Design and Implementation of Cloud Storage Security System

Article Preview

Abstract:

The user identity information management and authentication, safety of the stored data in the cloud storage environment are the challenges of cloud security, all these have drawn attention of researchers in recent years. We made a security model of cloud storage: the model adopts many encryption methods to protect the user data and user identity information stored in the cloud storage management server, only authorized users can use cloud service. At last, we gave security analysis of the model, the result shows: the architecture is able to hide the characteristics of the data stored in the cloud server, certify and protect user identity information effectively.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

2325-2329

Citation:

Online since:

November 2012

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2012 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] K. D. Bowers, A. Juels and A. Oprea. HAIL: Cryptology ePrint Archive, Report 2008/489, (2008)

Google Scholar

[2] Cong Wang, Qian Wang, Kui Ren and Wenjing Lou: 2009 IEEE DOI 10.1109/IWQos.2009.5201385, pp.1-9. In Chinese.

DOI: 10.1109/milcom.2009.5379991

Google Scholar

[3] Alexander Heitzmann, Bernardo Palazzi, Charalampos Papamanthou and Roberto Tamassia: Oct. 2008 Proceedings of the 4th ACM international workshop on Storage security and survivability, pp.43-54.

DOI: 10.1145/1456469.1456479

Google Scholar

[4] Itani W, Kayssi A, and Chehab A: Proceedings of the 8th IEEE International Conference on Dependable, Autonomic and Secure Computing, Chengdu, China: IEEE Computer Society, (2009), pp.711-716.

DOI: 10.1109/dasc.2009.139

Google Scholar

[5] Roy I, Ramadan H, Setty S and et al. Airavat: Proceedings of the 7th USENIX Conference on Networked Systems Design and Implement at ion. San Jose, USA: USENIX Association Berkeley, (2010), pp.297-312.

Google Scholar

[6] Mow bray M: Proceedings of the 4th International ICST Conference on Communication System Software and Middleware, New York, USA: Association f or Computing Machinery, (2009).

Google Scholar

[7] Wen Hao, Lei Wang, Jiwu Jing and Jianguo Chang: Netinfo Security, Vol.12 (2012),pp.38-41. In Chinese.

Google Scholar

[8] Jian Mao, Kun Li and Xiandong Xu: Journal of Tsinghua University, Vol.23 (2011), pp.1363-1368. In Chinese.

Google Scholar

[9] Ruwei Huang, Xiaolin Gui, Si Yu and Wei Zhang: Journal of Computers, Vol.14 (2011), pp.2391-2402.In Chinese.

Google Scholar