Jingyu Wang

Work place: School of Information Engineering, University of Science and Technology Beijing, Beijing, China

E-mail: btu_wjy@imust.cn

Website:

Research Interests: Autonomic Computing, Information Security, Network Security, Information-Theoretic Security

Biography

Jingyu Wang, Born in Kaifeng, China, July , 1976. Received master degree from in computer engineering Inner Mongolia University of Science and Technology, Baotou, China, June 2002. His research interests include grid and cloud computing security.

Author Articles
Sensitive Data Protection Based on Intrusion Tolerance in Cloud Computing

By Jingyu Wang xuefeng Zheng Dengliang Luo

DOI: https://doi.org/10.5815/ijisa.2011.01.08, Pub. Date: 8 Feb. 2011

Service integration and supply on-demand coming from cloud computing can significantly improve the utilization of computing resources and reduce power consumption of per service, and effectively avoid the error of computing resources. However, cloud computing is still facing the problem of intrusion tolerance of the cloud computing platform and sensitive data of new enterprise data center. In order to address the problem of intrusion tolerance of cloud computing platform and sensitive data in new enterprise data center, this paper constructs a virtualization intrusion tolerance system based on cloud computing by researching on the existing virtualization technology, and then presents a method of intrusion tolerance to protect sensitive data in cloud data center based on virtual adversary structure by utilizing secret sharing. This system adopts the method of hybrid fault model, active and passive replicas, state update and transfer, proactive recovery and diversity, and initially implements to tolerate F faulty replicas in N=2F+1 replicas and ensure that only F+1 active replicas to execute during the intrusion-free stage. The remaining replicas are all put into passive mode, which significantly reduces the resource consuming in cloud platform. At last we prove the reconstruction and confidentiality property of sensitive data by utilizing secret sharing.

[...] Read more.
Other Articles