Study on Cloud Data Destruction Mechanism and its Application

被引:0
作者
Wu Jing [1 ]
Zhao Fengzhi [1 ]
Dong Yudan [1 ]
机构
[1] Northeast Petr Univ, Daqing 1163318, Heilongjiang, Peoples R China
来源
APPLIED MECHANICS AND MATERIALS II, PTS 1 AND 2 | 2014年 / 477-478卷
关键词
Cloud Computing; Data Security; Data Coverage;
D O I
10.4028/www.scientific.net/AMM.477-478.1487
中图分类号
TH [机械、仪表工业];
学科分类号
0802 ;
摘要
The cloud data security is the primary concern users, especially in multi-tenant cloud environments residual data can cause data leakage problem, but most of the cloud service providers do not provide data processing residual solution. This study was designed HDFS multi- level security mechanisms and data destruction and data based on bidirectional heartbeat overwrite technology combined with the data from the destruction mechanism to ensure effective destruction of data under the premise of safety requirements and performance can be achieved demand balance.
引用
收藏
页码:1487 / 1490
页数:4
相关论文
共 7 条
  • [1] [Anonymous], NETWORK SYSTEM SECUR
  • [2] Risk perception and risk management in cloud computing: Results from a case study of Swiss companies
    Brender, Nathalie
    Markov, Iliya
    [J]. INTERNATIONAL JOURNAL OF INFORMATION MANAGEMENT, 2013, 33 (05) : 726 - 733
  • [3] A multi-objective ant colony system algorithm for virtual machine placement in cloud computing
    Gao, Yongqiang
    Guan, Haibing
    Qi, Zhengwei
    Hou, Yang
    Liu, Liang
    [J]. JOURNAL OF COMPUTER AND SYSTEM SCIENCES, 2013, 79 (08) : 1230 - 1242
  • [4] Process virtualization of large-scale lidar data in a cloud computing environment
    Guan, Haiyan
    Li, Jonathan
    Zhong, Liang
    Yu, Yongtao
    Chapman, Michael
    [J]. COMPUTERS & GEOSCIENCES, 2013, 60 : 109 - 116
  • [5] Protecting the privacy and security of sensitive customer data in the cloud
    King, Nancy J.
    Raja, V. T.
    [J]. COMPUTER LAW & SECURITY REVIEW, 2012, 28 (03) : 308 - 319
  • [6] Ruixuan L., 2013, FUTURE GENERAT UNPUB
  • [7] Data protection in cloud computing - The Swedish perspective
    Svantesson, Dan Jerker B.
    [J]. COMPUTER LAW & SECURITY REVIEW, 2012, 28 (04) : 476 - 480