Design of cloud-based log analysis system in Security management platform Chen Jie Yu Yonggang Liu Mingheng Pansheng and Tsui Hark security management Platform (SMP) is a technical support platform to realize the normal operation of security management, and it needs to deal with the mass log information from the security equipment in real time application. In order to solve the problem of inefficient mass log query in SMP, an SMP log storage analysis system based on cloud computing is designed. Based on Hive task transformation mode, using Hadoop architecture Distributed File system and MapReduce parallel programming ...
Public cloud storage privacy protection mechanism based on chaotic sequence Yewei Li Guiyang to realize the data privacy protection and key management in public cloud storage with low overhead, a public cloud storage privacy protection mechanism based on logistic chaotic sequence is proposed. According to the storage characteristics of the data in the cloud, a combination of one-dimensional, two-dimensional logistic chaotic system and data segmentation technology is used to provide different levels of intensity privacy protection through different key generation methods. Experimental results show that this method can effectively reduce the difficulty of key management while protecting the privacy of outsourced data. Based on chaotic sequence ...
Research on storage virtualization document encryption in cloud computing environment Zhang An with the development of network technology, especially the appearance of cloud computing, data documents will be changed from traditional local data to virtualized storage in cloud environment. In this process, the traditional data document encryption method will no longer apply to the cloud computing environment for document storage encryption. Therefore, it is necessary to put forward a new data encryption method suitable for virtual storage environment. In view of the characteristics of storage virtualization in cloud computing environment, it is proposed that the intelligent dynamic encryption and decryption will become the encryption and decryption method of the data document in the virtual storage environment.
If we look back, we will find that 2014 years is likely to be the year of the most significant security breaches ever reported. It can be said that the lawless elements have been armed to the teeth, but although many criminals at the technical level has indeed made great progress, but it seems to me that the real striking is that the existing security practices and technology could have prevented many such leaks. Many unfortunate companies are caught in a common trap, often referred to as "compliance is safe" mentality. This idea concludes that if the company does not leave ...
Cloud computing is now the darling of the IT world, but security concerns remain the reason why companies have been slow to adopt. These top security tips can help the IT team warm up quickly and become familiar with the technology. No one denies the benefits of cloud computing, flexibility, scalability and pay-for-use, but many are still debating whether it can provide a sufficiently secure environment for sensitive data. Cloud data security is a hot topic in the IT world; some people believe that the cloud is safer than the local environment, but the other side holds the opposite view. Given the complexity of the cloud, this security debate is not ...
Research on cloud computing security based on attribute encryption University Guo Lijun This paper analyzes the security problems existing in the Hadoop architecture and file sharing system, and puts forward the corresponding solutions with the attribute encryption algorithm. First of all, for the security problem of Hadoop architecture in cloud computing environment, this paper designs a complete set of solutions to solve the security problem with Cce-abe algorithm, and introduces the main idea, security hypothesis and the whole process of the security Hadoop architecture. Finally through the user to use K clothing ...
Ongoing data leaks are shaking confidence among businesses and consumers, as well as increasing security discussions in cloud computing. Rapid cloud computing deployments require organizations to protect sensitive data while maintaining application functionality. So what trends will drive the market in the coming months? Let's take a look at the 2015-year trend in the cloud Security market: 1. The evolution of private cloud is a popular choice for companies trying to harness the control, customization, and other advantages that cloud computing offers. However, as companies shift more operations and projects to cloud computing, hybrid clouds ...
The entanglement between Sony and hackers has evolved from a technical battle to an international dispute. To get Obama's attention and comment across the globe, Sony's experience has made everyone aware of the importance of information security. If the Snowden incident is a trigger for a renewed message security topic, then the attack by the Sony film Hacker is another wake-up call for us. There are concerns about information security that all businesses will have. International hacking is not a case, and as technology progresses, the battle between information security and hacker attacks never stops.
Cloud computing resources, storage resources and network resources gathered together to form a huge pool of shared virtual IT resources, while increasing usability, but also put security issues on the cusp. How to ensure the security of the cloud platform is a problem that all cloud builders need to face. Recently, Hefei in the industrial cloud Platform Security construction process, select the Wave SSR operating system security enhancement System ("Wave SSR") to strengthen the platform, effectively enhance the security of the cloud platform. Industrial cloud Platform for security to put forward high demand cloud computing is deeply changing the industry it ...
Using data mining algorithm to detect DDoS attacks in cloud computing Liboson DDoS attacks pose a great threat to the current network security, based on the analysis of the characteristics of DDoS attack in cloud computing, this paper designs a DDoS attack intrusion detection model on cloud computing. The Apriori algorithm is applied to the intrusion detection model with the K clustering algorithm. The experiment shows that the intrusion detection model based on data mining algorithm in cloud computing can detect DDoS attacks automatically and accurately in real time. Apply data mining algorithm to check ...
Cloud computing and Security China University of Science and Technology Xiong in recent years, cloud computing has become one of the hottest research directions in the IT industry. Almost all mainstream it vendors are talking about cloud computing, including hardware vendors (IBM, Intel, etc.), software developers (Microsoft, etc.), and Internet service providers (Google, Amazon, etc.) and telecoms operators (AT&T, China Mobile, etc.). These companies cover the entire IT industry chain and build a complete ecosystem of cloud computing. Cloud Computing and security
Research on cloud computing storage security Technology Saint-Min of Jilin University in this paper, in the face of cloud computing data storage security problem, the author from the data Integrity protection and data privacy protection of two aspects respectively. In terms of data integrity protection, in order to enable users to know the state of their data in real time and to repair the damaged data in a certain range, this paper, based on the research results of the existing data integrity protection technology, puts forward the data retrieval proof algorithm M-por, the algorithm uses the message authentication code to make the data block itself produce " Whistle post ", through ...
More than 80% of security executives believe that the external threats facing companies are growing, with nearly 60% of security executives finding it difficult to survive cyber-security battles, according to a recent IBM survey. The research report concludes that technology is the key to addressing security issues and threats, and that current companies should focus on technologies such as large data, cloud computing and mobility. The IBM Application Insight Center completed the third IBM annual Chief Information Security Officer (CISOS) survey through in-depth interviews with nearly 140 enterprise senior security executives. The results show that ...
Research on data integrity verification of Cloud Group University Wang Boyang in this article, we design several different cloud groups to share data integrity verification scheme to solve several different key problems respectively. Specifically, the main contribution of this paper can be summed up in the following aspects. (1) We propose a publicly verifiable data integrity detection scheme-–panda [1,4]. The scheme can efficiently detect the integrity of shared data stored in cloud groups and can support efficient user revocation. By leveraging the technical means of proxy re-signing, ...
Research on data storage security technology in cloud Environment Jiangxi University of Finance and economics Woo Qi cloud computing is one of the emerging technology hotspots in recent years, after grid computing, distributed computing, parallel computing and utility computing. With the industry's general focus on cloud computing in three forms of service: Software as a service, platform as a service (Platform as a service, infrastructure as services (infrastructure as a, IaaS), Academic ...
These days, the first national network security Publicity Week is in full swing in Beijing, during the event, financial, telecommunications, e-government, E-commerce and other key areas and industry network security is widely concerned, and in the cloud services in the road today, there are more and more industries and enterprises to apply to the cloud computing services, and experience the convenience of cloud services. In this way, also give Bath (Baidu, Alibaba, Tencent, Huayun data) and so on behalf of the domestic cloud computing enterprises to put forward new requirements and challenges, they must ensure that users with the relevant information security protection measures, more heavy ...
Research on cloud Security defense strategy and security technology evaluation based on game theory Yunnan University of Finance and Economics Chen Hongfei This paper firstly summarizes the application of game theory to user trust, Security Strategy optimization and security technology evaluation, and then summarizes the related theories of cloud computing. Then, according to the characteristics of cloud computing environment, we set up the game model from the two aspects of the user's game strategy and security technology evaluation, and put forward the game strategy of cloud service provider and the suggestion of system security. The concrete research thought and the work content has the following several aspects: 1. Cloud end users and cloud suits ...
The DAG task of integrating security and usability in cloud environment Liu Yatiu Shaohongrun Jing Weipeng in heterogeneous and complex cloud environment, task scheduling should ensure the security and availability of resources. Therefore, a DAG task scheduling strategy is proposed, which integrates security and usability. This paper improves the subjective logic trust model, calculates the resource reputation as the important basis of scheduling, quantifies the availability deviation of tree cloud resource and dag task, and gives the scheduling function and design greedy scheduling algorithm (ISAG). The experimental results show that the ISAG algorithm is still able to satisfy the ...
19th, "National Information Security Week series activities in Heilongjiang Province--Information security disaster Preparedness Technology Forum" held in Harbin, participants on information security disaster preparedness technology and disaster preparedness management knowledge sharing and discussion. The forum aims to raise awareness of the security risks around the network and to improve network security skills. The Forum by the Heilongjiang Provincial Network and Information Security Coordination Group office and the People's Bank of China Harbin Central Branch jointly sponsored by the National Disaster Preparedness Engineering Laboratory and Chiyu data Joint contractor. Forum, the world famous BCM Professional organization International Disaster Recovery Association ...
Research and implementation of security mechanism among cloud computing client virtual machines The flexible services provided by the Choran Hu Junrong cloud computing rely on the support of virtualization technology, but the security problems of virtualization technology also pose a serious threat to the security of cloud computing. In view of the security risks faced by the client operating system in the cloud computing virtualization technology, based on the analysis of the requirements and characteristics of cloud computing virtualization technology, this paper designs the centralized management of cloud computing environment, the forced access control of distributed implementation and the isolation mechanism based on cloud resource control to make it cooperate with each other. Ensure the security of the client operating system in cloud computing and make the ...
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.