Please wait a minute...
Computer & Telecommunication
Current Issue | Archive | Adv Search |
Research on Cloud Computing Data Security Protection
Li Ruiqiang
Wuxi Vocational Institute of Commerce
Download:   PDF(0KB)
Export: BibTeX | EndNote (RIS)      
Abstract  Cloud computing provides users with a dynamic resource allocation solution, which can deal with massive data according to user needs. It has good application for massive internet data storage and processing. However, the data security problem in cloud computing is the key to its sustainable development and application. This paper analyzes the data security factors in the cloud computing environment, and explores the data integrity protection, data sharing security protection and data storage carrier security protection in the cloud computing environment. MB-tree data structure is proposed to improve data integrity protection. The extended fuzzy identity encryption mechanism ensures the privacy protection of data interaction in the aspect of data sharing security protection. In the aspect of security protection of data storage carrier, a virtual machine trusted platform VTPM module is proposed to guarantee the migration of virtual machine in trust environment.
Key wordscloud computing      data security      MB-tree data structure      fuzzy identity encryption mechanism      VTPM module     
:  TP309.2  

Cite this article:

Li Ruiqiang. Research on Cloud Computing Data Security Protection. Computer & Telecommunication, 2017, 1(10): 89-91.

URL:

https://www.computertelecom.com.cn/EN/     OR     https://www.computertelecom.com.cn/EN/Y2017/V1/I10/89

[1] DING Wen-chao YU Shuang-bo XUE Yan-zhu FANG Dong-li. A Trust Service Adaptation Method Based on Security Proxy[J]. 电脑与电信, 2024, 1(6): 31-34.
[2] LIU Chun TAN Kun ZHANG Li-hua LI Hong-bo AN Yuan. Research on Virtual Simulation Experiment Teaching of Cloud Computing and Automatic Operation and Maintenance Course Group[J]. 电脑与电信, 2024, 1(3): 17-.
[3] JIANG Xin WANG Fei. Survey on Blockchain Technology and Application[J]. 电脑与电信, 2021, 1(5): 25-29.
[4] HUANG Han-yan. Intelligent Classroom Design Based on Three-tier Architecture[J]. 电脑与电信, 2021, 1(5): 22-29.
[5] OU Wei-hong YANG Yong-qin LI Jia-hua.
Efficiency Analysis and Optimization of Dig Data Processing under Cloud Computing Platform
[J]. 电脑与电信, 2021, 0(10): 18-23.
[6] YE Hui-qing.
Discussion on Application of 5G Customized Private Network for Vertical Industry
[J]. 电脑与电信, 2021, 0(10): 64-66.
[7] HUANG Xiang. Research on theApplication of Cloud Computing in the Construction of Smart Campus[J]. 电脑与电信, 2020, 1(9): 60-62.
[8] SUN Shu-tong. Research onArtificial Intelligence Method and System for Dynamic Scheduling of Cloud Resources Based on Business Prediction[J]. 电脑与电信, 2020, 1(5): 67-70.
[9] ZHOU Hong-cheng FENG Kai-zheng XIAO Feng . Intelligent Forestry System Design Based on Big Data[J]. 电脑与电信, 2020, 1(4): 56-59.
[10] . Design and Key Technology Research onAutomobile Remote Diagnosis System[J]. 电脑与电信, 2020, 1(3): 52-54.
[11] HOU Yan. Research and Design of the Network Security Model in Cloud Environment[J]. 电脑与电信, 2020, 1(12): 69-71.
[12] XIN Yan-shuang CHEN Si HAN Xiu-yuan. A Tele-collaboration Implementation Scheme Based on ICE[J]. 电脑与电信, 2019, 1(4): 61-65.
[13] ZUO Wen-tao LUO Guo-qiang. Analysis of Data Security and Privacy Protection in the Background of "Artificial Intelligence+"[J]. 电脑与电信, 2019, 1(3): 39-41.
[14] LIU Hong-bing. Research and Exploration on Cloud Computing Technology Professional Training in Technical School[J]. 电脑与电信, 2019, 1(3): 77-79.
[15] WANG Biao, TAN Si-min, RUAN Yuan-hua, XIE Tian-jie. Research on Evaluation Index System of Cloud Computing Service Quality[J]. 电脑与电信, 2018, 1(4): 4-6.
Copyright © Computer & Telecommunication, All Rights Reserved.
Powered by Beijing Magtech Co. Ltd