【摘 要】
:
Cloud computing is increasing rapidly and used by more and more individuals and organizations.However,out-sourcing data and business application to a third cloud provider causes security issues.In thi
【机 构】
:
Institute of Information Engineering,Chinese Academy of Sciences,Beijing,P.R.China
【出 处】
:
2016年第十二届无线通信、网络技术与移动计算国际学术会议(WICOM2016)
论文部分内容阅读
Cloud computing is increasing rapidly and used by more and more individuals and organizations.However,out-sourcing data and business application to a third cloud provider causes security issues.In this paper,from the point of cloud providers and consumers,we consider that data confidentiality,data integrity,availability and virtualization are four main security issues for cloud providers,authentication and access control are two challenges for users layer.Based on these aspects,we present a detailed analysis of existing defensive strategies vulnerabilities that may be exploited by adversaries in cloud computing environment,and give constructive suggestions.
其他文献
One of the advantages of Multiple-Input Multiple-Output(MIMO)techniques is link throughput they are able to provide,but reliability of them remains to be improved.In order to improve bit error perform
This paper introduced ITU-R TG 5/1 task group,as well as the current research situation,especially illustrated some interference scenario.Based on 5G high frequency candidate band,radio communication
A dynamic TDMA protocol based on neighbor timeslot transfer(NTT-TDMA)is designed to solve the great waste of channel source when business is not uniform between nodes in the TDMA network,whose timeslo
In this paper,we analyze the deployment of middlebox.For a given network information and policy requirements,an attempt is made to determine the optimal location of middlebox to achieve the best perfo
A Multiple-Input Multiple-Output(MIMO)Diagonally–Bell Laboratories Layered Space-Time(D-BLAST)codec algorithm which is fitted for Field Programmable Gate Array(FPGA)implementation was designed.A MIMO
Wireless vital sign detection is a promising technique,which allows users to non-invasively detect the respiration of the target through capturing the variation of wireless signals.In particular,respi
In this paper,we propose two improved methods to solve the two principal eigenvectorss splicing order uncertainty and phase uncertainty problem when using the method of EVD(matrix eigenvalue decomposi
This paper investigates the performance of the W band millimeter wave(mmWave)backhaul network proposed by our EU TWEETHER project.We focus on the downlink transmission of the mmWave backhaul network,i
UAV data link has been considered as an important part of UAV communication system,through which the UAV could communicate with warships.However,constant coding and mod-ulation scheme that UAV adopts
To address the routing scalability problems mainly caused by the semantics overload of Internet Protocol(IP)addresses,the Locator/ID Separation Protocol(LISP)is proposed.It separates IP addresses into