Cloud Storage Encryption Security Analysis

被引:0
作者
Zhang Jing [1 ]
Wang Jinsu [1 ]
Zheng Zhuangfeng [1 ]
Zhao Chongan [1 ]
机构
[1] City Univ Hong Kong, Hong Kong, Hong Kong, Peoples R China
来源
PROCEEDINGS OF 2016 IEEE INTERNATIONAL CONFERENCE ON CLOUD COMPUTING AND BIG DATA ANALYSIS (ICCCBDA 2016) | 2016年
关键词
cloud storage; anonymous; encryption; security;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the increase of network bandwidth and the popularity of Internet, cloud storage has become one of the most widely used of cloud computing. Since the user may have a variety of terminal such as PC, notebook computers, tablet PCs and smart phones, and may access data in different places and on different terminal, cloud storage provides the most suitable solution to share data between these devices. However, due to various reasons, many users have suspicions about the security of cloud storage, worrying that their information would be lost or stolen. As a result, it is difficult to apply cloud storage in large scale. In this paper, we try to set a safety model with a new encryption strategy for cloud storage, and we analyze the model's security also. Finally we propose more technology problems that we need to solve.
引用
收藏
页码:62 / 65
页数:4
相关论文
共 15 条
[1]  
[Anonymous], 2009 IEEE WORKSH SIG
[2]  
[Anonymous], 2014, CLOUD COMP WHIT PAP
[3]  
Bellare M., 2000, A Concrete Security Treatment of Symmetric Encryption
[4]  
Canetti R., 1998, Proceedings of the Thirtieth Annual ACM Symposium on Theory of Computing, P131, DOI 10.1145/276698.276721
[5]  
Canetti R, 1997, LECT NOTES COMPUT SC, V1294, P455
[6]  
[傅颖勋 Fu Yingxun], 2013, [计算机研究与发展, Journal of Computer Research and Development], V50, P136
[7]  
Gao Huan-zhi, 2012, COMPUTER KNOWLEDGE T, V16, P37
[8]  
Huang Wenming, 2008, COMPUTER SIMULATION, V25
[9]  
Mu Fei, 2009, J COMPUTER RES DEV, V46
[10]  
Plummer William W., 1989, COMPUT COMMUN REV, V19, P95