Analysis of Data Security Technology under Cloud

Article Preview

Abstract:

For the data security threats caused by out sourcing model and shared vulnerability, and base on user data in static characteristics of cloud storage services and the dynamic nature of cloud computing, it requires to propose corresponding data security protection mechanisms, in addition, in order to make the mechanism work normally, we propose a program which can be trusted and can be garnered and user can test, offer the recoverability of data and the integrity verification of data and the accountability leak of data.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

2913-2916

Citation:

Online since:

November 2014

Authors:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] Feng Dengguo, Zhang Min, Zhang Yan etc Cloud computing security research [J]. Journal of Software, 2011, 22(1): 71-83.

Google Scholar

[2] Xiong Yucong. the mobile application of cloud computing security research [D]. Beijing: Beijing Jiaotong University, (2011).

Google Scholar

[3] Chen Kang, Zhen Weiming . cloud computing: Examples of systems and research status [J]. Journal of Software, 2009, 20(5): 1337-1348.

Google Scholar

[4] Lu Hongliang. Research data protection context-fold lower interest rate environment in the mobile cloud interrupted [D]. Hunan : National University of Defense Technology, (2011).

Google Scholar

[5] Yu Yan. Cloud-based data encryption scheme to find and research [J]. Count against the Machine Engineering and Applications, (2012).

Google Scholar

[6] Liu Fan. A policy attribute-based encryption scheme for cloud storage [J]. Application Research of Computers, 2012, 29(4): 1452-1456.

Google Scholar