Analysis of Security Components in Cloud Storage Systems

被引:0
|
作者
Roman, Rodrigo [1 ]
Felipe, Miguel Rodel [2 ]
Gene, Phua Eu [2 ]
Zhou, Jianying [1 ]
机构
[1] Inst Infocomm Res, Singapore, Singapore
[2] Data Storage Inst, Singapore, Singapore
关键词
Terms Cloud Computing; Cloud Storage; Security;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
One of the necessary steps to ensure the security of cloud storage systems is to adequately protect the infrastructure itself the hardware and software that implements the storage services. The goal of this paper is to analyze the security components that should be used to provide a basic level of protection to storage systems, examining the actual technologies that are used to construct them. As a result, we can identify gaps in the provisioning of security services, highlighting any areas that need of further research.
引用
收藏
页数:4
相关论文
共 50 条
  • [31] N-Cloud: Improving Performance and Security in Cloud Storage
    Alsolami, Fahad
    Chow, C. Edward
    2013 IEEE 14TH INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE SWITCHING AND ROUTING (HPSR), 2013, : 221 - 222
  • [32] A Security-aware Data Placement Mechanism for Big Data Cloud Storage Systems
    Kang, Seungmin
    Veeravalli, Bharadwaj
    Aung, Khin Mi Mi
    2016 IEEE 2ND INTERNATIONAL CONFERENCE ON BIG DATA SECURITY ON CLOUD (BIGDATASECURITY), IEEE INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE AND SMART COMPUTING (HPSC), AND IEEE INTERNATIONAL CONFERENCE ON INTELLIGENT DATA AND SECURITY (IDS), 2016, : 327 - 332
  • [33] Security analysis and improvement on resilient storage outsourcing schemes in mobile cloud computing
    Liu, Xiao
    Jiang, Rui
    Journal of Southeast University (English Edition), 2012, 28 (04) : 392 - 397
  • [34] Security Analysis of Cloud Storage with Access Control and File Assured Deletion (FADE)
    Ranjan, Aditya Kaushal
    Kumar, Vijay
    Hussain, Muzzammil
    2015 SECOND INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING AND COMMUNICATION ENGINEERING ICACCE 2015, 2015, : 453 - 458
  • [35] Security Analysis of Delegable and Proxy Provable Data Possession in Public Cloud Storage
    Ren, Yongjun
    Shen, Jian
    Wang, Jin
    Fang, Liming
    2014 TENTH INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING (IIH-MSP 2014), 2014, : 795 - 798
  • [36] Performance Analysis of Encryption Algorithms with Pat-Fish for Cloud Storage Security
    Usha, M.
    Prabhu, A.
    MOBILE AND WIRELESS TECHNOLOGY 2018, ICMWT 2018, 2019, 513 : 111 - 120
  • [37] Study on Access Control for Cloud Storage Security
    Ma, Xinqiang
    Huang, Yi
    Zhang, Mingsheng
    Liu, Youyuan
    PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INTELLIGENT COMMUNICATION, 2015, 16 : 333 - 336
  • [38] On the security of auditing mechanisms for secure cloud storage
    Yu, Yong
    Niu, Lei
    Yang, Guomin
    Mu, Yi
    Susilo, Willy
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2014, 30 : 127 - 132
  • [39] A Security Framework to Protect Data in Cloud Storage
    Yahya, Farashazillah
    Chang, Victor
    Walters, Robert John
    Wills, Gary Brian
    PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON INTERNET OF THINGS, BIG DATA AND SECURITY (IOTBDS 2019), 2019, : 307 - 314
  • [40] Security Concerns in Popular Cloud Storage Services
    Chu, Cheng-Kang
    Zhu, Wen-Tao
    Han, Jin
    Liu, Joseph K.
    Xu, Jia
    Zhou, Jianying
    IEEE PERVASIVE COMPUTING, 2013, 12 (04) : 50 - 57