Research on Security Portocol of Scheduled Services on Cloud Computing

被引:0
|
作者
Li Yang [1 ]
Chen Xiang [1 ]
Lu Xiao-ying [2 ]
Xing Ya-lin [2 ]
Li Cheng-bin [3 ]
机构
[1] Hangzhou Normal Univ, Hangzhou Inst Serv Engn, Ctr Serv Engn, Hangzhou, Zhejiang, Peoples R China
[2] Zhejiang Prov Commun Ind Serv Co, Network Technol Branch, Market Management Dept, Hangzhou, Zhejiang, Peoples R China
[3] Shenyang Normal Univ, Educ Tech Coll, Shenyang, Peoples R China
关键词
cloudy; encryption; authentication; security;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
With the large growth of wireless sensor network, the current security architecture couldn't solve the problems. This paper provides a security protocol of scheduled service based on cloud computing. The system is consisted of three groups that are domain server domain register server domain and functional server domain. The system encrypts the server address by disconnected message. Then two algorithms are proposed for dynamic key change when system should recalculate the login key. At last, the performance loss is measured for above algorithms. Meanwhile, the improvement of system is discussed by experiment results.
引用
收藏
页数:5
相关论文
共 50 条
  • [41] Research on Smart Security Wristband based on Cloud Services
    Fang, Chen
    Zhou Jingjing
    2019 4TH INTERNATIONAL WORKSHOP ON MATERIALS ENGINEERING AND COMPUTER SCIENCES (IWMECS 2019), 2019, : 452 - 456
  • [42] Security in cloud computing
    International Journal of Information Security, 2014, 13 : 95 - 96
  • [43] Security for Cloud Computing
    Nazeer, Shahrin A.
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2020, 20 (07): : 51 - 60
  • [44] On Cloud Computing Security
    Bai, Yun
    Policarpio, Sean
    RECENT TRENDS IN WIRELESS AND MOBILE NETWORKS, 2011, 162 : 388 - 396
  • [45] Cloud Computing Security
    Carlin, Sean
    Curran, Kevin
    INTERNATIONAL JOURNAL OF AMBIENT COMPUTING AND INTELLIGENCE, 2011, 3 (01) : 14 - 19
  • [46] Security in Cloud Computing
    Rishitha
    Reshmi, T. R.
    PROCEEDINGS OF THE 2018 INTERNATIONAL CONFERENCE ON RECENT TRENDS IN ADVANCED COMPUTING (ICRTAC-CPS 2018), 2018, : 14 - 20
  • [47] Security in cloud computing
    Gritzalis, Stefanos
    Mitchell, Chris
    Thuraisingham, Bhavani
    Zhou, Jianying
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2014, 13 (02) : 95 - 96
  • [48] Security in Cloud Computing
    Sharma, Vani Dayal
    Agarwai, Somya
    Moin, Syeda Shira
    Qadeer, Mohammed Abdul
    2017 7TH INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS AND NETWORK TECHNOLOGIES (CSNT), 2017, : 234 - 239
  • [49] Evaluating Security and Privacy in Cloud Computing Services: A Stakeholder's Perspective
    Abuhussein, Abdullah
    Bedi, Harkeerat
    Shiva, Sajjan
    2012 INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS, 2012, : 388 - 395
  • [50] Cloud Computing: Models, Services, Utility, Advantages, Security Issues, and Prototype
    Nwobodo, Ikechukwu
    WIRELESS COMMUNICATIONS, NETWORKING AND APPLICATIONS, WCNA 2014, 2016, 348 : 1207 - 1222