cloud storage security name: mingke chen. cloud computing advantages: security privacy...

6
Cloud Storage Security Name: Mingke Chen

Upload: clay-ingraham

Post on 15-Dec-2015

212 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Cloud Storage Security Name: Mingke Chen. Cloud Computing Advantages: Security Privacy Disadvantages: Backup and Recovery Almost Unlimited Storage Efficiency

Cloud Storage Security

Name: Mingke Chen

Page 2: Cloud Storage Security Name: Mingke Chen. Cloud Computing Advantages: Security Privacy Disadvantages: Backup and Recovery Almost Unlimited Storage Efficiency

Cloud Computing

Advantages:

 •Security•Privacy

Disadvantages:

• Backup and Recovery• Almost Unlimited Storage• Efficiency and Performance Increasing

Page 3: Cloud Storage Security Name: Mingke Chen. Cloud Computing Advantages: Security Privacy Disadvantages: Backup and Recovery Almost Unlimited Storage Efficiency

Cloud Computing Storage Security Issues:

1.Traditional Security problems

2. Law Issue

3. Third party Issue

Page 4: Cloud Storage Security Name: Mingke Chen. Cloud Computing Advantages: Security Privacy Disadvantages: Backup and Recovery Almost Unlimited Storage Efficiency

Related Research for Storage Security:

1.Authorization:

2.Encryption:

3. Segmentation:

• Multi-level authorization

• The Face Fuzzy Vault

• RSA Encryption• AES Encryption • Hybrid Encryption

• Metadata Based Storage Model• Multi-cloud Architecture Model

DATA

PART 1 PART 2COPY 1 COPY 2

SERVER SERVER SERVER SERVER

Figure: Segmentation Backup System

Page 5: Cloud Storage Security Name: Mingke Chen. Cloud Computing Advantages: Security Privacy Disadvantages: Backup and Recovery Almost Unlimited Storage Efficiency

Figure: Multi-cloud Architecture ModelTable: Metadata Based Storage Model Level

Page 6: Cloud Storage Security Name: Mingke Chen. Cloud Computing Advantages: Security Privacy Disadvantages: Backup and Recovery Almost Unlimited Storage Efficiency

REFERENCES:[1] L. Wentao, "Research on cloud computing security problem and strategy," in Consumer Electronics, Communications and Networks (CECNet), 2012 2nd International Conference on, 2012, pp. 1216-1219. [2] H. Bakshi, M. Mulla, N. Dutta, and V. Shinde, "Multi Cloud Architecture to Provide Data Security And Integrity," IJETAE, vol. 3, 2013.[3] E. Chang, T. Dillon, and W. Chen, "Cloud Computing: Issues and Challenges," in Advanced Information Networking and Applications (AINA), 2010 24th IEEE International Conference on, 2010, pp. 27-33.[4] C. Zhibin and Y. Jianfeng, "Cloud Computing Research and Security Issues," in Computational Intelligence and Software Engineering (CiSE), 2010 International Conference on, 2010, pp. 1-3.[5] A. Y. Chang, C. Chun-Jung, L. Uei-Chin, and T. Chang-Lung, "Information security issue of enterprises adopting the application of cloud computing," in Networked Computing and Advanced Information Management (NCM), 2010 Sixth International Conference on, 2010, pp. 645-649.[6] P. Sanghavi and V. Joshi, "Three tier data storage security in cloud using Face fuzzy vault," in Computing, Communication and Applications (ICCCA), 2012 International Conference on, 2012, pp. 1-6.[7] A. Bogdanov, C. Paar, M. Wienecke, and T. Eisenbarth, "Differential cache-collision timing attacks on AES with applications to embedded CPUs," in Topics in Cryptology-CT-RSA 2010, ed: Springer, 2010, pp. 235-251.[8] L. Weiwei, L. Mingqi, and Y. Chao, "A Novel Triple Encryption Scheme for Hadoop-Based Cloud Data Security," in Emerging Intelligent Data and Web Technologies (EIDWT), 2013 Fourth International Conference on, 2013, pp. 437-442.[9] C. SelvaKumar, M. R. Sumalatha, and M. Venkatesh, "Improving public auditability, data possession in data storage security for cloud computing," in Recent Trends In Information Technology (ICRTIT), 2012 International Conference on, 2012, pp. 463-467.