ZTE Communications ›› 2014, Vol. 12 ›› Issue (2): 63-66.doi: DOI:10.3969/j.issn.1673-5188.2014.02.010

• Research Paper • Previous Articles    

Formal Protection Architecture for Cloud Computing System

Yasha Chen1, Jianpeng Zhao1, Junmao Zhu1, and Fei Yan2   

  1. 1. The Institute of North Electronic Equipment, Beijing 10020, China;
    2. Department of Computer Science, Wuhan University, Wuhan 430000, China
  • Online:2014-06-25 Published:2014-06-25
  • About author:Yasha Chen (yashachen@gmail.com) has a PhD degree in computer software from Beijing University of Technology. She is currently working at the Institute of North Electronic Equipment. Her research interests include information security and network security.

    Jianpeng Zhao (JianpengZhao@gmail.com) has a PhD degree in computer software from Beijing University of Posts and Telecommunications. He is currently working at the Institute of North Electronic Equipment. His research interests include information security and network security.

    Junmao Zhu (JunmaoZhu@gmail.com) has a PhD degree in computer software from Beijing University of Posts and Telecommunications. He is currently working at the Institute of North Electronic Equipment. His research interests include information security and network security.

    Fei Yan (FeiYan@gmail.com) has a PhD degree in computer software from Wuhan University. He is currently working at Wuhan University. His research interests include information security and network security.

Abstract: Cloud computing systems play a vital role in national security. This paper describes a conceptual framework called dualsystem architecture for protecting computing environments. While attempting to be logical and rigorous, formalism method is avoided and this paper chooses algebra Communication Sequential Process.

Key words: formal method, trusted computing, privacy, cloud computing