Network Data Encryption Strategy for Cloud Computing

被引:2
作者
Chang Xue-zhou [1 ]
机构
[1] Shijiazhuang Inst Railway Technol, Shijiazhuang 050000, Hebei, Peoples R China
来源
2015 SEVENTH INTERNATIONAL CONFERENCE ON MEASURING TECHNOLOGY AND MECHATRONICS AUTOMATION (ICMTMA 2015) | 2015年
关键词
cloud computing; encryption; HMAC; secret key; DES; RSA;
D O I
10.1109/ICMTMA.2015.172
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
According to the security problems that may exist when the users transport the sensitive data on the network, this paper tries to optimize and specify the user's encryption processing for the sensitive data. Then we propose a strategy using double encryption technology, and combined with the check of messages technology, to ensure that the users' data transport safe and effective. The client generates symmetric key and message digest, and set them add behind the message encrypted transmission together. It ensures that the user data be security and integrity. It also uses the double encryption technology to encrypt symmetric key once again, which ensures the security of key transmission. Experiments show that improvement program technology not only ensures the message security of the transmission and the security distribution of keys, but also it doesn't reduce the efficiency of encryption and decryption data.
引用
收藏
页码:693 / 697
页数:5
相关论文
共 10 条
  • [1] Hu Yan, 2013, CLOUD COMPUTING DATA, V2, P212
  • [2] A strengthening plan for enterprise information security based on cloud computing
    Kang, An Na
    Barolli, Leonard
    Park, Jong Hyuk
    Jeong, Young-Sik
    [J]. CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2014, 17 (03): : 703 - 710
  • [3] Manjusha R., 2014, 2014 International Conference on Embedded Systems (ICES), P116, DOI 10.1109/EmbeddedSys.2014.6953101
  • [4] Hybrid encryption algorithms in cloud computing
    Guo, Ping
    Su, Liping
    Ning, Lijiang
    Dan, Guangxiang
    [J]. Information Technology Journal, 2013, 12 (14) : 3015 - 3019
  • [5] Data and infrastructure security auditing in cloud computing environments
    Rasheed, Hassan
    [J]. INTERNATIONAL JOURNAL OF INFORMATION MANAGEMENT, 2014, 34 (03) : 364 - 368
  • [6] An innovative encryption method for agriculture intelligent information system based on cloud computing platform
    Tan, Wen Xue
    Zhao, Chun Jiang
    Wu, Hua Rui
    Wang, Xi Ping
    [J]. Journal of Software, 2014, 9 (01) : 1 - 10
  • [7] WU Xudong, 2011, NETINFO SECURITY, V9, P18
  • [8] Xiong Lizhi, NCURRENCY COMPUTAT, V20, P105
  • [9] Xu Lwi, 2012, VALUE ENG, V9, P20
  • [10] ZHANG Wenke, 2012, INFORM SECURITY COMM, V11, P38