Design and Implementation of cloud storage security system

被引:0
|
作者
Zhou, Meirong [1 ]
Jiang, Zhengtao [1 ]
机构
[1] Commun Univ China, Beijing, Peoples R China
来源
关键词
Cloud storage; Authentication Management; Privacy protection; Access control;
D O I
10.4028/www.scientific.net/AMM.220-223.2325
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
The user identity information management and authentication, safety of the stored data in the cloud storage environment are the challenges of cloud security, all these have drawn attention of researchers in recent years. We made a security model of cloud storage: the model adopts many encryption methods to protect the user data and user identity information stored in the cloud storage management server, only authorized users can use cloud service. At last, we gave security analysis of the model, the result shows: the architecture is able to hide the characteristics of the data stored in the cloud server, certify and protect user identity information effectively.
引用
收藏
页码:2325 / 2329
页数:5
相关论文
共 50 条
  • [1] Design and Implementation of Security System for Cloud Storage
    Chueh, Ju-Shu
    Sun, Min-Te
    2017 19TH ASIA-PACIFIC NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM (APNOMS 2017): MANAGING A WORLD OF THINGS, 2017, : 129 - 134
  • [2] Design and Implementation of Security Cloud Storage Framework
    Yang Wei
    Zhao Jianpeng
    Zhu Junmao
    Zhong Wei
    Yao Xinlei
    PROCEEDINGS OF THE 2012 SECOND INTERNATIONAL CONFERENCE ON INSTRUMENTATION & MEASUREMENT, COMPUTER, COMMUNICATION AND CONTROL (IMCCC 2012), 2012, : 323 - 326
  • [3] Design and Implementation of an Improved Cloud Storage System
    Jiang, Hong
    Yu, Qingsong
    Huang, Kai
    2016 12TH INTERNATIONAL CONFERENCE ON NATURAL COMPUTATION, FUZZY SYSTEMS AND KNOWLEDGE DISCOVERY (ICNC-FSKD), 2016, : 1816 - 1823
  • [4] Design and implementation of rich client cloud storage system
    Computer and Information Engineering College, Inner Mongolia Normal University, Hohhot, China
    不详
    Int. J. Database Theory Appl., 2013, 4 (59-70):
  • [5] Security Design and Implementation of the Cloud-based Online System
    Chen, Wei
    Shang, Yuting
    2016 3RD INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY FOR EDUCATION (ICTE 2016), 2016, : 233 - 236
  • [6] Design and implementation of cloud-edge integrated security authentication system
    Chen, Cai-Sen
    Ji, Bo-Gong
    Kou, Ying-Zhan
    Du, Jia-Xing
    Journal of Computers (Taiwan), 2021, 32 (04) : 179 - 186
  • [7] Design of a Cloud Storage Security Encryption Algorithm for Power Bidding System
    Ding ManJiang
    Cao Kai
    Wang ZengXi
    Zhu LiPeng
    PROCEEDINGS OF 2020 IEEE 4TH INFORMATION TECHNOLOGY, NETWORKING, ELECTRONIC AND AUTOMATION CONTROL CONFERENCE (ITNEC 2020), 2020, : 1875 - 1879
  • [8] Design of Regenerating Code Based on Security Level in Cloud Storage System
    Zhang, Fan
    Xu, Jian
    Yang, Gangqiang
    ELECTRONICS, 2023, 12 (11)
  • [9] Design and implementation of a collaborative team-based cloud storage system
    Chanshik Lim
    Minsu Kang
    Sangjun Lee
    The Journal of Supercomputing, 2016, 72 : 3428 - 3442
  • [10] Design and implementation of a collaborative team-based cloud storage system
    Lim, Chanshik
    Kang, Minsu
    Lee, Sangjun
    JOURNAL OF SUPERCOMPUTING, 2016, 72 (09): : 3428 - 3442