Table of Contents Author Guidelines Submit a Manuscript
Mathematical Problems in Engineering
Volume 2013, Article ID 871430, 6 pages
http://dx.doi.org/10.1155/2013/871430
Research Article

A Novel Cloud Computing Algorithm of Security and Privacy

1Department of Information Management, St. John’s University, 499 Section 4, Tam King Road, Tamsui District, New Taipei City 25135, Taiwan
2Department of Electronic Engineering, St. John’s University, 499 Section 4, Tam King Road, Tamsui District, New Taipei City 25135, Taiwan

Received 12 September 2013; Accepted 12 October 2013

Academic Editor: Teen-Hang Meen

Copyright © 2013 Chih-Yung Chen and Jih-Fu Tu. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Abstract

The emergence of cloud computing has simplified the flow of large-scale deployment distributed system of software suppliers; when issuing respective application programs in a sharing clouds service to different user, the management of material becomes more complex. Therefore, in multitype clouds service of trust environment, when enterprises face cloud computing, what most worries is the issue of security, but individual users are worried whether the privacy material will have an outflow risk. This research has mainly analyzed several different construction patterns of cloud computing, and quite relevant case in the deployment construction security of cloud computing by fit and unfit quality, and proposed finally an optimization safe deployment construction of cloud computing and security mechanism of material protection calculating method, namely, Global Authentication Register System (GARS), to reduce cloud material outflow risk. We implemented a system simulation to test the GARS algorithm of availability, security and performance. By experimental data analysis, the solutions of cloud computing security, and privacy derived from the research can be effective protection in cloud information security. Moreover, we have proposed cloud computing in the information security-related proposals that would provide related units for the development of cloud computing security practice.