The Method of Ensuring Confidentiality and Integrity Data in Cloud Computing

被引:0
|
作者
Rukavitsyn, Andrey N. [1 ]
Borisenko, Konstantin A. [1 ]
Holod, Ivan I. [1 ]
Shorov, Andrey V. [1 ]
机构
[1] St Petersburg Electrotech Univ LETI, Fac Comp Sci & Technol, St Petersburg, Russia
关键词
cloud computing; information security; confidentiality; integrity; ENCRYPTION;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Cloud computing allows not only to obtain computing resources on-demand but also to store large amounts of data (big data) with a high level of fault tolerance. Nevertheless, data confidentiality for users of hybrid and public clouds is cannot guaranteed in full. Cloud providers have full access to user data, which threatens to compromise the integrity of data. Existing methods of providing security consider methods to increase the speed and reduce the load during authorization and data encryption. The paper proposes a method that describes the use of separate services outside the cloud for authentication, data management and metadata storage to eliminate the possibility of obtaining unauthorized access to data, and the use of metadata to perform integrity control. The developed method is being used to create a stand based on OpenStack and two services on separate servers. The owner of the database limits the access to data that is stored in an encrypted form and does not allow provider to interact with database.
引用
收藏
页码:272 / 274
页数:3
相关论文
共 50 条
  • [1] Ensuring Data Integrity in Cloud Computing
    Kumarga, N. Praveen
    Sireesha, D.
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2014, 14 (09): : 34 - 38
  • [2] Ensuring Confidentiality of Healthcare Data using Fragmentation in Cloud Computing
    Andreas, Andreou
    Mavromoustakis, Constandinos X.
    Batalla, Jordi Mongay
    Markakis, Evangelos
    Mastorakis, George
    [J]. IEEE CONFERENCE ON GLOBAL COMMUNICATIONS, GLOBECOM, 2023, : 1991 - 1996
  • [3] An Effective Integrity Verification Scheme for Ensuring Data Integrity in Cloud Computing
    Kamboj, Minakshi
    Rana, Sanjeev
    [J]. INNOVATIONS IN BIO-INSPIRED COMPUTING AND APPLICATIONS, IBICA 2021, 2022, 419 : 42 - 54
  • [4] Ensuring data confidentiality and integrity in edge computing environments : A security and privacy perspective
    Kale, Rohini Suhas
    Hase, Jayashri
    Deshmukh, Shyam
    Ajani, Samir N.
    [J]. JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2024, 27 (2A): : 421 - 430
  • [5] Ensuring Data Integrity in the Cloud
    Cahilly, Monica
    [J]. LC GC NORTH AMERICA, 2020, 38 (10) : 586 - 586
  • [6] Integrity and Confidentiality in Cloud Outsourced Data
    Rady, Mai
    Abdelkader, Tamer
    Ismail, Rasha
    [J]. AIN SHAMS ENGINEERING JOURNAL, 2019, 10 (02) : 275 - 285
  • [7] PCR and Bio-signature for data confidentiality and integrity in mobile cloud computing
    Sukumaran, Sreeja Cherillath
    Misbahuddin, Mohammed
    [J]. JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2021, 33 (04) : 426 - 435
  • [8] ENSURING THE DATA INTEGRITY IN CLOUD DATA STORAGE
    Luo, Wenjun
    Bai, Guojing
    [J]. 2011 IEEE INTERNATIONAL CONFERENCE ON CLOUD COMPUTING AND INTELLIGENCE SYSTEMS, 2011, : 240 - 243
  • [9] A method for achieving provable data integrity in cloud computing
    Li, Aiping
    Tan, Shuang
    Jia, Yan
    [J]. JOURNAL OF SUPERCOMPUTING, 2019, 75 (01): : 92 - 108
  • [10] A method for achieving provable data integrity in cloud computing
    Aiping Li
    Shuang Tan
    Yan Jia
    [J]. The Journal of Supercomputing, 2019, 75 : 92 - 108