Privacy Protection in Cloud Storage

Article Preview

Abstract:

The storage security technology in cloud storage applications was analyzed, and in order to satisfied the demand for privacy protection, the key technology of data encryption and authentication are described and the methods of privacy protection in data mining under the cloud were discussed. At the same time, a hierarchical mechanism of authentication was proposed. These methods and mechanisms could solve the problem of privacy protection in a certain degree, and ensure the security of cloud storage.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

504-507

Citation:

Online since:

May 2011

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2011 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] ARMBRUST M, FOX A, GRIFFITH R, et al. Above the Clouds: A Berkeley View of Cloud Computing, [R]. Berkeley, CA, USA: University of California, (2009).

Google Scholar

[2] Dai Yuanshun. The Brief Review of Cloud Computing Technologies,. Information and Communications Technologies. 2010. 2, pp.29-35.

Google Scholar

[3] ZHOU Ke, WANG Hua, and LI Chunhua. Cloud Storage Technology and Its Application, ZTE Communications, 2010. 16(4), pp.24-27.

Google Scholar

[4] EVFIMIEVSKI A, SRIKANT R, AGRAWAL R, et al. Privacy preserving mining of association rules [J ] . Information Systems, 2002, 29 (4) : 343-2364.

DOI: 10.1016/j.is.2003.09.001

Google Scholar

[5] KARGUPTA H , DAS K, L IU K. Multi2party , privacy preserving distributed data mining using a game theoretic framework [J ] . Lecture Notes in Computer Science, 2007, 4702: 523-531.

DOI: 10.1007/978-3-540-74976-9_54

Google Scholar

[6] William Stallings. Network Security Essentials: Applications and Standards[M]. Pearson Education Asia Limited and Tsinghua University Press. (2007).

Google Scholar