A Cloud Provider-Agnostic Secure Storage Protocol

被引:0
作者
Virvilis, Nikos [1 ]
Dritsas, Stelios [1 ]
Gritzalis, Dimitris [1 ]
机构
[1] AUEB, Dept Informat, Informat Secur & Crit Infrastruct Protect Res Grp, 76 Patission Ave, GR-10434 Athens, Greece
来源
CRITICAL INFORMATION INFRASTRUCTURES SECURITY, (CRITIS 2010) | 2010年 / 6712卷
关键词
Cloud Computing; Security; Storage Services; Confidentiality; Integrity;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Over the last years Cloud Computing has been seen as an emerging technology, which has changed the way computing services are delivered. Cloud computing is not a new technology paradigm, but rather introduces a new way of delivering computing services and resources. On top of its potential value and the several advantages it offers, we can foresee a number of drawbacks of cloud computing, in terms of security and privacy issues. In specific, cloud computing raises the level of expertise needed to protect security and privacy of its stakeholders (i.e. organizations and end-users), mainly due to the fact that the massive concentration of computer resources and data could be a more attractive target to malicious users. In this paper, we present a cloud provider-agnostic model for outsourcing both static and dynamic data to third parties, while preserving their confidentiality and integrity. In addition to a detailed presentation of our model, we also depict an evaluation of it, in terms of its capabilities and weaknesses.
引用
收藏
页码:104 / 115
页数:12
相关论文
共 50 条
  • [31] Techniques of secure storage for cloud data
    Feng, Chao-Sheng
    Qin, Zhi-Guang
    Yuan, Ding
    Jisuanji Xuebao/Chinese Journal of Computers, 2015, 38 (01): : 150 - 163
  • [32] Secure Cloud WLAN using Dynamic Placement and Migration with a Cloud Name Resolution Protocol
    Alharbi, Rowida
    Elleithy, Khaled
    Alharbi, Alaa
    Elmannai, Wafa
    2015 IEEE LONG ISLAND SYSTEMS, APPLICATIONS AND TECHNOLOGY CONFERENCE (LISAT), 2015,
  • [33] Secure proof of storage with deduplication for cloud storage systems
    Youngjoo Shin
    Dongyoung Koo
    Junbeom Hur
    Joobeom Yun
    Multimedia Tools and Applications, 2017, 76 : 19363 - 19378
  • [34] Secure proof of storage with deduplication for cloud storage systems
    Shin, Youngjoo
    Koo, Dongyoung
    Hur, Junbeom
    Yun, Joobeom
    MULTIMEDIA TOOLS AND APPLICATIONS, 2017, 76 (19) : 19363 - 19378
  • [35] PCSP: A Protected Cloud Storage Provider employing light weight techniques
    Srisakthi, S.
    Ansari, Gufran Ahmad
    INFORMATION SECURITY JOURNAL, 2022, 31 (02): : 214 - 225
  • [36] Evaluating a file fragmentation system for multi-provider cloud storage
    1600, West University of Timisoara (14): : 265 - 277
  • [37] A Framework to Secure Medical Image Storage in Cloud Computing Environment
    Marwan, Mbarek
    Kartit, Ali
    Ouahmane, Hassan
    JOURNAL OF ELECTRONIC COMMERCE IN ORGANIZATIONS, 2018, 16 (01) : 1 - 16
  • [38] A Secure Data Dynamics and Public Auditing Scheme for Cloud Storage
    Singh, Premlata
    Saroj, Sushil Kr
    2020 6TH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING AND COMMUNICATION SYSTEMS (ICACCS), 2020, : 695 - 700
  • [39] EVALUATING A FILE FRAGMENTATION SYSTEM FOR MULTI-PROVIDER CLOUD STORAGE
    Villari, Massimo
    Celesti, Antonio
    Fazio, Maria
    Puliafito, Antonio
    SCALABLE COMPUTING-PRACTICE AND EXPERIENCE, 2013, 14 (04): : 265 - 277
  • [40] Secure Big Data Storage and Sharing Scheme for Cloud Tenants
    CHENG Hongbing
    RONG Chunming
    HWANG Kai
    WANG Weihong
    LI Yanyan
    中国通信, 2015, 12 (06) : 106 - 115