On data and virtualization security risks and solutions of cloud computing

被引:2
作者
Luo, Xiangyang [1 ,2 ,3 ]
Yang, Lin [1 ]
Hao, Dai [1 ]
Liu, Fenlin [2 ]
Wang, Daoshun [4 ]
机构
[1] China Institute of Electronic Equipment System Engineering
[2] Zhengzhou Information Science and Technology Institute
[3] State Key Laboratory of Information Security, Institute of Information Engineering Chinese Academy of Sciences
[4] Department of Computer Science and Technology, Tsinghua University, Beijing
基金
中国国家自然科学基金;
关键词
Cloud computing; Countermeasure suggestions; Data security; Virtualization security;
D O I
10.4304/jnw.9.3.571-581
中图分类号
学科分类号
摘要
Data security and virtualization security issues are two key bottlenecks restricting the application of cloud computing promoting and applications, especially for the Cloud-based media computing system. In this paper, states of the art of the techniques on cloud computing data security issues, such as data encryption, access control, integrity authentication and other issues is surveyed, on this basis, the key technical issues of the cloud computing data security should concern about and focus on are indicated, and some corresponding countermeasures and suggestions are presented. For the virtualization security problem introduced by private cloud computing, the security risks induced by virtualization are analyzed and classified, and then based on the divide-conquer idea, for each kind of security risk, some corresponding solutions are presented. © 2014 ACADEMY PUBLISHER.
引用
收藏
页码:571 / 581
页数:10
相关论文
共 42 条
[21]  
Wang Q., Wang C., Li J., Et al., Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing, Lecture Notes in Computer Science, 5789, pp. 355-370, (2009)
[22]  
Zeng K., Publicly Verifiable Remote Data Integrity, Lecture Notes in Computer Science, 5308, pp. 419-434, (2008)
[23]  
Song D., Wagner D., Perrig A., Practical Techniques for Searches on Encrypted Data, Proceedings of the IEEE Symposium on Security and Privacy, pp. 44-55, (2000)
[24]  
Boneh D., Crescenzo G., Ostrovsky R., Et al., Public Key Encryption with Keyword Search, Proceedings of the 23rd Annual International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT'04), Lecture Notes in Computer Science, 3027, pp. 506-522, (2004)
[25]  
Park D., Kim K., Lee P., Public Key Encryption with Conjunctive Field Keyword Search, Proceedings of the Workshop on Information Security Applications, Lecture Notes in Computer Science, 3325, pp. 73-86, (2004)
[26]  
Swaminathan A., Mao Y., Su G., Et al., Confidentiality-Preserving Rank-Ordered Search, Proceedings of the ACM Workshop on Storage Security and Survivability, pp. 7-12, (2007)
[27]  
Gentry C., Fully Homomorphic Encryption Using Ideal Lattices, Proceedings of the ACM International Symposium on Theory of Computing, pp. 169-178, (2009)
[28]  
Stehle D., Steinfeld R., Faster Fully Homomorphic Encryption, Proceedings of ASIACRYPT 2010, Lecture Notes in Computer Science, 6477, pp. 377-394, (2010)
[29]  
Dijk M., Gentry C., Halevi S., Vaikuntanathan V., Fully Homomorphic Encryption over the Integers, Proceedings of EUROCRYPT 2010, Lecture Notes in Computer Science, 6110, pp. 24-43, (2010)
[30]  
Gentry C., Toward Basing Fully Homomorphic Encryption on Worst-Case Hardness, Proceedings of CRYPTO 2010, Lecture Notes in Computer Science, 6223, pp. 116-137, (2010)