Secure cloud storage based on cryptographic techniques

被引:10
作者
Peng, Yong [1 ,2 ]
Zhao, Wei [2 ]
Xie, Feng [2 ]
Dai, Zhong-Hua [2 ]
Gao, Yang [2 ]
Chen, Dong-Qing [2 ]
机构
[1] Information Security Center, Beijing University of Posts and Telecommunications
[2] China Information Technology Security Evaluation Center
来源
Journal of China Universities of Posts and Telecommunications | 2012年 / 19卷 / SUPPL. 2期
关键词
cloud computing; cloud storage; cryptographic technique; privacy; security;
D O I
10.1016/S1005-8885(11)60424-X
中图分类号
学科分类号
摘要
Cloud computing is the delivery of computing and storage capacity as a service to users. Cloud storage, as a subservice of infrastructure as a service (IaaS) in cloud computing, is a model of networked online storage where data is stored in virtualized pools of storage. As fast development and application of cloud computing and cloud storage, users concern more and more about security and privacy issues involved in these techniques. From industrial and academic viewpoints currently, cryptography is considered as a key technology to solve security and privacy problems. In this paper, we mainly give a review on research results of secure cloud storage in which cryptographic techniques have been used to their designs. We start form reviewing the definition of cloud storage, and subsequently review the existing secure cloud storage based on cryptographic techniques. Moreover, we analyze and indicate what type of cryptographic techniques is mainly adopted in existing cloud storages and what role the cryptographic techniques play. Through this work, we can better catch what the relationship between secure cloud storage and cryptographic techniques, and how about the application mechanism of cryptographic techniques in cloud storage. We hope this review can give some help for future research, and more secure cloud storages by using cryptographic techniques can be proposed in the future. © 2012 The Journal of China Universities of Posts and Telecommunications.
引用
收藏
页码:182 / 189
页数:7
相关论文
共 45 条
[1]  
Mell P., Grance T., The NIST definition of cloud computing, NIST Special Publication, pp. 800-145, (2011)
[2]  
Bessani A., Correia M., Quaresma B., Et al., DEPSKY: Dependable and secure storage in a cloud-of-clouds, 6th Conference on Computer Systems (EuroSys'11), pp. 31-46, (2011)
[3]  
Chen Y., Sion R., On securing untrusted clouds with cryptography, 2010 ACM Workshop on Privacy in the Electronic Society (WPES 2010), pp. 109-114, (2010)
[4]  
Chow S.S.M., Chu C., Huang X., Et al., Dynamic secure cloud storage with provenance, Cryptography and Security: From Theory to Applications, LNCS, 6805, pp. 442-464, (2011)
[5]  
Kamara S., Lauter K., Cryptographic cloud storage, 14th International Conference on Financial Cryptography and Data Security, 6054, pp. 136-149, (2010)
[6]  
Kumbhare A., Simmhan Y., Prasanna V., Designing a secure storage repository for sharing scientific databases using public clouds, Second International Workshop on Data Intensive Computing in the Clouds (DataCloud-SC'11), pp. 31-40, (2011)
[7]  
Li M., Yu S., Lou W., Et al., Toward privacy-assured cloud data services with flexible search functionalities, 3rd International Workshop on Security and Privacy in Cloud Computing (SPCC 2012), (2012)
[8]  
Lu Y., Tsudik G., Enhancing data privacy in the cloud, IFIP Advances in Information and Communication Technology, 358, pp. 117-132, (2011)
[9]  
Patil D.H., Bhavsar R.R., Thorve A.S., Data security over cloud, IJCA Proceedings on Emerging Trends in Computer Science and Information Technology (ETCSIT2012) etcsit1001, 5, pp. 11-14, (2012)
[10]  
Wang C., Cao N., Li J., Et al., Secure ranked keyword search over encrypted cloud data, IEEE 30th International Conference on Distributed Computing Systems (ICDCS), pp. 253-262, (2010)