Complying with Security Requirements in Cloud Storage Systems

被引:0
|
作者
Roman, Rodrigo [1 ]
Felipe, Miguel Rodel [2 ]
Gene, Phua Eu [2 ]
Zhou, Jianying [1 ]
机构
[1] Inst Infocomm Res, Singapore, Singapore
[2] Data Storage Inst, Singapore, Singapore
关键词
Cloud computing; cloud storage; security;
D O I
10.17706/jcp.11.3.201-206
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
One of the necessary steps to ensure the security of cloud storage systems is to adequately protect the infrastructure itself - the hardware and software that implements the storage services. Starting from an analysis of the security requirements that affect these storage systems, this paper studies the different strategies and approaches that are currently used to fulfill such requirements. The goal of this paper is twofold. Firstly, we aim to analyze the security components that should be used to provide a basic level of protection to storage systems, examining the actual technologies that are used to construct them. Secondly, we aim to identify gaps in the provisioning of security services, highlighting any areas that need of further research.
引用
收藏
页码:201 / 206
页数:6
相关论文
共 50 条
  • [21] An Assessment of Security Requirements Compliance of Cloud Providers
    Bhensook, Nuntapun
    Senivongse, Twittie
    2012 IEEE 4TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING TECHNOLOGY AND SCIENCE (CLOUDCOM), 2012,
  • [22] Security Requirements in a Federated Cloud Networking Architecture
    Massonet, Philippe
    Levin, Anna
    Celesti, Antonio
    Villari, Massimo
    ADVANCES IN SERVICE-ORIENTED AND CLOUD COMPUTING (ESOCC 2015), 2016, 567 : 79 - 88
  • [23] Security Migration Requirements: From Legacy System to Cloud and from Cloud to Cloud
    Hussein, Noor Ibrahim
    Hashem, Mervat
    Li, Zhiyong
    PROCEEDINGS OF THE 2ND INTERNATIONAL SYMPOSIUM ON COMPUTER, COMMUNICATION, CONTROL AND AUTOMATION, 2013, 68 : 248 - 252
  • [24] Analysis of the Security and Privacy Requirements of Cloud-Based Electronic Health Records Systems
    Rodrigues, Joel J. P. C.
    de la Torre, Isabel
    Fernandez, Gonzalo
    Lopez-Coronado, Miguel
    JOURNAL OF MEDICAL INTERNET RESEARCH, 2013, 15 (08)
  • [25] Data security in decentralized cloud systems – system comparison, requirements analysis and organizational levels
    André Müller
    André Ludwig
    Bogdan Franczyk
    Journal of Cloud Computing, 6
  • [26] Data security in decentralized cloud systems - system comparison, requirements analysis and organizational levels
    Mueller, Andre
    Ludwig, Andre
    Franczyk, Bogdan
    JOURNAL OF CLOUD COMPUTING-ADVANCES SYSTEMS AND APPLICATIONS, 2017, 6
  • [27] Analysis of the requirements of the information security of reputation systems and scenario of using reputation systems in the cloud computing environment
    Abdullaeva F.D.
    Journal of Automation and Information Sciences, 2016, 48 (07) : 77 - 87
  • [28] IMPROVE SECURITY AND AVAILABILITY FOR CLOUD STORAGE
    Liu, Shenling
    Zhang, Chunyuan
    Bo, Le
    PROCEEDINGS OF 2016 4TH IEEE INTERNATIONAL CONFERENCE ON CLOUD COMPUTING AND INTELLIGENCE SYSTEMS (IEEE CCIS 2016), 2016, : 382 - 387
  • [29] Security as a Service Model for Cloud Storage
    Abo-alian, Alshaimaa
    Badr, Nagwa L.
    Tolba, M. F.
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON ADVANCED INTELLIGENT SYSTEMS AND INFORMATICS 2016, 2017, 533 : 225 - 233
  • [30] Data Security and Privacy in Cloud Storage
    Xinhua Dong
    Ruixuan Li
    Wanwan Zhou
    Dongjie Liao
    Shuoyi Zhao
    ZTECommunications, 2013, 11 (02) : 18 - 23