期刊文献+

Data Security and Privacy in Cloud Storage

Data Security and Privacy in Cloud Storage
在线阅读 下载PDF
导出
摘要 In this paper, we survey data security and privacy problems created by cloud storage applications and propose a cloud storage security architecture. We discuss state-of-the-art techniques for ensuring the privacy and security of data stored in the cloud. We discuss policies for access control and data integrity, availability, and privacy. We also discuss several key solutions proposed in current literature and point out future research directions. In this paper, we survey data security and privacy problems created by cloud storage applications and propose a cloud storage security architecture. We discuss state-of-the-art techniques for ensuring the privacy and security of data stored in the cloud. We discuss policies for access control and data integrity, availability, and privacy. We also discuss several key solutions proposed in current literature and point out future research directions.
出处 《ZTE Communications》 2013年第2期18-23,共6页 中兴通讯技术(英文版)
基金 supported by National Natural Science Foundation of China under grants 61173170 and 60873225 National High Technology Research and Development Program of China under grant 2007AA01Z403 Innovation Fund of Huazhong University of Science and Technology under grants 2013QN120,2012TS052 and 2012TS053
关键词 cloud storage cloud computing data security PRIVACY-PRESERVING cloud storage cloud computing data security privacy-preserving
  • 相关文献

参考文献5

二级参考文献93

  • 1刘欣阳,王国仁,乔百友,韩东红.决策树的并行训练策略[J].计算机科学,2004,31(8):129-130. 被引量:1
  • 2李德毅,孟海军,史雪梅.隶属云和隶属云发生器[J].计算机研究与发展,1995,32(6):15-20. 被引量:1334
  • 3张薇,马建峰.LPCA——分布式存储中的数据分离算法[J].系统工程与电子技术,2007,29(3):453-458. 被引量:14
  • 4罗武庭.DJ—2可变矩形电子束曝光机的DMA驱动程序[J].LSI制造与测试,1989,10(4):20-26. 被引量:373
  • 5Organization for the Advancement of Structured Information Standards (OASIS) http://www.oasis-open.org/.
  • 6Distributed Management Task Force (DMTF) http://www.dmtf.org/home.
  • 7Cloud Security Alliance http://www.cloudsecurityalliance.org.
  • 8Crampton J, Martin K, Wild P. On key assignment for hierarchical access control. In: Guttan J, ed, Proc. of the 19th IEEE Computer Security Foundations Workshop--CSFW 2006. Venice: IEEE Computer Society Press, 2006. 5-7.
  • 9Damiani E, De S, Vimercati C, Foresti S, Jajodia S, Paraboschi S, Samarati P. An experimental evaluation of multi-key strategies for data outsourcing. In: Venter HS, Eloff MM, Labuschagne L, Eloff JHP, Solms RV, eds. New Approaches for Security, Privacy and Trust in Complex Environments, Proc. of the IFIP TC-11 22nd Int'l Information Security Conf. Sandton: Springer-Verlag, 2007. 395-396.
  • 10Bethencourt J, Sahai A, Waters B. Ciphertext-Policy attribute-based encryption. In: Shands D, ed. Proc. of the 2007 IEEE Symp. on Security and Privacy. Oakland: IEEE Computer Society, 2007. 321-334. [doi: 10.1109/SP.2007.11].

共引文献1159

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部