Two-Phased Protocol for Providing Data Confidentiality in Cloud Storage Environments

被引:0
作者
Butoi, Alexandru [1 ]
Morar, Gabriela Andreea [1 ]
Ilea, Andreea [1 ]
机构
[1] Univ Babes Bolyai, Fac Econ & Business Adm, R-3400 Cluj Napoca, Romania
来源
BUSINESS INFORMATION SYSTEMS WORKSHOPS, BIS 2012 | 2012年 / 127卷
关键词
cloud computing security; data confidentiality; cloud storage; protocol; middleware;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In expanding fields, such as cloud computing, one of the greatest concerns is related to data security. Transferring and storing data to a cloud computing infrastructure raises many issues related to data privacy and data integrity. In this context, we propose 1 a protocol designed to provide data storage confidentiality in the cloud. The protocol implies splitting the data into small encrypted data chunks, dispersed into data storage volumes. It is a two phased protocol that handles separately the operations related to writing the data to the storage volumes and the operations of retrieving data from the corresponding volumes.
引用
收藏
页码:220 / 230
页数:11
相关论文
共 40 条
[31]   Differentially private client-side data deduplication protocol for cloud storage services [J].
Shin, Youngjoo ;
Kim, Kwangjo .
SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (12) :2114-2123
[32]   Two-Factor Data Security Protection Mechanism for Cloud Storage System [J].
Liu, Joseph K. ;
Liang, Kaitai ;
Susilo, Willy ;
Liu, Jianghua ;
Xiang, Yang .
IEEE TRANSACTIONS ON COMPUTERS, 2016, 65 (06) :1992-2004
[33]   Cryptanalysis of Remote Data Integrity Checking Protocol Proposed by L. Chen for Cloud Storage [J].
Fu, Shaojing ;
Wang, Dongsheng ;
Xu, Ming ;
Ren, Jiangchun .
IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2014, E97A (01) :418-420
[34]   A Publicly Verifiable Dynamic Secret Sharing Protocol for Secure and Dependable Data Storage in Cloud Computing [J].
Kumar, P. Syam ;
Ashok, Marie Stanislas ;
Subramanian, R. .
INTERNATIONAL JOURNAL OF CLOUD APPLICATIONS AND COMPUTING, 2012, 2 (03) :1-25
[35]   An efficient secure Internet of things data storage auditing protocol with adjustable parameter in cloud computing [J].
Liu, Meng ;
Wang, Xuan ;
Yang, Chi ;
Jiang, Zoe Lin ;
Li, Ye .
INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2017, 13 (01)
[36]   A secure data sharing scheme with cheating detection based on Chaum-Pedersen protocol for cloud storage [J].
Wang, Xin ;
Yang, Bo ;
Xia, Zhe ;
Hou, Hong-xia .
FRONTIERS OF INFORMATION TECHNOLOGY & ELECTRONIC ENGINEERING, 2019, 20 (06) :787-800
[37]   A secure data sharing scheme with cheating detection based on Chaum-Pedersen protocol for cloud storage [J].
Xin Wang ;
Bo Yang ;
Zhe Xia ;
Hong-xia Hou .
Frontiers of Information Technology & Electronic Engineering, 2019, 20 :787-800
[38]   Two-party interactive secure deduplication with efficient data ownership management in cloud storage [J].
Guo, Cheng ;
Wang, Litao ;
Tang, Xinyu ;
Feng, Bin ;
Zhang, Guofeng .
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2023, 73
[39]   Fine-Grained Two-Factor Protection Mechanism for Data Sharing in Cloud Storage [J].
Zuo, Cong ;
Shao, Jun ;
Liu, Joseph K. ;
Wei, Guiyi ;
Ling, Yun .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2018, 13 (01) :186-196
[40]   A Two-level Cloud Storage System Based on Asynchronous Message for Medical Image Big Data [J].
Li, Wei ;
Feng, Chaolu ;
Jin, Ci ;
Chen, Qiang ;
Liu, Haining ;
Zhao, Dazhe .
5TH INTERNATIONAL CONFERENCE ON BIG DATA COMPUTING AND COMMUNICATIONS (BIGCOM 2019), 2019, :54-58