Visible to the public Biblio

Filters: Keyword is cloud computing platform  [Clear All Filters]
2022-03-22
Jiang, Xin, Yang, Qifan, Ji, Wen, Chen, Yanshu, Cai, Yuxiang, Li, Xiaoming.  2021.  Smart grid data security storage strategy based on cloud computing platform. 2021 6th International Conference on Smart Grid and Electrical Automation (ICSGEA). :69—74.
Aiming at the security problems of traditional smart grid data security storage strategy, this paper proposes a smart grid data security storage strategy based on cloud computing platform. Based on the analysis of cloud computing and cloud storage, the security storage of smart grid data is modeled to improve the security storage performance of power system. The dynamic key mechanism is introduced to obtain the initial key information in the key chain and generate the dynamic secret key. The hyperchaotic system is used to obtain the modified bit plane code in the key chain to form the context and decision of data storage. MQ arithmetic encoder is used for entropy coding to generate the corresponding data storage compressed code stream, and the smart grid data storage key is improved. Combined with encryption processing and decryption processing, the secure storage of smart grid data is realized. The experimental results show that the smart grid data security storage strategy based on cloud computing platform increases the security of smart grid data storage.
2020-07-16
Zhang, Shisheng, Wang, Chencheng, Wang, Qishu.  2019.  Research on Time Concealed Channel Technology of Cloud Computing Platform Based on Shared Memory. 2019 IEEE 4th Advanced Information Technology, Electronic and Automation Control Conference (IAEAC). 1:904—909.

Security issues severely restrict the development and popularization of cloud computing. As a way of data leakage, covert channel greatly threatens the security of cloud platform. This paper introduces the types and research status of covert channels, and discusses the classical detection and interference methods of time-covert channels on cloud platforms for shared memory time covert channels.

2020-05-04
Chen, Jianfeng, Liu, Jie, Sun, Zhi, Li, Chunlin, Hu, Chunhui.  2019.  An Intelligent Cyberspace Defense Architecture Based on Elastic Resource Infrastructure and Dynamic Container Orchestration. 2019 International Conference on Networking and Network Applications (NaNA). :235–240.

The borderless, dynamic, high dimensional and virtual natures of cyberspace have brought unprecedented hard situation for defenders. To fight uncertain challenges in versatile cyberspace, a security framework based on the cloud computing platform that facilitates containerization technology to create a security capability pool to generate and distribute security payload according to system needs. Composed by four subsystems of the security decision center, the image and container library, the decision rule base and the security event database, this framework distills structured knowledge from aggregated security events and then deliver security load to the managed network or terminal nodes directed by the decision center. By introducing such unified and standardized top-level security framework that is decomposable, combinable and configurable in a service-oriented manner, it could offer flexibility and effectiveness in reconstructing security resource allocation and usage to reach higher efficiency.

2019-02-14
Sun, A., Gao, G., Ji, T., Tu, X..  2018.  One Quantifiable Security Evaluation Model for Cloud Computing Platform. 2018 Sixth International Conference on Advanced Cloud and Big Data (CBD). :197-201.

Whatever one public cloud, private cloud or a mixed cloud, the users lack of effective security quantifiable evaluation methods to grasp the security situation of its own information infrastructure on the whole. This paper provides a quantifiable security evaluation system for different clouds that can be accessed by consistent API. The evaluation system includes security scanning engine, security recovery engine, security quantifiable evaluation model, visual display module and etc. The security evaluation model composes of a set of evaluation elements corresponding different fields, such as computing, storage, network, maintenance, application security and etc. Each element is assigned a three tuple on vulnerabilities, score and repair method. The system adopts ``One vote vetoed'' mechanism for one field to count its score and adds up the summary as the total score, and to create one security view. We implement the quantifiable evaluation for different cloud users based on our G-Cloud platform. It shows the dynamic security scanning score for one or multiple clouds with visual graphs and guided users to modify configuration, improve operation and repair vulnerabilities, so as to improve the security of their cloud resources.