Data Security and Privacy Protection of Cloud Computing

Article Preview

Abstract:

Data security and privacy protection of cloud computing as a new IT application mode are the most valued and concerned issues of the cloud user,and thus of utmost significance to the security of cloud computing. This paper describes and analyzes in detail the risks of data security and privacy showup brought by cloud computing,discusses the protective approaches of data security and privacy in cloud computing environment. Furthermore, this paper based on the newly developed fully homomorphism encryption then proposed a data security scheme which can operate encrypted data directly on cloud server without decrypt while all communication between client and server is encrypted, it can assure data security at the mean time assure the operate efficiency.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 846-847)

Pages:

1570-1573

Citation:

Online since:

November 2013

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] Liwei Wang, Xiaoqiong Wang A Study in Data Privacy Protection Model Based On Cloud Computing, (2012).

Google Scholar

[2] Cloud Computing Use Case Discussion Group. Cloud Computing Use Case White Paper V4. [OL/B]. http: /cloudusecases. org.

Google Scholar

[3] Wang Li-wei. Intelligent Identity Authentication Protocol Based on Cloud Computing[J]. Computer Science. 2010, 37(8)Supp: 45-48.

Google Scholar

[4] Crampton J, Martin K, Wild P. On key assignment for hierarchical access control. In: Guttan J, ed, Proc. of the 19th IEEE Computer Security Foundations Workshop—CSFW 2006. Venice: IEEE Computer Society Press, 2006. 5−7.

DOI: 10.1109/csfw.2006.20

Google Scholar

[5] Damiani E, De S, Vimercati C, Foresti S, Jajodia S, Paraboschi S, Samarati P. An experimental evaluation of multi-key strategies for data outsourcing. In: Venter HS, Eloff MM, Labuschagne L, Eloff JHP, Solms RV, eds. New Approaches for Security, Privacy and Trust in Complex Environments, Proc. of the IFIP TC-11 22nd Int'l.

DOI: 10.1007/978-0-387-72367-9_33

Google Scholar