Research on the Data Storage Security based on Cloud Computing

被引:0
|
作者
Ma, Xinqiang [1 ,2 ]
Huang, Yi [1 ]
Zhang, Yongdan [2 ]
Liu, Youyuan [1 ]
机构
[1] Chongqing Univ Arts & Sci, Key Lab Machine Vis & Intelligent Informat Syst, Chongqing 402160, Peoples R China
[2] Guizhou Univ, Coll Technol, Guiyang 550025, Peoples R China
关键词
Cloud Computing; Data Storage Security; Cloud Service; Software Security;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud Computing has been envisioned as the next-generation architecture of IT Enterprise. Although envisioned as a promising service platform for the Internet, this new data storage paradigm in "Cloud" brings about many challenging design issues which have profound influence on the security and performance of the overall system. This work studies the problem of ensuring the integrity of data storage in Cloud Computing. One of the biggest concerns with cloud data storage is that of data integrity verification at untrusted servers. To ensure cloud data storage security, it is critical to enable a third party auditor (TPA) to evaluate the service quality from an objective and independent perspective. We review Cloud Computing, cloud data storage and discuss data storage security based on analysis of cloud security treats. Extensive security and performance analysis show that the proposed schemes are highly efficient and provably secure.
引用
收藏
页码:326 / 331
页数:6
相关论文
共 50 条
  • [41] Data Security in Cloud Computing
    Albugmi, Ahmed
    Alassafi, Madini O.
    Walters, Robert
    Wills, Gary
    [J]. 2016 FIFTH INTERNATIONAL CONFERENCE ON FUTURE COMMUNICATION TECHNOLOGIES (FGCT), 2016, : 55 - 59
  • [42] Data security in cloud computing
    Meng, Du
    [J]. PROCEEDINGS OF THE 2013 8TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE & EDUCATION (ICCSE 2013), 2013, : 810 - 813
  • [43] Research on a security mechanism for cloud computing based on virtualization
    Du, Ye
    Zhang, Ruhui
    Li, Meihong
    [J]. TELECOMMUNICATION SYSTEMS, 2013, 53 (01) : 19 - 24
  • [44] Research on a security mechanism for cloud computing based on virtualization
    Ye Du
    Ruhui Zhang
    Meihong Li
    [J]. Telecommunication Systems, 2013, 53 : 19 - 24
  • [45] Research on the Network Information Security Based on the Cloud Computing
    Shen, Wei
    [J]. 2015 2nd International Conference on Education and Education Research (EER 2015), Pt 5, 2015, 9 : 349 - 353
  • [46] Research of Data Security Model in Cloud Computing Platform for SMEs
    Sun, Tao
    Wang, Xinjun
    [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2013, 7 (06): : 97 - 107
  • [47] Research of the Data Security Related Issues in Cloud Computing Services
    Hu, Nan
    [J]. PROCEEDINGS OF THE 2015 4TH NATIONAL CONFERENCE ON ELECTRICAL, ELECTRONICS AND COMPUTER ENGINEERING ( NCEECE 2015), 2016, 47 : 145 - 148
  • [48] Research on Data Security Access Model of Cloud Computing Platform
    Zhu, Yangqing
    Zuo, Jun
    [J]. 2015 2ND INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE AND CONTROL ENGINEERING ICISCE 2015, 2015, : 424 - 428
  • [49] Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing
    Wang, Qian
    Wang, Cong
    Li, Jin
    Ren, Kui
    Lou, Wenjing
    [J]. COMPUTER SECURITY - ESORICS 2009, PROCEEDINGS, 2009, 5789 : 355 - +
  • [50] Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing
    Wang, Qian
    Wang, Cong
    Ren, Kui
    Lou, Wenjing
    Li, Jin
    [J]. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2011, 22 (05) : 847 - 859