A New Model of Data Protection on Cloud Storage

This paper focuses on studying cloud storage data protection model and implementing encrypted storage of user data in double-key form. User data are encrypted with symmetric encryption algorithm and this secret key is encrypted with asymmetric encryption algorithm. The private key is managed and controlled by users. In this way, users guarantee the security of their own data with the sole private key. Providing effective protection for uploading and downloading of user data and good data storage and transmission support for cloud storage application through the data protection mechanism deployed at client, thus solving the biggest obstacle, i.e. security of cloud data in the application of cloud storage enterprises currently to a certain extent.

[1]  Dawn Xiaodong Song,et al.  Practical techniques for searches on encrypted data , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.

[2]  Christos Makris,et al.  Efficient and adaptive discovery techniques of Web Services handling large data sets , 2006, J. Syst. Softw..

[3]  Benny Pinkas,et al.  Proofs of ownership in remote storage systems , 2011, CCS '11.

[4]  Vladimir Cretu,et al.  Threats and Countermeasures in GSM Networks , 2006, J. Networks.

[5]  Ciprian Dobre,et al.  MonALISA: An agent based, dynamic service system to monitor, control and optimize distributed systems , 2009, Comput. Phys. Commun..

[6]  Vikram Srinivasan,et al.  Localized Recursive Estimation in Energy Constrained Wireless Sensor Networks , 2006, J. Networks.

[7]  Elaine Shi,et al.  Towards Practical Oblivious RAM , 2011, NDSS.

[8]  Ariel J. Feldman,et al.  SPORC: Group Collaboration using Untrusted Cloud Resources , 2010, OSDI.

[9]  Randy H. Katz,et al.  Above the Clouds: A Berkeley View of Cloud Computing , 2009 .

[10]  Zhang Fei-fei Research on Key Technologies of Cloud Storage , 2012 .

[11]  Haibo Li,et al.  Vibrotactile Rendering of Human Emotions on the Manifold of Facial Expressions , 2008, J. Multim..

[12]  P. Mell,et al.  The NIST Definition of Cloud Computing , 2011 .

[13]  Xiaoheng Deng,et al.  An Enforceable Incentive Scheme in Wireless Multi-path Inter-session Network Coding Game , 2012, J. Networks.

[14]  Saurabh Bagchi,et al.  A study of soft error consequences in hard disk drives , 2012, IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2012).

[15]  Andrea Bondavalli,et al.  Towards a Framework for Self-Adaptive Reliable Network Services in Highly-Uncertain Environments , 2010, 2010 13th IEEE International Symposium on Object/Component/Service-Oriented Real-Time Distributed Computing Workshops.