Improvement of network security algorithm for cloud computing

Cloud Computing is a new computing model that distributes the computing missions on a resource pool that includes a large amount of computing resources. It is the result of development of infrastructure as a service (IAAS), platform as a service (PAAS), and software as a service (SAAS). With broadband Internet access, Internet users are able to acquire computing resource, storage space and other kinds of software services according to their needs. In cloud computing, with a large amount of various computing resources, users can easily solve their problems with the resources provided by a cloud. This brings great flexibility for the users. Using cloud computing service, users can store their critical data in servers and can access their data anywhere they can with the Internet and do not need to worry about system breakdown or disk faults, etc. Also, different users in one system can share their information and work, as well as play games together. Many important companies such as Amazon, Google, IBM, Microsoft, and Yahoo are the forerunners that provide cloud computing services. Recently more and more companies such as Salesforce, Facebook, Youtube, Myspace etc. also begin to provide all kinds of cloud computing services for Internet users.

[1]  Marti A. Hearst,et al.  Why phishing works , 2006, CHI.

[2]  Chandra Krintz,et al.  Evaluating the Performance Impact of Xen on MPI and Process Execution For HPC Systems , 2006, First International Workshop on Virtualization Technology in Distributed Computing (VTDC 2006).

[3]  Mike P. Papazoglou,et al.  Service oriented architectures: approaches, technologies and research issues , 2007, The VLDB Journal.

[4]  Rolf Stadler,et al.  Robust monitoring of network-wide aggregates through gossiping , 2007, IEEE Transactions on Network and Service Management.

[5]  Dimitrios S. Nikolopoulos,et al.  Application-Specific Customization on Many-Core Platforms: The VT-ASOS Framework , 2007 .

[6]  Chandra Krintz,et al.  Linux kernel special-ization for scientific application performance , 2005 .

[7]  Diomidis Spinellis,et al.  A survey of peer-to-peer content distribution technologies , 2004, CSUR.

[8]  Andreas Schaad,et al.  Towards secure SOAP message exchange in a SOA , 2006, SWS '06.

[9]  Richard Wolski,et al.  The impact of paravirtualized memory hierarchy on linear algebra computational kernels and software , 2008, HPDC '08.

[10]  Michael McIntosh,et al.  XML signature element wrapping attacks and countermeasures , 2005, SWS '05.

[11]  Eric Rescorla,et al.  The Transport Layer Security (TLS) Protocol Version 1.2 , 2008, RFC.

[12]  Chandra Krintz,et al.  Using phase behavior in scientific application to guide Linux operating system customization , 2005, 19th IEEE International Parallel and Distributed Processing Symposium.

[13]  Richard Wolski,et al.  The network weather service: a distributed resource performance forecasting service for metacomputing , 1999, Future Gener. Comput. Syst..

[14]  Anne-Marie Kermarrec,et al.  Managing clouds: a case for a fresh look at large unreliable dynamic networks , 2006, OPSR.

[15]  Myeonggil Choi The Security Risks of Cloud Computing , 2019 .