Two-Phased Protocol for Providing Data Confidentiality in Cloud Storage Environments

被引:0
|
作者
Butoi, Alexandru [1 ]
Morar, Gabriela Andreea [1 ]
Ilea, Andreea [1 ]
机构
[1] Univ Babes Bolyai, Fac Econ & Business Adm, R-3400 Cluj Napoca, Romania
关键词
cloud computing security; data confidentiality; cloud storage; protocol; middleware;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In expanding fields, such as cloud computing, one of the greatest concerns is related to data security. Transferring and storing data to a cloud computing infrastructure raises many issues related to data privacy and data integrity. In this context, we propose 1 a protocol designed to provide data storage confidentiality in the cloud. The protocol implies splitting the data into small encrypted data chunks, dispersed into data storage volumes. It is a two phased protocol that handles separately the operations related to writing the data to the storage volumes and the operations of retrieving data from the corresponding volumes.
引用
收藏
页码:220 / 230
页数:11
相关论文
共 50 条
  • [1] Data Security and Confidentiality in Public Cloud Storage by Extended QP Protocol
    Priya, K.
    ArokiaRenjit, J.
    2017 INTERNATIONAL CONFERENCE ON COMPUTATION OF POWER, ENERGY INFORMATION AND COMMUNICATION (ICCPEIC), 2017, : 235 - 240
  • [3] Confidentiality and Storage of Data in Cloud Environment
    Mohit, Prerna
    Biswas, G. P.
    PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON FRONTIERS IN INTELLIGENT COMPUTING: THEORY AND APPLICATIONS, (FICTA 2016), VOL 2, 2017, 516 : 289 - 295
  • [4] An Approach to Data Confidentiality Protection in Cloud Environments
    Yau, Stephen S.
    An, Ho G.
    Buduru, Arun Balaji
    INTERNATIONAL JOURNAL OF WEB SERVICES RESEARCH, 2012, 9 (03) : 67 - 83
  • [5] Towards Data Confidentiality and Portability in Cloud Storage
    Alomari, Ebtesam Ahmad
    Monowar, Muhammad Mostafa
    DESIGN, USER EXPERIENCE, AND USABILITY: USER EXPERIENCE DESIGN FOR DIVERSE INTERACTION PLATFORMS AND ENVIRONMENTS, PT II, 2014, 8518 : 38 - 49
  • [6] Object-based two-phased locking protocol in extolware persistence framework
    Lim, TM
    Lee, SP
    ITI 2004: PROCEEDINGS OF THE 26TH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY INTERFACES, 2004, : 173 - 180
  • [7] Efficient Cloud Storage Confidentiality to Ensure Data Security
    Arockiam, L.
    Monikandan, S.
    2014 INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND INFORMATICS (ICCCI), 2014,
  • [8] A machine learning framework for providing data integrity and confidentiality for sensitive data cloud applications
    Narayanan, Eswara
    Muthukumar, B.
    INTERNATIONAL JOURNAL OF SYSTEM ASSURANCE ENGINEERING AND MANAGEMENT, 2022,
  • [9] Data Confidentiality in Cloud Storage Protocol Based on Secret Sharing Scheme: A Brute Force Attack Evaluation
    Butoi, Alexandru
    Moca, Mircea
    Tomai, Nicolae
    TRUST MANAGEMENT IX, 2015, 454 : 177 - 184
  • [10] Enhancement of data confidentiality and secure data transaction in cloud storage environment
    K. L. Neela
    V. Kavitha
    Cluster Computing, 2018, 21 : 115 - 124