Complying with Security Requirements in Cloud Storage Systems

被引:0
|
作者
Roman, Rodrigo [1 ]
Felipe, Miguel Rodel [2 ]
Gene, Phua Eu [2 ]
Zhou, Jianying [1 ]
机构
[1] Inst Infocomm Res, Singapore, Singapore
[2] Data Storage Inst, Singapore, Singapore
关键词
Cloud computing; cloud storage; security;
D O I
10.17706/jcp.11.3.201-206
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
One of the necessary steps to ensure the security of cloud storage systems is to adequately protect the infrastructure itself - the hardware and software that implements the storage services. Starting from an analysis of the security requirements that affect these storage systems, this paper studies the different strategies and approaches that are currently used to fulfill such requirements. The goal of this paper is twofold. Firstly, we aim to analyze the security components that should be used to provide a basic level of protection to storage systems, examining the actual technologies that are used to construct them. Secondly, we aim to identify gaps in the provisioning of security services, highlighting any areas that need of further research.
引用
收藏
页码:201 / 206
页数:6
相关论文
共 50 条
  • [41] Complying to a false sense of security
    Grossman, Wendy M.
    Infosecurity, 2008, 5 (07) : 24 - 27
  • [42] A SECURED CLOUD STORAGE TECHNIQUE TO IMPROVE SECURITY IN CLOUD INFRASTRUCTURE
    SenthilKumar, M.
    Kumar, M.
    2013 INTERNATIONAL CONFERENCE ON RECENT TRENDS IN INFORMATION TECHNOLOGY (ICRTIT), 2013, : 97 - 102
  • [43] N-Cloud: Improving Performance and Security in Cloud Storage
    Alsolami, Fahad
    Chow, C. Edward
    2013 IEEE 14TH INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE SWITCHING AND ROUTING (HPSR), 2013, : 221 - 222
  • [44] BULK STORAGE REQUIREMENTS AT SOCIAL SECURITY ADMINISTRATION
    FRAHER, JJ
    IEEE TRANSACTIONS ON MAGNETICS, 1971, MAG7 (04) : 833 - &
  • [45] Requirements for complying with new Safety Act
    Mining Mirror, 1997, 10 (06): : 19 - 22
  • [46] Supporting Security Requirements for Resource Management in Cloud Computing
    Jhawar, Ravi
    Piuri, Vincenzo
    Samarati, Pierangela
    15TH IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING (CSE 2012) / 10TH IEEE/IFIP INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING (EUC 2012), 2012, : 170 - 177
  • [47] Legal Requirements and Identifying Data Security for Cloud Service
    Godfrin
    2016 Second International Conference on Science Technology Engineering and Management (ICONSTEM), 2016, : 185 - 191
  • [48] Requirements Engineering for Security, Privacy and Services in Cloud Environments
    Stefanos Gritzalis
    Lin Liu
    Requirements Engineering, 2013, 18 : 297 - 298
  • [49] Ontology-based Negotiation of Security Requirements in Cloud
    Liccardo, Loredana
    Rak, Massimiliano
    Di Modica, Giuseppe
    Tomarchio, Orazio
    2012 FOURTH INTERNATIONAL CONFERENCE ON COMPUTATIONAL ASPECTS OF SOCIAL NETWORKS (CASON), 2012, : 192 - 197
  • [50] Requirements Capture and Comparative Analysis of Cloud Security Techniques
    Medhioub, Manel
    Hamdi, Mohamed
    Kim, Tai-Hoon
    INTERNATIONAL JOURNAL OF GRID AND DISTRIBUTED COMPUTING, 2015, 8 (02): : 285 - 307