An Autonomous Security Storage Solution for Data-Intensive Cooperative Cloud Computing

In order to reduce untrustworthy between cloud users and the underlying cloud storage platform, a novel cloud security storage solution is proposed based on autonomous data storage, management, and access control. The roles of users are re-evaluated, and the knowledge provided by the users is incorporated into the cloud storage model. Both the superiority of the public cloud in large scale data storage and the advantages of the private cloud in privacy preserving can be obtained. The main advantages of our approach include avoiding the superposition of complex security policies and overcoming the mistrust between the users and the platform. Furthermore, our security storage service can be easily integrated into the cooperative cloud computing environment. A prototype system is developed, and a use case is also presented.

[1]  Dengguo Feng,et al.  A secure and efficient revocation scheme for fine-grained access control in cloud storage , 2012, 4th IEEE International Conference on Cloud Computing Technology and Science Proceedings.

[2]  Salve Bhagyashri Salve Bhagyashri,et al.  Privacy-Preserving Public Auditing For Secure Cloud Storage , 2014 .

[3]  Robert H. Deng,et al.  Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage , 2014, IEEE Transactions on Parallel and Distributed Systems.

[4]  Zhen Xiao,et al.  Dynamic Resource Allocation Using Virtual Machines for Cloud Computing Environment , 2013, IEEE Transactions on Parallel and Distributed Systems.

[5]  M. Anwar Hasan,et al.  Enabling Dynamic Data and Indirect Mutual Trust for Cloud Computing Storage Systems , 2013, IEEE Transactions on Parallel and Distributed Systems.

[6]  David W. Chadwick,et al.  A privacy preserving authorisation system for the cloud , 2012, J. Comput. Syst. Sci..

[7]  Haider Abbas,et al.  A framework for preservation of cloud users' data privacy using dynamic reconstruction of metadata , 2013, J. Netw. Comput. Appl..

[8]  Cees T. A. M. de Laat,et al.  Planning Data Intensive Workflows on Inter-domain Resources Using the Network Service Interface (NSI) , 2012, 2012 SC Companion: High Performance Computing, Networking Storage and Analysis.

[9]  M. Mrinalni Vaknishadh,et al.  Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing , 2012 .

[10]  Yong Tang,et al.  Trusted Data Sharing over Untrusted Cloud Storage Providers , 2010, 2010 IEEE Second International Conference on Cloud Computing Technology and Science.