Complying with Security Requirements in Cloud Storage Systems

被引:0
|
作者
Roman, Rodrigo [1 ]
Felipe, Miguel Rodel [2 ]
Gene, Phua Eu [2 ]
Zhou, Jianying [1 ]
机构
[1] Inst Infocomm Res, Singapore, Singapore
[2] Data Storage Inst, Singapore, Singapore
关键词
Cloud computing; cloud storage; security;
D O I
10.17706/jcp.11.3.201-206
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
One of the necessary steps to ensure the security of cloud storage systems is to adequately protect the infrastructure itself - the hardware and software that implements the storage services. Starting from an analysis of the security requirements that affect these storage systems, this paper studies the different strategies and approaches that are currently used to fulfill such requirements. The goal of this paper is twofold. Firstly, we aim to analyze the security components that should be used to provide a basic level of protection to storage systems, examining the actual technologies that are used to construct them. Secondly, we aim to identify gaps in the provisioning of security services, highlighting any areas that need of further research.
引用
收藏
页码:201 / 206
页数:6
相关论文
共 50 条
  • [31] Vulnerabilities and storage security in Cloud Computing
    Derfouf, Mostapha
    Mimouni, Amina
    Eleuldj, Mohsine
    2015 INTERNATIONAL CONFERENCE ON CLOUD TECHNOLOGIES AND APPLICATIONS (CLOUDTECH 15), 2015, : 295 - 299
  • [32] On the Security of Cloud Data Storage and Sharing
    Zhou, Jianying
    SCC'14: PROCEEDINGS OF THE 2ND INTERNATIONAL WORKSHOP ON SECURITY IN CLOUD COMPUTING, 2014, : 1 - 1
  • [33] Research of Data Security in Cloud Storage
    Zhang, Wenjing
    Ma, Chuanlong
    Sha, Weichao
    Zhou, Qiaoyu
    PROCEEDINGS OF THE 2015 INTERNATIONAL INDUSTRIAL INFORMATICS AND COMPUTER ENGINEERING CONFERENCE, 2015, : 858 - 861
  • [34] A Framework for Data Storage Security in Cloud
    Tyagi, Manoj
    Manoria, Manish
    Mishra, Bharat
    ADVANCES IN DATA AND INFORMATION SCIENCES, VOL 1, 2018, 38 : 263 - 272
  • [35] Blockchain for Cloud Storage Security: A Review
    Mughal, Aamir
    Joseph, Alex
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING AND CONTROL SYSTEMS (ICICCS 2020), 2020, : 1163 - 1169
  • [36] Cloud Storage Encryption Security Analysis
    Zhang Jing
    Wang Jinsu
    Zheng Zhuangfeng
    Zhao Chongan
    PROCEEDINGS OF 2016 IEEE INTERNATIONAL CONFERENCE ON CLOUD COMPUTING AND BIG DATA ANALYSIS (ICCCBDA 2016), 2016, : 62 - 65
  • [37] Enhancing data storage for cloud security
    Ellis F.
    Network Security, 2024, 2024 (02)
  • [38] A Framework for Storage Security in Cloud Computing
    Chen, Guoyou
    Miao, Jiajia
    Xie, Feng
    Mao, Handong
    ADVANCES IN MECHATRONICS AND CONTROL ENGINEERING, PTS 1-3, 2013, 278-280 : 1767 - +
  • [39] Identification of Security Requirements in Systems of Systems by Functional Security Analysis
    Fuchs, Andreas
    Rieke, Roland
    ARCHITECTING DEPENDABLE SYSTEMS VII, 2010, 6420 : 74 - 96
  • [40] Requirements for a Forensically Ready Cloud Storage Service
    Spyridopoulos, Theodoros
    Katos, Vasilios
    INTERNATIONAL JOURNAL OF DIGITAL CRIME AND FORENSICS, 2011, 3 (03) : 19 - 36