Emerging Issues in Cloud Storage Security: Encryption, Key Management, Data Redundancy, Trust Mechanism

Cloud computing is one of the most cutting-edge advanced technologies around the world. According to the recent research, many CIOs who work for famous corporation mentioned that security issues have been the most critical obstacles in the adoption of cloud technology. As one of the prominent application of cloud computing, cloud storage has attracted more concerns; however, many security problems existing in cloud storage need to be resolved. This applied research paper briefly analyzes the development of cloud storage security, comprehensive discussion of several general solutions to those problems introducing several non-technical issues, such as third-party issues, trust mechanism in cloud computing. Finally, some possible improvement to those solutions is provided.

[1]  Herbert J. Mattord,et al.  Principles of Information Security , 2004 .

[2]  Sanjay Ghemawat,et al.  MapReduce: Simplified Data Processing on Large Clusters , 2004, OSDI.

[3]  Pradeep K. Khosla,et al.  Selecting the Right Data Distribution Scheme for a Survivable Storage System (CMU-CS-01-120) , 2001 .

[4]  Michael O. Rabin,et al.  Efficient dispersal of information for security, load balancing, and fault tolerance , 1989, JACM.

[5]  Ari Juels,et al.  HAIL: a high-availability and integrity layer for cloud storage , 2009, CCS.

[6]  Charles J. Kacmar,et al.  The impact of initial consumer trust on intentions to transact with a web site: a trust building model , 2002, J. Strateg. Inf. Syst..

[7]  Peng Liu,et al.  CLOUD SHREDDER: Removing the Laptop On-road Data Disclosure Threat in the Cloud Computing Era , 2011, 2011IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications.

[8]  Eric Pardede,et al.  MCDB: Using Multi-clouds to Ensure Security in Cloud Computing , 2011, 2011 IEEE Ninth International Conference on Dependable, Autonomic and Secure Computing.

[9]  Bharat K. Bhargava,et al.  Protection of Identity Information in Cloud Computing without Trusted Third Party , 2010, 2010 29th IEEE Symposium on Reliable Distributed Systems.

[10]  S. N. Brohi,et al.  Identifying and analyzing security threats to Virtualized Cloud Computing Infrastructures , 2012, 2012 International Conference on Cloud Computing Technologies, Applications and Management (ICCCTAM).

[11]  Izak Benbasat,et al.  The Effects of Personalizaion and Familiarity on Trust and Adoption of Recommendation Agents , 2006, MIS Q..

[12]  Shuai Han,et al.  Ensuring data storage security through a novel third party auditor scheme in cloud computing , 2011, 2011 IEEE International Conference on Cloud Computing and Intelligence Systems.

[13]  Weiyi Zhang,et al.  A secured cost-effective multi-cloud storage in cloud computing , 2011, 2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).

[14]  Hakim Weatherspoon,et al.  RACS: a case for cloud storage diversity , 2010, SoCC '10.