Cloud Storage Encryption Security Analysis

被引:0
作者
Zhang Jing [1 ]
Wang Jinsu [1 ]
Zheng Zhuangfeng [1 ]
Zhao Chongan [1 ]
机构
[1] City Univ Hong Kong, Hong Kong, Hong Kong, Peoples R China
来源
PROCEEDINGS OF 2016 IEEE INTERNATIONAL CONFERENCE ON CLOUD COMPUTING AND BIG DATA ANALYSIS (ICCCBDA 2016) | 2016年
关键词
cloud storage; anonymous; encryption; security;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the increase of network bandwidth and the popularity of Internet, cloud storage has become one of the most widely used of cloud computing. Since the user may have a variety of terminal such as PC, notebook computers, tablet PCs and smart phones, and may access data in different places and on different terminal, cloud storage provides the most suitable solution to share data between these devices. However, due to various reasons, many users have suspicions about the security of cloud storage, worrying that their information would be lost or stolen. As a result, it is difficult to apply cloud storage in large scale. In this paper, we try to set a safety model with a new encryption strategy for cloud storage, and we analyze the model's security also. Finally we propose more technology problems that we need to solve.
引用
收藏
页码:62 / 65
页数:4
相关论文
共 50 条
  • [31] Complying with Security Requirements in Cloud Storage Systems
    Roman, Rodrigo
    Felipe, Miguel Rodel
    Gene, Phua Eu
    Zhou, Jianying
    JOURNAL OF COMPUTERS, 2016, 11 (03) : 201 - 206
  • [32] Cloud data security with hybrid symmetric encryption
    Kaushik, Shweta
    Gandhi, Charu
    2016 INTERNATIONAL CONFERENCE ON COMPUTATIONAL TECHNIQUES IN INFORMATION AND COMMUNICATION TECHNOLOGIES (ICCTICT), 2016,
  • [33] Research on Cloud Storage Security
    Chen, Wei
    Zhao, Yuelong
    Long, Saiqin
    Xie, Xiaoling
    INFORMATION TECHNOLOGY APPLICATIONS IN INDUSTRY, PTS 1-4, 2013, 263-266 : 3068 - +
  • [34] Chaotic Searchable Encryption for Mobile Cloud Storage
    Awad, Abir
    Matthews, Adrian
    Qiao, Yuansong
    Lee, Brian
    IEEE TRANSACTIONS ON CLOUD COMPUTING, 2018, 6 (02) : 440 - 452
  • [35] Secure Cloud Storage Using AES Encryption
    Babitha, M. P.
    Babu, K. R. Remesh
    2016 INTERNATIONAL CONFERENCE ON AUTOMATIC CONTROL AND DYNAMIC OPTIMIZATION TECHNIQUES (ICACDOT), 2016, : 859 - 864
  • [36] ESPRESSO: An Encryption as a Service for Cloud Storage Systems
    Kang, Seungmin
    Veeravalli, Bharadwaj
    Aung, Khin Mi Mi
    MONITORING AND SECURING VIRTUALIZED NETWORKS AND SERVICES, 2014, 8508 : 15 - 28
  • [37] Secure data storage in the cloud with homomorphic encryption
    Bensitel, Yasmina
    Romadi, Rahal
    2016 2ND INTERNATIONAL CONFERENCE ON CLOUD COMPUTING TECHNOLOGIES AND APPLICATIONS (CLOUDTECH), 2016, : 1 - 6
  • [38] Understanding Users' Preferences for Privacy and Security Features - A Conjoint Analysis of Cloud Storage Services
    Naous, Dana
    Legner, Christine
    BUSINESS INFORMATION SYSTEMS WORKSHOPS, BIS 2019, 2019, 373 : 352 - 365
  • [39] Multi-security-level cloud storage system based on improved proxy re-encryption
    Jinan Shen
    Xuejian Deng
    Zhenwu Xu
    EURASIP Journal on Wireless Communications and Networking, 2019
  • [40] Efficient Cloud Storage Confidentiality to Ensure Data Security
    Arockiam, L.
    Monikandan, S.
    2014 INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND INFORMATICS (ICCCI), 2014,