A Data Storage Model with User Controlled Cryptographic Mechanisms for Data Processing

被引:0
|
作者
Arseni, Stefan-Ciprian [1 ,2 ]
Radoi, Ionut [1 ,2 ]
Malutan, Sergiu-Beniamin [1 ]
Lazar, Marilena [1 ]
Dragomir, Ioana-Roxana [1 ]
机构
[1] Mil Equipment & Technol Res Agcy, Ctr Test Evaluat & Sci Res Informat & Commun Syst, Bucharest, Romania
[2] Univ Politehn Bucuresti, Fac Elect Telecommun & Informat Technol, Bucharest, Romania
关键词
Cloud storage security; client-side encryption; user controlled cryptographic mechanisms;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
With the rapid development of information technologies, data became a need for everyday activities of an individual that demands fast and secure access to it. Cloud storage therefore emerged as a suitable solution to address these challenges of accessing and processing data anytime, anywhere and, to some extent, in any quantity. Different approaches to implementing cloud storage systems have declined or increased users' trust in these systems. In this paper we propose a client-based encryption storage system in which users control the cryptographic keys lifecycle and are allowed to select different encryption methods, according to their requirements. We also make an analysis of our proposed solution compared to some features of other similar solutions.
引用
收藏
页码:523 / 528
页数:6
相关论文
共 50 条
  • [31] RaUL: RDFa User Interface Language - A Data Processing Model for Web Applications
    Haller, Armin
    Umbrich, Juergen
    Hausenblas, Michael
    WEB INFORMATION SYSTEM ENGINEERING-WISE 2010, 2010, 6488 : 400 - +
  • [33] Dynamic Data Slicing in Multi Cloud Storage using Cryptographic Technique
    Subramanian, K.
    John, F. Leo
    2017 2ND WORLD CONGRESS ON COMPUTING AND COMMUNICATION TECHNOLOGIES (WCCCT), 2017, : 159 - 161
  • [34] A MODIFIED CRYPTOGRAPHIC APPROACH FOR SECURING DISTRIBUTED DATA STORAGE IN CLOUD COMPUTING
    Reddy, M. Rajasekhar
    Akilandeswari, R.
    Priyadarshini, S.
    Karthikeyan, B.
    Ponmani, E.
    2017 INTERNATIONAL CONFERENCE ON NETWORKS & ADVANCES IN COMPUTATIONAL TECHNOLOGIES (NETACT), 2017, : 131 - 139
  • [35] A Time-Controlled Data Destruction Model Adapted for Cloud Storage
    Li, Lixin
    Ding, Yongshan
    Cao, Jingyuan
    Dou, Ruiyu
    Li, Zuohui
    INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND APPLICATION ENGINEERING (CSAE), 2017, 190 : 520 - 530
  • [36] Data sharing in a collaborative product design environment based on cryptographic mechanisms
    Kim, Jeongtae
    Park, Soyoung
    2018 INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY CONVERGENCE (ICTC), 2018, : 1074 - 1076
  • [37] TimeCrypt: Encrypted Data Stream Processing at Scale with Cryptographic Access Control
    Burkhalter, Lukas
    Hithnawi, Anwar
    Viand, Alexander
    Shafagh, Hossein
    Ratnasamy, Sylvia
    PROCEEDINGS OF THE 17TH USENIX SYMPOSIUM ON NETWORKED SYSTEMS DESIGN AND IMPLEMENTATION, 2020, : 835 - 850
  • [38] DATA PROCESSING CAN BE COST CONTROLLED
    HIRSCH, RE
    COMPUTERS AND AUTOMATION, 1971, 20 (12): : 8 - &
  • [39] Tiered Data Storage Model
    Poymanova, E. D.
    Tatarnikova, T. M.
    2019 WAVE ELECTRONICS AND ITS APPLICATION IN INFORMATION AND TELECOMMUNICATION SYSTEMS (WECONF), 2019,
  • [40] Enhanced User Data Privacy with Pay-by-Data Model
    Wu, Chao
    Guo, Yike
    2013 IEEE INTERNATIONAL CONFERENCE ON BIG DATA, 2013,