Cloud Storage Encryption Security Analysis

被引:0
作者
Zhang Jing [1 ]
Wang Jinsu [1 ]
Zheng Zhuangfeng [1 ]
Zhao Chongan [1 ]
机构
[1] City Univ Hong Kong, Hong Kong, Hong Kong, Peoples R China
来源
PROCEEDINGS OF 2016 IEEE INTERNATIONAL CONFERENCE ON CLOUD COMPUTING AND BIG DATA ANALYSIS (ICCCBDA 2016) | 2016年
关键词
cloud storage; anonymous; encryption; security;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the increase of network bandwidth and the popularity of Internet, cloud storage has become one of the most widely used of cloud computing. Since the user may have a variety of terminal such as PC, notebook computers, tablet PCs and smart phones, and may access data in different places and on different terminal, cloud storage provides the most suitable solution to share data between these devices. However, due to various reasons, many users have suspicions about the security of cloud storage, worrying that their information would be lost or stolen. As a result, it is difficult to apply cloud storage in large scale. In this paper, we try to set a safety model with a new encryption strategy for cloud storage, and we analyze the model's security also. Finally we propose more technology problems that we need to solve.
引用
收藏
页码:62 / 65
页数:4
相关论文
共 50 条
  • [21] Cloud Security based on the Homomorphic Encryption
    Al-Sit, Waleed T.
    Al-Zoubi, Hani
    Al-Jubouri, Qussay
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2019, 10 (08) : 300 - 307
  • [22] Ensuring Data Storage Security in Cloud. Computing Based on Hybrid Encryption Schemes
    Sarkar, Mrinal Kanti
    Kumar, Sanjay
    2016 FOURTH INTERNATIONAL CONFERENCE ON PARALLEL, DISTRIBUTED AND GRID COMPUTING (PDGC), 2016, : 320 - 325
  • [23] To Increase Security and Privacy, the QAES Encryption Algorithm is used for Storage of Data for Cloud Computing
    Rani, Geetha E.
    Chetana, D. T.
    2022 IEEE 19TH INDIA COUNCIL INTERNATIONAL CONFERENCE, INDICON, 2022,
  • [24] Enhanced Data Storage Security in Cloud Environment using Encryption, Compression and Splitting technique
    Rani, Kajal
    Sagar, Raj Kumar
    2017 2ND INTERNATIONAL CONFERENCE ON TELECOMMUNICATION AND NETWORKS (TEL-NET), 2017, : 366 - 370
  • [25] Hybrid Cloud Security by Revocable KUNodes-Storage with Identity-Based Encryption
    Saravanakumar, S.
    Chitra, S.
    COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2022, 43 (03): : 985 - 996
  • [26] Security Enhanced Cloud Storage Access Control System Based on Attribute Based Encryption
    Wang, Yong
    Sun, Qingyu
    Ma, Yuan
    Zhang, Ji
    Liu, Zhenyan
    Xue, Jingfeng
    2018 INTERNATIONAL CONFERENCE ON BIG DATA AND ARTIFICIAL INTELLIGENCE (BDAI 2018), 2018, : 52 - 57
  • [27] Favored Encryption Techniques for Cloud Storage
    Song, Chungsik
    Park, Younghee
    Gao, Jerry
    Nanduri, Sri Kinnera
    Zegers, William
    2015 IEEE FIRST INTERNATIONAL CONFERENCE ON BIG DATA COMPUTING SERVICE AND APPLICATIONS (BIGDATASERVICE 2015), 2015, : 267 - 274
  • [28] Security Analysis on a Public POR scheme in Cloud Storage
    Zhang, Jianhong
    Tang, Wenjing
    MECHATRONICS ENGINEERING, COMPUTING AND INFORMATION TECHNOLOGY, 2014, 556-562 : 5395 - 5399
  • [29] Enforcing Privacy and Security in Public Cloud Storage
    Resende, Joao S.
    Martins, Rolando
    Antunes, Luis
    2018 16TH ANNUAL CONFERENCE ON PRIVACY, SECURITY AND TRUST (PST), 2018, : 309 - 313
  • [30] An efficient algorithm for data security in cloud storage
    Azougaghe, Ali
    Kartit, Zaid
    Hedabou, Mustapha
    Belkasmi, Mostafa
    El Marraki, Mohamed
    2015 15TH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS DESIGN AND APPLICATIONS (ISDA), 2015, : 421 - 427