-517 : 1332 - 1336
  • [37] Research of Security Model and Cloud Computing Strategy
    Ma Yingrui
    MECHATRONICS ENGINEERING, COMPUTING AND INFORMATION TECHNOLOGY, 2014, 556-562 : 6196 - 6198
  • [38] New mechanism for Cloud Computing Storage Security Fragmentation-redundancy-scattering as security mechanism for Data Cloud Computing
    Ait El Mrabti, Almokhtar
    Ammari, Najim
    Abou El Kalam, Anas
    Ait Ouahman, Abdellah
    De Montfort, Mina
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2016, 7 (07) : 526 - 539
  • [39] A Survey of Data Security and Privacy Protection in Cloud Computing
    Yuan, Zhongbing
    Liu, Xiaojun
    PROCEEDINGS OF THE 2016 6TH INTERNATIONAL CONFERENCE ON MANAGEMENT, EDUCATION, INFORMATION AND CONTROL (MEICI 2016), 2016, 135 : 647 - 651
  • [40] Data Security and Privacy Information Challenges in Cloud Computing
    Kong, Weiwei
    Lei, Yang
    Ma, Jing
    2016 8TH INTERNATIONAL CONFERENCE ON INTELLIGENT NETWORKING AND COLLABORATIVE SYSTEMS (INCOS), 2016, : 512 - 514