Research Article | OPEN ACCESS
Key Technology of Food Data Security Based on Cloud Computing
1, 2Jian Wang, 1Zhenmin Tang, 1Wenjuan Shao and 3Xianli Jin
1School of Computer Science and Technology, Nanjing University of Science and Technology, Nanjing 210094
2Jiangsu Post and Telecommunications Planning and Designing Institute Co., Ltd., Nanjing 210019
3College of Computer, Nanjing University of Posts and Telecommunications, Nanjing 210023, China
Advance Journal of Food Science and Technology 2016 2:63-65
Received: August 24, 2015 | Accepted: September 11, 2015 | Published: September 15, 2016
Abstract
At present, the development of electronic information technology has affected all aspects of human society, electronic food data files have been widely used in all walks of life. Therefore, food data security has become one of the most important aspects in the modern society, which can affect our work and life. In this study, it takes the cloud computing overview as a starting point, with the help of cloud computing security risk analysis, exploring the cloud food data security strategy.
Keywords:
Cloud computing, electronic information technology, food data,
References
-
Bethencourt, J., A. Sahai and B. Waters, 2007. Ciphertext-policy attribute-based encryption. Proceeding of the 2007 IEEE Symposium on Security and Privacy. Oakland, pp: 321-334.
-
Glen, N., 2005. Verified Query Results from Hybrid Authentication Trees. In: Jajodia, S., Wijesekera, D. (Eds.), Data and Applications Security. Lecture Notes in Computer Science, Springer-Verlag, Berlin, Heidelberg, 3654: 84-98.
-
Markus, J., L. Tom, M. Silvio and S. Michael, 2003. Fractal Merkle tree representation and traversal. Proceeding of the Cryptographer's Track at RSA Conference (CT-RSA'03), 2612: 314-326.
-
Shor, P.W., 1994. Algorithms for quantum computation: Discrete logarithms and factoring. Proceeding of the 35th Annual IEEE Symposium on Foundations of Computer Science (FOCS, 1994), pp: 124-134.
CrossRef -
Szydlo, M., 2004. Merkle Tree Traversal in Log Space and Time. In: Cachin, C. and J.L. Camenisch (Eds.), Advances in Cryptology-EUROCRYPT 2004. Lecture Notes in Computer Science, Springer-Verlag, Berlin, Heidelberg, 3027: 541-554.
Competing interests
The authors have no competing interests.
Open Access Policy
This article is distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made.
Copyright
The authors have no competing interests.
|
|
|
ISSN (Online): 2042-4876
ISSN (Print): 2042-4868 |
|
Information |
|
|
|
Sales & Services |
|
|
|