{"title":"代理在云计算数据安全中的应用","authors":"Feng-qing Zhang, D. Han","doi":"10.1109/CSIP.2012.6309055","DOIUrl":null,"url":null,"abstract":"Cloud computing is now the hot spot of computer business and research. However cloud computing security issues have become more and more pronounced. To protect data confidentiality and integrity, making more reliable in cloud computing becomes priorities. Cloud computing security related to the survival of cloud computing, has become a key factor in the development of cloud computing. This paper presents a data security model for cloud computing, and introduces agents to data security module in order to provide more reliable services.","PeriodicalId":193335,"journal":{"name":"2012 International Conference on Computer Science and Information Processing (CSIP)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2012-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"24","resultStr":"{\"title\":\"Applying agents to the data security in cloud computing\",\"authors\":\"Feng-qing Zhang, D. Han\",\"doi\":\"10.1109/CSIP.2012.6309055\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Cloud computing is now the hot spot of computer business and research. However cloud computing security issues have become more and more pronounced. To protect data confidentiality and integrity, making more reliable in cloud computing becomes priorities. Cloud computing security related to the survival of cloud computing, has become a key factor in the development of cloud computing. This paper presents a data security model for cloud computing, and introduces agents to data security module in order to provide more reliable services.\",\"PeriodicalId\":193335,\"journal\":{\"name\":\"2012 International Conference on Computer Science and Information Processing (CSIP)\",\"volume\":\"49 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2012-09-24\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"24\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2012 International Conference on Computer Science and Information Processing (CSIP)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CSIP.2012.6309055\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2012 International Conference on Computer Science and Information Processing (CSIP)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CSIP.2012.6309055","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Applying agents to the data security in cloud computing
Cloud computing is now the hot spot of computer business and research. However cloud computing security issues have become more and more pronounced. To protect data confidentiality and integrity, making more reliable in cloud computing becomes priorities. Cloud computing security related to the survival of cloud computing, has become a key factor in the development of cloud computing. This paper presents a data security model for cloud computing, and introduces agents to data security module in order to provide more reliable services.