Design and Implementation of cloud storage security system

被引:0
作者
Zhou, Meirong [1 ]
Jiang, Zhengtao [1 ]
机构
[1] Commun Univ China, Beijing, Peoples R China
来源
ADVANCES IN MANUFACTURING TECHNOLOGY, PTS 1-4 | 2012年 / 220-223卷
关键词
Cloud storage; Authentication Management; Privacy protection; Access control;
D O I
10.4028/www.scientific.net/AMM.220-223.2325
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
The user identity information management and authentication, safety of the stored data in the cloud storage environment are the challenges of cloud security, all these have drawn attention of researchers in recent years. We made a security model of cloud storage: the model adopts many encryption methods to protect the user data and user identity information stored in the cloud storage management server, only authorized users can use cloud service. At last, we gave security analysis of the model, the result shows: the architecture is able to hide the characteristics of the data stored in the cloud server, certify and protect user identity information effectively.
引用
收藏
页码:2325 / 2329
页数:5
相关论文
共 9 条
[1]  
[Anonymous], 2010, NSDI
[2]  
[Anonymous], 2008489 CRYPT EPRINT
[3]  
Hao Wen, 2012, NETINFO SECURITY, V12, P38
[4]  
Heitzmann Alexander, 2008, OCT 2008 P 4 ACM INT, P43
[5]  
Huang Ruwei, 2011, J COMPUTERS, V14, P2391
[6]   Privacy as a Service: Privacy-Aware Data Storage and Processing in Cloud Computing Architectures [J].
Itani, Wassim ;
Kayssi, Ayman ;
Chehab, Ali .
EIGHTH IEEE INTERNATIONAL CONFERENCE ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING, PROCEEDINGS, 2009, :711-716
[7]  
Mao Jian, 2011, J TSINGHUA U, V23, P1363
[8]  
Mowbray M, 2009, P 4 INT ICST C COMM
[9]  
Wang Cong, 2009, 2009 IEEE, P1, DOI [10.1109/IWQos.2009.5201385, DOI 10.1109/IWQOS.2009.5201385]