A Cloud Provider-Agnostic Secure Storage Protocol

被引:0
作者
Virvilis, Nikos [1 ]
Dritsas, Stelios [1 ]
Gritzalis, Dimitris [1 ]
机构
[1] AUEB, Dept Informat, Informat Secur & Crit Infrastruct Protect Res Grp, 76 Patission Ave, GR-10434 Athens, Greece
来源
CRITICAL INFORMATION INFRASTRUCTURES SECURITY, (CRITIS 2010) | 2010年 / 6712卷
关键词
Cloud Computing; Security; Storage Services; Confidentiality; Integrity;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Over the last years Cloud Computing has been seen as an emerging technology, which has changed the way computing services are delivered. Cloud computing is not a new technology paradigm, but rather introduces a new way of delivering computing services and resources. On top of its potential value and the several advantages it offers, we can foresee a number of drawbacks of cloud computing, in terms of security and privacy issues. In specific, cloud computing raises the level of expertise needed to protect security and privacy of its stakeholders (i.e. organizations and end-users), mainly due to the fact that the massive concentration of computer resources and data could be a more attractive target to malicious users. In this paper, we present a cloud provider-agnostic model for outsourcing both static and dynamic data to third parties, while preserving their confidentiality and integrity. In addition to a detailed presentation of our model, we also depict an evaluation of it, in terms of its capabilities and weaknesses.
引用
收藏
页码:104 / 115
页数:12
相关论文
共 50 条
  • [41] Public Auditing System: Improved Remote Data Possession Checking Protocol for Secure Cloud Storage
    Rashmi, Patil R.
    Sangve, S. M.
    [J]. PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON APPLIED AND THEORETICAL COMPUTING AND COMMUNICATION TECHNOLOGY (ICATCCT), 2015, : 75 - 80
  • [42] A Traceable Signcryption Scheme for Secure Sharing of Data in Cloud Storage
    Ahuja, Rohit
    Mohanty, Sraban Kumar
    Sakurai, Kouichi
    [J]. 2016 IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION TECHNOLOGY (CIT), 2016, : 524 - 531
  • [43] Secure Big Data Storage and Sharing Scheme for Cloud Tenants
    Cheng Hongbing
    Rong Chunming
    Hwang Kai
    Wang Weihong
    Li Yanyan
    [J]. CHINA COMMUNICATIONS, 2015, 12 (06) : 106 - 115
  • [44] Secure auditing and deduplication with efficient ownership management for cloud storage
    Wang, Min
    Xu, Lujun
    Hao, Rong
    Yang, Ming
    [J]. JOURNAL OF SYSTEMS ARCHITECTURE, 2023, 142
  • [45] Domain Based Storage Protection with Secure Access Control for the Cloud
    Paladi, Nicolae
    Michalas, Antonis
    Gehrmann, Christian
    [J]. SCC'14: PROCEEDINGS OF THE 2ND INTERNATIONAL WORKSHOP ON SECURITY IN CLOUD COMPUTING, 2014, : 35 - 42
  • [46] Developing a Provable Secure and Cloud-Centric Authentication Protocol for the e-Healthcare System
    Alzahrani, Abdulrahman
    [J]. IEEE ACCESS, 2024, 12 : 183665 - 183687
  • [47] A Lightweight Encryption and Secure Protocol for Smartphone Cloud
    Zegers, William
    Chang, Sang-Yoon
    Park, Younghee
    Gao, Jerry
    [J]. 9TH IEEE INTERNATIONAL SYMPOSIUM ON SERVICE-ORIENTED SYSTEM ENGINEERING (SOSE 2015), 2015, : 259 - 266
  • [48] ES-DAS: An Enhanced and Secure Dynamic Auditing Scheme for Data Storage in Cloud Environment
    Daniel, Esther
    Vasanthi, N. A.
    [J]. JOURNAL OF INTERNET TECHNOLOGY, 2020, 21 (01): : 173 - 182
  • [49] Design of secure protocol for session key exchange in vehicular cloud computing
    Kang, Jungho
    Park, Jong Hyuk
    [J]. Lecture Notes in Electrical Engineering, 2015, 373 : 249 - 254
  • [50] Secure Cloud Storage Using AES Encryption
    Babitha, M. P.
    Babu, K. R. Remesh
    [J]. 2016 INTERNATIONAL CONFERENCE ON AUTOMATIC CONTROL AND DYNAMIC OPTIMIZATION TECHNIQUES (ICACDOT), 2016, : 859 - 864