Home            Contact us            FAQs
    
      Journal Home      |      Aim & Scope     |     Author(s) Information      |      Editorial Board      |      MSP Download Statistics

     Advance Journal of Food Science and Technology


Key Technology of Food Data Security Based on Cloud Computing

1, 2Jian Wang, 1Zhenmin Tang, 1Wenjuan Shao and 3Xianli Jin
1School of Computer Science and Technology, Nanjing University of Science and Technology, Nanjing 210094
2Jiangsu Post and Telecommunications Planning and Designing Institute Co., Ltd., Nanjing 210019
3College of Computer, Nanjing University of Posts and Telecommunications, Nanjing 210023, China
Advance Journal of Food Science and Technology  2016  2:63-65
http://dx.doi.org/10.19026/ajfst.12.2839  |  © The Author(s) 2016
Received: August ‎24, ‎2015  |  Accepted: September ‎11, ‎2015  |  Published: September 15, 2016

Abstract

At present, the development of electronic information technology has affected all aspects of human society, electronic food data files have been widely used in all walks of life. Therefore, food data security has become one of the most important aspects in the modern society, which can affect our work and life. In this study, it takes the cloud computing overview as a starting point, with the help of cloud computing security risk analysis, exploring the cloud food data security strategy.

Keywords:

Cloud computing, electronic information technology, food data,


References

  1. Bethencourt, J., A. Sahai and B. Waters, 2007. Ciphertext-policy attribute-based encryption. Proceeding of the 2007 IEEE Symposium on Security and Privacy. Oakland, pp: 321-334.
  2. Glen, N., 2005. Verified Query Results from Hybrid Authentication Trees. In: Jajodia, S., Wijesekera, D. (Eds.), Data and Applications Security. Lecture Notes in Computer Science, Springer-Verlag, Berlin, Heidelberg, 3654: 84-98.
  3. Markus, J., L. Tom, M. Silvio and S. Michael, 2003. Fractal Merkle tree representation and traversal. Proceeding of the Cryptographer's Track at RSA Conference (CT-RSA'03), 2612: 314-326.
  4. Shor, P.W., 1994. Algorithms for quantum computation: Discrete logarithms and factoring. Proceeding of the 35th Annual IEEE Symposium on Foundations of Computer Science (FOCS, 1994), pp: 124-134.
    CrossRef    
  5. Szydlo, M., 2004. Merkle Tree Traversal in Log Space and Time. In: Cachin, C. and J.L. Camenisch (Eds.), Advances in Cryptology-EUROCRYPT 2004. Lecture Notes in Computer Science, Springer-Verlag, Berlin, Heidelberg, 3027: 541-554.

Competing interests

The authors have no competing interests.

Open Access Policy

This article is distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made.

Copyright

The authors have no competing interests.

ISSN (Online):  2042-4876
ISSN (Print):   2042-4868
Submit Manuscript
   Information
   Sales & Services
Home   |  Contact us   |  About us   |  Privacy Policy
Copyright © 2024. MAXWELL Scientific Publication Corp., All rights reserved