1 / 6

Cloud Storage Security

Cloud Storage Security. Name: Mingke Chen. Advantages:. Backup and Recovery Almost Unlimited Storage Efficiency and Performance Increasing. Cloud Computing. Disadvantages:. Security Privacy. Cloud Computing Storage Security Issues:. Traditional Security problems. 2. Law Issue.

Download Presentation

Cloud Storage Security

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Cloud Storage Security Name: Mingke Chen

  2. Advantages: • Backup and Recovery • Almost Unlimited Storage • Efficiency and Performance Increasing Cloud Computing Disadvantages: • Security • Privacy

  3. Cloud Computing Storage Security Issues: • Traditional Security problems 2. Law Issue 3. Third party Issue

  4. Related Research for Storage Security: 1.Authorization: • Multi-level authorization • The Face Fuzzy Vault 2.Encryption: • RSA Encryption • AES Encryption • Hybrid Encryption 3. Segmentation: • Metadata Based Storage Model • Multi-cloud Architecture Model Figure: Segmentation Backup System

  5. Table: Metadata Based Storage Model Level Figure: Multi-cloud Architecture Model

  6. REFERENCES: [1] L. Wentao, "Research on cloud computing security problem and strategy," in Consumer Electronics, Communications and Networks (CECNet), 2012 2nd International Conference on, 2012, pp. 1216-1219. [2] H. Bakshi, M. Mulla, N. Dutta, and V. Shinde, "Multi Cloud Architecture to Provide Data Security And Integrity," IJETAE, vol. 3, 2013. [3] E. Chang, T. Dillon, and W. Chen, "Cloud Computing: Issues and Challenges," in Advanced Information Networking and Applications (AINA), 2010 24th IEEE International Conference on, 2010, pp. 27-33. [4] C. Zhibin and Y. Jianfeng, "Cloud Computing Research and Security Issues," in Computational Intelligence and Software Engineering (CiSE), 2010 International Conference on, 2010, pp. 1-3. [5] A. Y. Chang, C. Chun-Jung, L. Uei-Chin, and T. Chang-Lung, "Information security issue of enterprises adopting the application of cloud computing," in Networked Computing and Advanced Information Management (NCM), 2010 Sixth International Conference on, 2010, pp. 645-649. [6] P. Sanghavi and V. Joshi, "Three tier data storage security in cloud using Face fuzzy vault," in Computing, Communication and Applications (ICCCA), 2012 International Conference on, 2012, pp. 1-6. [7] A. Bogdanov, C. Paar, M. Wienecke, and T. Eisenbarth, "Differential cache-collision timing attacks on AES with applications to embedded CPUs," in Topics in Cryptology-CT-RSA 2010, ed: Springer, 2010, pp. 235-251. [8] L. Weiwei, L. Mingqi, and Y. Chao, "A Novel Triple Encryption Scheme for Hadoop-Based Cloud Data Security," in Emerging Intelligent Data and Web Technologies (EIDWT), 2013 Fourth International Conference on, 2013, pp. 437-442. [9] C. SelvaKumar, M. R. Sumalatha, and M. Venkatesh, "Improving public auditability, data possession in data storage security for cloud computing," in Recent Trends In Information Technology (ICRTIT), 2012 International Conference on, 2012, pp. 463-467.

More Related