Research of Security Strategy of Cloud Storage

Article Preview

Abstract:

Cloud storage is a new extension and developed concept on the base of the cloud computing, aiming at providing data storage and transaction access service. On the base of the analysis of the basic concept of cloud storage, make the research and analysis on the safety of cloud storage. For the unauthorized access, data leakage, data access breakdown and other security problems, poses some security policies, including a challenge-response cloud storage identity authentication, encryption storage based on key associated with the username and a fast data recovery service which is parallel with data access. Hope cloud storage can provide a service of confidential, reliable and authentication.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

2626-2629

Citation:

Online since:

September 2013

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] China cloud computing network. Definition and character of cloud computing [EB/OL]. http: /www. chinacloud. cn/show. aspx?id=741&cid=17. 2009-02-15.

Google Scholar

[2] China cloud computing network. Specification of cloud storage framework [EB/OL]. http: /www. cloudcomputing-china. cn/Article/luilan/201003/564. html. 2010. 10.

Google Scholar

[3] China cloud computing network . Category and attribute of cloud storage [EB/OL]. http: /www. cloudcomputing-china. cn/Article/luilan/201003/419. html. 2010. 12.

Google Scholar

[4] William Stallings. Cryptography and Network Security [M]. Beijing: Publishing House of electronics industry, (2011).

Google Scholar

[5] Storage authority network-WatchStor. Comparison of cloud storage and traditional storage. [EB/OL]. http: /tech. watchstor. com/cloud-storage-124841. htm . 2010. 5. 18.

Google Scholar

[6] I. Foster, C. Kesselman, S. Tuecke. The Physiology of the Grid: Enabling Scalable Virtual Organizations [J], International J. Super computer Applications, 15(3), 2001, 200-222.

DOI: 10.1177/109434200101500302

Google Scholar