Data Security Strategy Based on Artificial Immune Algorithm for Cloud Computing

被引:0
|
作者
Chen Jinyin [1 ]
Yang Dongyong [1 ]
机构
[1] Zhejiang Univ Technol, Coll Informat Engn, Hangzhou 310023, Zhejiang, Peoples R China
来源
APPLIED MATHEMATICS & INFORMATION SCIENCES | 2013年 / 7卷
关键词
Data security; Artificial immune; Cloud computing; HDFS; Cloudsim;
D O I
暂无
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
With the fast development of cloud computing and its wide application, data security plays an important role in cloud computing. This paper brought up a novel data security strategy based on artificial immune algorithm on architecture of HDFS for cloud computing. Firstly, we explained the main factors influence data security in cloud environment. Then we introduce HDFS architecture, data security model and put forward an improved security model for cloud computing. In the third section, artificial immune algorithm related with negative selection and dynamic selection algorithm that adopted in our system and how they applied to cloud computing are depicted in detail. Finally simulations are taken by two steps. Former simulations are carried out to prove the performance of artificial immune algorithm brought up in this paper, the latter simulation are running on Cloudsim platform to testify that data security strategy based on artificial immune algorithm for cloud computing is efficient.
引用
收藏
页码:149 / 153
页数:5
相关论文
共 50 条
  • [41] CLOUD COMPUTING DATA SECURITY USING ENCRYPTION ALGORITHMS
    Rithvik, Kumar
    Kaur, Simran
    Sejwal, Shilpa
    Narwal, Priti
    Jain, Prateek
    IIOAB JOURNAL, 2019, 10 (02) : 75 - 82
  • [42] An Algorithm for Computing Efficiently in Cloud Based Data Centers
    Shah, Idris Afzal
    2018 FIRST INTERNATIONAL CONFERENCE ON SECURE CYBER COMPUTING AND COMMUNICATIONS (ICSCCC 2018), 2018, : 397 - 400
  • [43] Data Security in the World of Cloud Computing
    Kaufman, Lori M.
    IEEE SECURITY & PRIVACY, 2009, 7 (04) : 61 - 64
  • [44] A Security Model for the Enhancement of Data Privacy in Cloud Computing
    Sharma, Yoshita
    Gupta, Himanshu
    Khatri, Sunil Kumar
    PROCEEDINGS 2019 AMITY INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE (AICAI), 2019, : 898 - 902
  • [45] Research on Data Mining Algorithm Based on Cloud Computing
    Mai Xiao-Dong
    AGRO FOOD INDUSTRY HI-TECH, 2017, 28 (03): : 1752 - 1756
  • [46] Exploring Data Security Issues and Solutions in Cloud Computing
    Kumar, P. Ravi
    Raj, P. Herbert
    Jelciana, P.
    6TH INTERNATIONAL CONFERENCE ON SMART COMPUTING AND COMMUNICATIONS, 2018, 125 : 691 - 697
  • [47] An Algorithm to Enhance Data Integrity in Cloud Computing
    Mothlabeng, Moloko P.
    Mathonsi, Topside E.
    Muchenje, Tonderai
    Du Plessis, Deon P.
    2021 INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND COMPUTATIONAL INTELLIGENCE (CSCI 2021), 2021, : 418 - 424
  • [48] Data Security Issues in the Process of Applying Cloud Computing
    Wang, Kai
    Yang, Xia
    PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, KNOWLEDGE ENGINEERING AND INFORMATION ENGINEERING (SEKEIE 2014), 2014, 114 : 135 - 138
  • [49] Permanent Participatory Data Security in a Cloud Computing Environment
    El Ahrache, Sara Ibn
    Badir, Hassan
    Ghodous, Parisa
    Sbihi, Abderrahmane
    2016 4TH IEEE INTERNATIONAL COLLOQUIUM ON INFORMATION SCIENCE AND TECHNOLOGY (CIST), 2016, : 320 - 324
  • [50] Using data taxonomy to achieve security in cloud computing
    Ennajjar, Ibtissam
    Tabii, Youness
    Benkaddour, Abdelhamid
    INTERNATIONAL JOURNAL OF COMPUTER APPLICATIONS IN TECHNOLOGY, 2019, 60 (04) : 333 - 338