Data Security Strategy Based on Artificial Immune Algorithm for Cloud Computing

被引:0
|
作者
Chen Jinyin [1 ]
Yang Dongyong [1 ]
机构
[1] Zhejiang Univ Technol, Coll Informat Engn, Hangzhou 310023, Zhejiang, Peoples R China
关键词
Data security; Artificial immune; Cloud computing; HDFS; Cloudsim;
D O I
暂无
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
With the fast development of cloud computing and its wide application, data security plays an important role in cloud computing. This paper brought up a novel data security strategy based on artificial immune algorithm on architecture of HDFS for cloud computing. Firstly, we explained the main factors influence data security in cloud environment. Then we introduce HDFS architecture, data security model and put forward an improved security model for cloud computing. In the third section, artificial immune algorithm related with negative selection and dynamic selection algorithm that adopted in our system and how they applied to cloud computing are depicted in detail. Finally simulations are taken by two steps. Former simulations are carried out to prove the performance of artificial immune algorithm brought up in this paper, the latter simulation are running on Cloudsim platform to testify that data security strategy based on artificial immune algorithm for cloud computing is efficient.
引用
收藏
页码:149 / 153
页数:5
相关论文
共 50 条
  • [21] Using a Modified Approach of Blowfish Algorithm for Data Security in Cloud Computing
    Corpuz, Reynaldo R.
    Gerardo, Bobby D.
    Medina, Ruji P.
    PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: IOT AND SMART CITY (ICIT 2018), 2018, : 157 - 162
  • [22] Data Intensive Dynamic Scheduling Model and Algorithm for Cloud Computing Security
    Islam, Md. Rafiqul
    Habiba, Mansura
    JOURNAL OF COMPUTERS, 2014, 9 (08) : 1796 - 1808
  • [23] PSR: An Improvement of Lightweight Cryptography Algorithm for Data Security in Cloud Computing
    Chandra, P. Sri Ram
    Rao, p Syamala
    Naresh, K.
    Malladi, Ravisankar
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2025, 16 (01) : 1053 - 1058
  • [24] Enhancing Data Security Using AES Encryption Algorithm in Cloud Computing
    Rajput, Snehal
    Dhobi, J. S.
    Gadhavi, Lata J.
    PROCEEDINGS OF FIRST INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY FOR INTELLIGENT SYSTEMS: VOL 2, 2016, 51 : 135 - 143
  • [25] Voiceprint recognition and cloud computing data network security based on scheduling joint optimisation algorithm
    Ma, Yinhui
    INTERNATIONAL JOURNAL OF GLOBAL ENERGY ISSUES, 2023, 45 (06) : 602 - 626
  • [26] Task scheduling algorithm based on greedy strategy in cloud computing
    Zhou, Zhou
    Zhigang, Hu
    Zhigang, Hu, 1600, Bentham Science Publishers B.V., P.O. Box 294, Bussum, 1400 AG, Netherlands (08): : 111 - 114
  • [27] Cloud Computing Resource Schedule Strategy Based on PSO Algorithm
    Xiong, Yingyidu
    Wu, Yanyan
    APPLIED SCIENCE, MATERIALS SCIENCE AND INFORMATION TECHNOLOGIES IN INDUSTRY, 2014, 513-517 : 1332 - 1336
  • [28] Research of Security Model and Cloud Computing Strategy
    Ma Yingrui
    MECHATRONICS ENGINEERING, COMPUTING AND INFORMATION TECHNOLOGY, 2014, 556-562 : 6196 - 6198
  • [29] An Algorithm for Computing Efficiently in Cloud Based Data Centers
    Shah, Idris Afzal
    2018 FIRST INTERNATIONAL CONFERENCE ON SECURE CYBER COMPUTING AND COMMUNICATIONS (ICSCCC 2018), 2018, : 397 - 400
  • [30] Data Security Policy In The Cloud Computing
    Ran Shuanglin
    PROCEEDINGS OF 2012 7TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE & EDUCATION, VOLS I-VI, 2012, : 222 - 225