Secure cloud storage based on cryptographic techniques

被引:10
作者
Peng, Yong [1 ,2 ]
Zhao, Wei [2 ]
Xie, Feng [2 ]
Dai, Zhong-Hua [2 ]
Gao, Yang [2 ]
Chen, Dong-Qing [2 ]
机构
[1] Information Security Center, Beijing University of Posts and Telecommunications
[2] China Information Technology Security Evaluation Center
来源
Journal of China Universities of Posts and Telecommunications | 2012年 / 19卷 / SUPPL. 2期
关键词
cloud computing; cloud storage; cryptographic technique; privacy; security;
D O I
10.1016/S1005-8885(11)60424-X
中图分类号
学科分类号
摘要
Cloud computing is the delivery of computing and storage capacity as a service to users. Cloud storage, as a subservice of infrastructure as a service (IaaS) in cloud computing, is a model of networked online storage where data is stored in virtualized pools of storage. As fast development and application of cloud computing and cloud storage, users concern more and more about security and privacy issues involved in these techniques. From industrial and academic viewpoints currently, cryptography is considered as a key technology to solve security and privacy problems. In this paper, we mainly give a review on research results of secure cloud storage in which cryptographic techniques have been used to their designs. We start form reviewing the definition of cloud storage, and subsequently review the existing secure cloud storage based on cryptographic techniques. Moreover, we analyze and indicate what type of cryptographic techniques is mainly adopted in existing cloud storages and what role the cryptographic techniques play. Through this work, we can better catch what the relationship between secure cloud storage and cryptographic techniques, and how about the application mechanism of cryptographic techniques in cloud storage. We hope this review can give some help for future research, and more secure cloud storages by using cryptographic techniques can be proposed in the future. © 2012 The Journal of China Universities of Posts and Telecommunications.
引用
收藏
页码:182 / 189
页数:7
相关论文
共 45 条
[21]  
Wu J., Ping L., Ge X., Et al., Cloud storage as th infrastructure of cloud computing, International Conference on Intelligent Computing and Cognitive Informatics, pp. 380-383, (2010)
[22]  
Popa R.A., Lorch J.R., Molnar D., Et al., Enabling security in cloud storage SLAs with CloudProof, Microsoft TechReport MSR-TR-2010, 46, pp. 1-12, (2010)
[23]  
Subashini S., Kavitha V., A survey on security issues in service delivery models of cloud computing, Journal of Network and Computer Applications, 34, 1, pp. 1-11, (2011)
[24]  
Tang Y., Lee P.P.C., Lui J.C.S., Et al., FADE: Secure overlay cloud storage with file assured deletion, Security and Privacy in Communication Networks, 50, pp. 380-397, (2010)
[25]  
Chase M., Kamara S., Structured encryption and controlled disclosure, ASIACRYPT 2010, LNCS, 6477, pp. 577-594, (2010)
[26]  
Kamara S., Papamanthou C., Roeder T., CS2: A semantic cryptographic cloud storage system, Microsoft Research, Tech. Rep. MSR-TR-2011-58, (2011)
[27]  
Ko R.K.L., Jagadpramana P., Mowbray M., Et al., TrustCloud: A framework for accountability and trust in cloud computing, 2011 IEEE World Congress on Services, pp. 584-588, (2011)
[28]  
Liu Q., Tan C.C., Wu J., Et al., Reliable re-encryption in unreliable clouds, IEEE Global Telecommunications Conference (GLOBECOM), (2011)
[29]  
Barua M., Liang X., Lu X., Et al., ESPAC: Enabling security and patient-centric access control for eHealth in cloud computing, International Journal of Security and Networks, 6, 2, pp. 67-76, (2011)
[30]  
Bethencourt J., Sshai A., Waters B., Ciphertext-policy attribute-based encryption, IEEE Symposium on Security and Privacy, pp. 321-334, (2007)