Technical Documentation: a hybrid encryption scheme based on certificates in the standard model of cloud computing

The standard model of cloud computing based on certificate hybrid encryption scheme ping Herdach with the rapid development of cloud computing, data security has become a key problem of cloud security, especially the large amount of data stored and transmitted in the cloud and the high security requirements. On the other hand, based on the certificate cryptosystem, it overcomes the problem of the traditional public key cryptosystem and the key escrow based on the identity cipher system, and provides a new method for constructing the security and efficient PKI, but the existing certificate-based encryption schemes mostly adopt bilinear pair structure, and the computational efficiency is low. For cloud computing environments, based on reduced judgment ...

Cloud security vision: to benefit more users

"The rain that comes directly from the clouds is distilled water, and it is as safe as a tap that can be drunk," he said. Can you say the same thing about the data from the clouds? "How do you react when a water company sells as dirty as a typical spam message and a malware deluge of internet traffic?" said Dr Zhang Hongwen, the CEO of Czech network. This has become a key issue in the long-term survival of the internet! Water is the element of life: nearly 60% of our weight is made up of water. The existence of water is the first thing astronomers look for when they consider habitable planets. Find a good clean water, people ...

10 ways to keep data safe in cloud computing

When the concept of cloud data storage appeared, people were really happy once. The advent of cloud data storage has allowed people to gasp in the fight against malware, keyboard sniffing, PC monitoring software, and so on. But when people move digitized baggage into the cloud, they forget the measures needed to ensure data security. Data protection in the cloud is not as difficult as protecting the security fence in the Android system, but sometimes it's not as easy as walking in a park. So in order to reduce doubt and help eliminate the fear of new technologies, this article lists 10 ways to make your life in the cloud fun ...

Design and implementation of cloud storage system based on Homomorphic encryption

Design and implementation of cloud storage system based on Homomorphic encryption Song Danxi when the encrypted data stored on the cloud server was developed to a certain scale, the effective retrieval of encrypted data will be an urgent problem, the traditional information retrieval technology has been difficult to meet the needs of massive data retrieval in cloud storage environment, The effective retrieval of cloud encrypted data becomes one of the important research topics that need to be solved at present. In the case of data encryption, the Homomorphic encryption scheme can be used to statistic, analyze and retrieve the ciphertext information, and the result of operation is automatically encrypted. Be in the cause of

Research on a new anti-spam system based on cloud computing platform

Research on a new anti-spam system based on cloud computing platform Liu Haiyu Yang Jie A new anti-spam system designed to address the disadvantage of receiving passive messages in existing SMTP (Simple mail transmits Kyoto). The system reduces unnecessary network traffic by designing an improved DMTP (differentiated mail transmits Kyoto), reducing the load of the traditional anti-spam system by introducing cloud computing, which reduces user ...

Research on data security related problems in cloud computing

Research on data security related problems in cloud computing Nanjing University of Posts and Telecommunications Zhou This paper presents a key/value data storage model to store data, and then through the relevant data backup and isolation mechanism to ensure data security storage. In order to improve the security of data transmission, an improved hybrid encryption algorithm is proposed for data transmission outside the cloud. Aiming at the efficiency of data processing in the service model, based on the cloud computing platform and the load balancing mechanism used in the cluster, this paper presents a distributed load balancing algorithm under the cloud computing platform. The Count ...

On the application and influence of "cloud security" to the Internet era

1 The concept of cloud security for the network, many concepts or nouns are imported, or literal translation or transliteration. For example: Internet (Internet), mouse (mouse), Network Surfer (Cybersurfer), hardware (hardware), software (soft ware), database (data bank), etc., "cloud security" is not the word, It is the concept of the Chinese antivirus enterprise creation, is the cloud computing in the security domain concrete application. 2006 Google launched the "Google 101 program," and ...

Application and improvement of key agreement protocol in cloud computing environment

Application and improvement of key agreement protocol in cloud computing environment Nimmin in order to solve the problem of the adaptability of the existing key agreement protocol in the cloud computing environment, the paper deeply analyzes the security requirements of the cloud computing scene to the key agreement protocol, and combines the security performance defects of the existing IKEV2 protocol, adopts the puzzle mechanism, The key material and the delayed transmission of identity information are used to improve the IKEV2, and a key agreement protocol ike-c adapted to the cloud computing network environment is proposed, which effectively improves the responder's anti Denial-of-service (DoS) attack capability, and resolves the man-in-the-middle attack which leads to the identity leakage of the initiator.

The risk of privacy in cloud computing, cloud security and measurable

Privacy mandates, security and accountability in the Cloud Marianthi Theoharidou, Nick Papanikolaou, Siani Pearson and Dimitris Gritzalisthis monitors examines privacy disorientated assessment for cloud, and Iden ...

Research on differentiated security technology of cloud computing

Research on differentiated security technology of cloud computing Li Dongmei Yin Shijun Chen Jianyong Cloud Deployment and application can significantly reduce cost to promote business innovation and development However, the public cloud has made the user data and business processing links to independent third parties to provide the security threat to the user data and business systems, which has become the main bottleneck of cloud computing development. In this paper, according to the security requirements for cloud business diversification, the differential security technology framework can reduce the consumption of cloud computing resources and promote the application of cloud computing under the precondition of satisfying the user's security requirements. Research on differentiated security technology of cloud computing

The enterprise should pay attention to the cloud stack security

Essentially, all cloud computing services consist of a "stack", this may include hardware assets (server memory, CPU, disk), virtualization technologies running on hardware, network formation (including physical and virtual), additional computing and programming software, mass storage and virtual machines (VMS), or application and software instances. While this broad set of technologies opens up a world of opportunity in computing, companies must know that vulnerabilities can occur in the cloud stack because of the way in which these technologies interact and the features that are often shared among cloud computing customers. For example, in multi-user systems, ...

SaaS and cloud Computing vulnerability management vendors how to choose

As many manufacturers in the security industry slowly transform into managed security service providers, a specific application area has become the mainstream, namely, through cloud computing software, the vulnerability management of service delivery. At present, some vendors have also provided cloud-based vulnerability scanning and repair tools, these products quickly occupy market share. In this article, we'll start by exploring whether the use of cloud based vulnerability management Services is the right choice for your business, and then will provide some criteria to help you select a vendor, and finally a DIY approach for cloud computing scans. Software as a service, base ...

Cloud Security ROI

Cloud security ROI Dave Asprey Trend Technology Cloud Security Vice President 2013 trend technology high-end CIO Summit Cloud security ROI

360 Internet Security Center-the development trend of enterprise security in internet age

360 Internet Security Center-the development trend of enterprise security in the Internet age the report, published in collaboration with Gartner, is an important highlight of the 2013 China Internet Security Conference's main forum. In the face of increasingly complex security threats, the existing security measures can not effectively solve the security problems faced by enterprises, so 360 hope to use the platform of the Internet security conference, in the form of research reports to the industry to introduce 360 in recent years in the enterprise security of innovative attempts and achievements, aimed at the association With the vast number of information security vendors, for Chinese enterprises to build a complete and efficient security defense ...

Encryption software to help enterprises rushed to "cloud" Xiao

The development of the Internet makes the information technology have more development space, especially in the background of large data era, it is hot to deal with and store large data, and the cloud technology is typical representative. But as it is called, the technology can really soar or go up the sky, and it must be in the context of information security. The encryption software for data source may be the best propellant. Cloud technology Analysis is the challenge of development and security in addition to the possible large-scale computing resources of the system failure, cloud server security risks include the lack of unified security ...

Dairyun Security Solutions

Dairyun security solution Sun Yu Dell software group Greater China brand Manager "cloud computing is not an end in itself, but an opportunity to transform it into the core of the enterprise, making it the leader and driver in the value creation process. "-Michael Dell CEO Dairyun Security solution

Interpreting the Cloud Security Guide v3.0

Zhao Grain is now the NSFocus Chief Strategic officer, responsible for the company's Research institute and Strategic Planning, as well as the Cloud Security Alliance (csa,cloud Alliance) China branch of the initiator and director. Zhao Food in the enterprise IT and security architecture, strategic planning and so on have a wealth of experience, before joining the Green Alliance, Zhao Food in Lenovo Group as it architect and security operations director, in the CA China as the chief advisor, in the Internet Security System (China) Co., Ltd. as chief strategic officer, in China Telecom Data Bureau as senior engineer. csa--International Power ...

Discussion on security strategy of cloud security technology in university cloud service

Discussion on security strategy of cloud security technology in University cloud service Zhu Sihua Chantricia as cloud computing continues to evolve, cloud computing has been developed rapidly in colleges and universities, which can improve the processing speed of information management in colleges and universities, reduce the hardware and software resources, improve the efficiency of work, facilitate students ' learning, and realize resource sharing, To improve the level of teaching and scientific research of teachers and so on, the development of colleges and universities play a role in promoting. While providing convenience for colleges and universities, the security problem restricts the development of the cloud in the university, this paper introduces the cloud computing briefly, and probes into the related technologies of the cloud security in colleges and universities. Cloud ...

Research and implementation of cloud computing security technology based on HDFs

Research and implementation of cloud computing security technology based on HDFs the Guo San Changbenwen innovation of Guangdong University of Technology is as follows: (1) based on the principle of Ibe algorithm, the Datanode authentication security mechanism of client access under HDFs is designed, In order to make up the original HDFS architecture under the client Access Datanode has not been certified defects, so that malicious or counterfeit users can not go through the main server Namenode to steal the private data on the Datanode to ensure data security. At the same time, using the principle of class Ibe algorithm,...

Compliance requirements and recommendations for enterprise cloud security

In the process of using cloud computing, enterprises are confronted with a great security problem, which needs to meet the compliance requirements of competent departments at all levels, this article will introduce the compliance requirements and coping methods of enterprise cloud computing. Overall compliance requirements for enterprise cloud computing The choice of an enterprise to migrate its business from a traditional data center to a cloud computing data center will face new security challenges, one of the most important of which is compliance with the many regulatory regulations that govern compliance with delivery, measurement, and communication. Cloud computing services users and suppliers need to understand and master the differences and implications of current compliance and auditing standards, processes, and practices. ...

Total Pages: 2156 1 .... 1386 1387 1388 1389 1390 .... 2156 Go to: GO

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.