Study on Cloud Data Destruction Mechanism and its Application

被引:0
|
作者
Wu Jing [1 ]
Zhao Fengzhi [1 ]
Dong Yudan [1 ]
机构
[1] Northeast Petr Univ, Daqing 1163318, Heilongjiang, Peoples R China
来源
APPLIED MECHANICS AND MATERIALS II, PTS 1 AND 2 | 2014年 / 477-478卷
关键词
Cloud Computing; Data Security; Data Coverage;
D O I
10.4028/www.scientific.net/AMM.477-478.1487
中图分类号
TH [机械、仪表工业];
学科分类号
0802 ;
摘要
The cloud data security is the primary concern users, especially in multi-tenant cloud environments residual data can cause data leakage problem, but most of the cloud service providers do not provide data processing residual solution. This study was designed HDFS multi- level security mechanisms and data destruction and data based on bidirectional heartbeat overwrite technology combined with the data from the destruction mechanism to ensure effective destruction of data under the premise of safety requirements and performance can be achieved demand balance.
引用
收藏
页码:1487 / 1490
页数:4
相关论文
共 50 条
  • [31] Research on Cloud Computing and Its Application in Big Data Processing of Railway Passenger Flow
    Xiao Yong
    Cheng Ying
    Fang Yanjun
    IAEDS15: INTERNATIONAL CONFERENCE IN APPLIED ENGINEERING AND MANAGEMENT, 2015, 46 : 325 - 330
  • [32] Research on Cloud Computing and Its Application in Big Data Processing of Distance Higher Education
    Zhang, Guolei
    Li, Jia
    Hao, Li
    INTERNATIONAL JOURNAL OF EMERGING TECHNOLOGIES IN LEARNING, 2015, 10 (08) : 55 - 58
  • [33] CONSTRUCTION OF CLOUD SPACE FAULT TREE AND ITS APPLICATION OF FAULT DATA UNCERTAINTY ANALYSIS
    Li, Sha-Sha
    Cui, Tie-Jun
    Li, Xing-Sen
    Wang, Lai-Gui
    Jiang, Fu-Chuan
    PROCEEDINGS OF 2017 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS (ICMLC), VOL 1, 2017, : 195 - 201
  • [34] Quantitative Analysis of Data Mining Application and Sports Industry Financing Mechanism based on Cloud Computing
    Wang, Hao
    Sun, Jinhai
    INTERNATIONAL JOURNAL OF GRID AND DISTRIBUTED COMPUTING, 2016, 9 (12): : 233 - 244
  • [35] A Selective Mirrored Task Based Fault Tolerance Mechanism for Big Data Application Using Cloud
    Wu, Hao
    Jin, Qinggeng
    Zhang, Chenghua
    Guo, He
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2019, 2019
  • [36] A Secure Data Access Mechanism for Cloud Tenants
    Rong, Chunming
    Cheng, Hongbing
    THIRD INTERNATIONAL CONFERENCE ON CLOUD COMPUTING, GRIDS, AND VIRTUALIZATION (CLOUD COMPUTING 2012), 2012, : 113 - 119
  • [37] The Research on Cloud computing data security mechanism
    Xu Xiaoping
    Yan Junhu
    Liu Lan
    ADVANCES IN MECHATRONICS, AUTOMATION AND APPLIED INFORMATION TECHNOLOGIES, PTS 1 AND 2, 2014, 846-847 : 1595 - 1599
  • [38] BACTERIAL LEACHING - INTRODUCTION TO ITS APPLICATION AND THEORY AND A STUDY ON ITS MECHANISM OF OPERATION
    CORRANS, IJ
    HARRIS, B
    RALPH, BJ
    JOURNAL OF THE SOUTH AFRICAN INSTITUTE OF MINING AND METALLURGY, 1972, 72 (08): : 221 - &
  • [39] Data Protection for Cloud Using Homomorphic Mechanism
    Kumar, T. Shashi
    Deepthi, J.
    Hariprasad, V.
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2014, 14 (08): : 56 - 60
  • [40] A Brief Survey of Cloud Data Auditing Mechanism
    Anand, Yash
    Sirmour, Bhargavi
    Zaman, Sk Mahafuz
    Markandey, Brijesh Kumar
    Kumar, Anurag
    Maity, Soumyadev
    INNOVATIVE DATA COMMUNICATION TECHNOLOGIES AND APPLICATION, ICIDCA 2021, 2022, 96 : 581 - 593