Study on Cloud Data Destruction Mechanism and its Application

被引:0
作者
Wu Jing [1 ]
Zhao Fengzhi [1 ]
Dong Yudan [1 ]
机构
[1] Northeast Petr Univ, Daqing 1163318, Heilongjiang, Peoples R China
来源
APPLIED MECHANICS AND MATERIALS II, PTS 1 AND 2 | 2014年 / 477-478卷
关键词
Cloud Computing; Data Security; Data Coverage;
D O I
10.4028/www.scientific.net/AMM.477-478.1487
中图分类号
TH [机械、仪表工业];
学科分类号
0802 ;
摘要
The cloud data security is the primary concern users, especially in multi-tenant cloud environments residual data can cause data leakage problem, but most of the cloud service providers do not provide data processing residual solution. This study was designed HDFS multi- level security mechanisms and data destruction and data based on bidirectional heartbeat overwrite technology combined with the data from the destruction mechanism to ensure effective destruction of data under the premise of safety requirements and performance can be achieved demand balance.
引用
收藏
页码:1487 / 1490
页数:4
相关论文
共 7 条
[1]  
[Anonymous], NETWORK SYSTEM SECUR
[2]   Risk perception and risk management in cloud computing: Results from a case study of Swiss companies [J].
Brender, Nathalie ;
Markov, Iliya .
INTERNATIONAL JOURNAL OF INFORMATION MANAGEMENT, 2013, 33 (05) :726-733
[3]   A multi-objective ant colony system algorithm for virtual machine placement in cloud computing [J].
Gao, Yongqiang ;
Guan, Haibing ;
Qi, Zhengwei ;
Hou, Yang ;
Liu, Liang .
JOURNAL OF COMPUTER AND SYSTEM SCIENCES, 2013, 79 (08) :1230-1242
[4]   Process virtualization of large-scale lidar data in a cloud computing environment [J].
Guan, Haiyan ;
Li, Jonathan ;
Zhong, Liang ;
Yu, Yongtao ;
Chapman, Michael .
COMPUTERS & GEOSCIENCES, 2013, 60 :109-116
[5]   Protecting the privacy and security of sensitive customer data in the cloud [J].
King, Nancy J. ;
Raja, V. T. .
COMPUTER LAW & SECURITY REVIEW, 2012, 28 (03) :308-319
[6]  
Ruixuan L., 2013, FUTURE GENERAT UNPUB
[7]   Data protection in cloud computing - The Swedish perspective [J].
Svantesson, Dan Jerker B. .
COMPUTER LAW & SECURITY REVIEW, 2012, 28 (04) :476-480