Two-Phased Protocol for Providing Data Confidentiality in Cloud Storage Environments

被引:0
|
作者
Butoi, Alexandru [1 ]
Morar, Gabriela Andreea [1 ]
Ilea, Andreea [1 ]
机构
[1] Univ Babes Bolyai, Fac Econ & Business Adm, R-3400 Cluj Napoca, Romania
关键词
cloud computing security; data confidentiality; cloud storage; protocol; middleware;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In expanding fields, such as cloud computing, one of the greatest concerns is related to data security. Transferring and storing data to a cloud computing infrastructure raises many issues related to data privacy and data integrity. In this context, we propose 1 a protocol designed to provide data storage confidentiality in the cloud. The protocol implies splitting the data into small encrypted data chunks, dispersed into data storage volumes. It is a two phased protocol that handles separately the operations related to writing the data to the storage volumes and the operations of retrieving data from the corresponding volumes.
引用
收藏
页码:220 / 230
页数:11
相关论文
共 50 条
  • [31] Combining Mobile and Cloud Storage for Providing Ubiquitous Data Access
    Soares, Joao
    Preguica, Nuno
    EURO-PAR 2011 PARALLEL PROCESSING, PT 1, 2011, 6852 : 516 - 527
  • [32] A Rapid Locating Protocol of Corrupted Data for Cloud Data Storage
    Xu, Guangwei
    Yang, Yanbin
    Yan, Cairong
    Gan, Yanglan
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2016, 10 (10): : 4703 - 4723
  • [33] CS-IBE : A Data Confidentiality System in Public Cloud Storage System
    Bentajer, Ahmed
    Hedabou, Mustapha
    Abouelmehdi, Karim
    Elfezazi, Said
    9TH INTERNATIONAL CONFERENCE ON EMERGING UBIQUITOUS SYSTEMS AND PERVASIVE NETWORKS (EUSPN-2018) / 8TH INTERNATIONAL CONFERENCE ON CURRENT AND FUTURE TRENDS OF INFORMATION AND COMMUNICATION TECHNOLOGIES IN HEALTHCARE (ICTH-2018), 2018, 141 : 559 - 564
  • [34] Confidentiality Technique to Obfuscate the Numerical Data to Enhance Security in Public Cloud Storage
    Oli, S. Arul
    Arockiam, L.
    2017 INTERNATIONAL CONFERENCE ON ALGORITHMS, METHODOLOGY, MODELS AND APPLICATIONS IN EMERGING TECHNOLOGIES (ICAMMAET), 2017,
  • [35] A NEURAL DATA SECURITY MODEL: ENSURE HIGH CONFIDENTIALITY AND SECURITY IN CLOUD DATA STORAGE ENVIRONMENT
    Jegadeeswari, S.
    Dinadayalan, P.
    Gnanambigai, N.
    2015 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), 2015, : 400 - 406
  • [36] On the Security of a Cloud Data Storage Auditing Protocol IPAD
    Wang, Xu An
    Luo, Xiaoshuang
    Zhang, Jindan
    Yang, Xiaoyuan
    ADVANCES IN INTERNETWORKING, DATA & WEB TECHNOLOGIES, EIDWT-2017, 2018, 6 : 611 - 617
  • [37] A Secure Index Management Scheme for Providing Data Sharing in Cloud Storage
    Lee, Sun-Ho
    Lee, Im-Yeong
    JOURNAL OF INFORMATION PROCESSING SYSTEMS, 2013, 9 (02): : 287 - 300
  • [38] Providing Advanced Security Mechanism for Scalable Data Sharing In Cloud Storage
    Swathy, V.
    Sudha, K.
    Aruna, R.
    Sangeetha, C.
    Janani, R.
    2016 INTERNATIONAL CONFERENCE ON INVENTIVE COMPUTATION TECHNOLOGIES (ICICT), VOL 3, 2015, : 175 - 180
  • [39] TR-AKA: A two-phased, registered authentication and key agreement protocol for 5G mobile networks
    Liu, Yibing
    Huo, Lijun
    Zhou, Gang
    IET INFORMATION SECURITY, 2022, 16 (03) : 193 - 207
  • [40] A Performance Evaluation of Data Storage Approach for High Availability and Confidentiality on Multi-cloud
    Miura, Yamato
    Wakabayashi, Naoki
    Ueno, Shohei
    Kanai, Atsushi
    Tanimoto, Shigeaki
    Sato, Hiroyuki
    ADVANCES IN NETWORK-BASED INFORMATION SYSTEMS, NBIS-2017, 2018, 7 : 888 - 900