Two-Phased Protocol for Providing Data Confidentiality in Cloud Storage Environments

被引:0
|
作者
Butoi, Alexandru [1 ]
Morar, Gabriela Andreea [1 ]
Ilea, Andreea [1 ]
机构
[1] Univ Babes Bolyai, Fac Econ & Business Adm, R-3400 Cluj Napoca, Romania
关键词
cloud computing security; data confidentiality; cloud storage; protocol; middleware;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In expanding fields, such as cloud computing, one of the greatest concerns is related to data security. Transferring and storing data to a cloud computing infrastructure raises many issues related to data privacy and data integrity. In this context, we propose 1 a protocol designed to provide data storage confidentiality in the cloud. The protocol implies splitting the data into small encrypted data chunks, dispersed into data storage volumes. It is a two phased protocol that handles separately the operations related to writing the data to the storage volumes and the operations of retrieving data from the corresponding volumes.
引用
收藏
页码:220 / 230
页数:11
相关论文
共 50 条
  • [21] Providing Security and Integrity for Data Stored In Cloud Storage
    Pawar, Chandrashekhar S.
    Patil, Pankaj R.
    Chaudhari, Sujitkumar V.
    2014 INTERNATIONAL CONFERENCE ON INFORMATION COMMUNICATION AND EMBEDDED SYSTEMS (ICICES), 2014,
  • [22] Secure Data Storage in Distributed Cloud Environments
    Jordao, Renata
    Martins, Valerio Aymore
    Buiati, Fabio
    de Sousa Junior, Rafael Timoteo
    de Deus, Flavio Elias
    2014 IEEE INTERNATIONAL CONFERENCE ON BIG DATA (BIG DATA), 2014,
  • [23] Survey on Data Deduplication in Cloud Storage Environments
    Kim, Won-Bin
    Lee, Im-Yeong
    JOURNAL OF INFORMATION PROCESSING SYSTEMS, 2021, 17 (03): : 658 - 673
  • [24] Secure Data Storage Architecture on Cloud Environments
    Tran Thi Xuan Trang
    Maruyama, Katsuhisa
    ICSOFT-EA: PROCEEDINGS OF THE 11TH INTERNATIONAL JOINT CONFERENCE ON SOFTWARE TECHNOLOGIES - VOL. 1, 2016, : 39 - 47
  • [25] A Secure Architecture for Data Storage in the Cloud Environments
    Fu, Chuan
    Yang, Jun
    Liu, Zheli
    Jia, Chunfu
    2015 9TH INTERNATIONAL CONFERENCE ON INNOVATIVE MOBILE AND INTERNET SERVICES IN UBIQUITOUS COMPUTING IMIS 2015, 2015, : 289 - 291
  • [26] Pareto-efficiency without giving-in: A two-phased protocol for multiple-attribute negotiations
    Lang, F
    Brunn, C
    CEC 2005: SEVENTH IEEE INTERNATIONAL CONFERENCE ON E-COMMERCE TECHNOLOGY, PROCEEDINGS, 2005, : 182 - 189
  • [27] Achieving Dynamic Data Guarantee and Data Confidentiality of Public Auditing in Cloud Storage Service
    Hwang, Min-Shiang
    Sun, Tsuei-Hung
    Lee, Cheng-Chi
    JOURNAL OF CIRCUITS SYSTEMS AND COMPUTERS, 2017, 26 (05)
  • [28] Detecting and prioritizing product defects using social media data and the two-phased QFD method
    Zheng, Lu
    He, Zhen
    He, Shuguang
    COMPUTERS & INDUSTRIAL ENGINEERING, 2023, 177
  • [29] Data Security Optimization at Cloud Storage using Confidentiality-based Data Classification
    Sudarsa, Dorababu
    Rao, A. Nagaraja
    Sivakumar, A. P.
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2024, 15 (05) : 699 - 709
  • [30] Agent Based Framework for providing Security to data storage in Cloud
    Islam, Md. Rafiqul
    Habiba, Mansura
    2012 15TH INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION TECHNOLOGY (ICCIT), 2012, : 446 - 451