Research of Data Security Model in Cloud Computing Platform for SMEs

被引:4
|
作者
Sun, Tao [1 ,2 ]
Wang, Xinjun [1 ]
机构
[1] Shandong Univ Jinan, Sch Comp Sci & Technol, Jinan 250101, Shandong, Peoples R China
[2] Qilu Univ Technol, Sch Informat, Jinan 250353, Shandong, Peoples R China
关键词
data security; cloud computing; integrity verification; cipher text retrieval;
D O I
10.14257/ijsia.2013.7.6.10
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In recent years, cloud computing has become a major mode to address SMEs inefficient and help improve their competitiveness. As cloud providers have priority access to data, so it is difficult to guarantee the confidentiality and integrity of users' data. For this reason this paper proposed a model to solve the problem of data security in cloud computing. The model adopts efficient encryption mechanisms to protect users' data. As the encrypted data is difficult to retrieve, we present a method of cipher text retrieval. Experimental results show that the model can better ensure data confidentiality and integrity.
引用
收藏
页码:97 / 107
页数:11
相关论文
共 50 条
  • [21] A Security Model for the Enhancement of Data Privacy in Cloud Computing
    Sharma, Yoshita
    Gupta, Himanshu
    Khatri, Sunil Kumar
    PROCEEDINGS 2019 AMITY INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE (AICAI), 2019, : 898 - 902
  • [22] Data Security Access Control Model of Cloud Computing
    Hu, Jun
    Chen, Lei
    Wang, Yunhua
    Chen, Shi-hong
    2013 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCES AND APPLICATIONS (CSA), 2013, : 29 - 34
  • [23] An Adaptive Defense Model for Cloud Computing Data Security
    Yang, Xing
    Xiang, Ke
    Huang, Jilan
    TEHNICKI VJESNIK-TECHNICAL GAZETTE, 2025, 32 (01): : 267 - 274
  • [24] Data Security and Authentication in Hybrid Cloud Computing Model
    Wang, Jingxin K.
    Jia, Xinpei
    2012 IEEE GLOBAL HIGH TECH CONGRESS ON ELECTRONICS (GHTCE), 2012,
  • [25] Research On Cloud Computing And Security
    Yu, Ting-ting
    Zhu, Ying-Guo
    2012 11TH INTERNATIONAL SYMPOSIUM ON DISTRIBUTED COMPUTING AND APPLICATIONS TO BUSINESS, ENGINEERING & SCIENCE (DCABES), 2012, : 314 - 316
  • [26] A Research on Cloud Computing Security
    Zhang, Ni
    Liu, Di
    Zhang, Yun-Yong
    2013 INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY AND APPLICATIONS (ITA), 2013, : 370 - 373
  • [27] Data Security in Cloud Computing
    Sathyanarayana, T. V.
    Sheela, L. Mary Immaculate
    2013 INTERNATIONAL CONFERENCE ON GREEN COMPUTING, COMMUNICATION AND CONSERVATION OF ENERGY (ICGCE), 2013, : 822 - 827
  • [28] Data Security in Cloud Computing
    Albugmi, Ahmed
    Alassafi, Madini O.
    Walters, Robert
    Wills, Gary
    2016 FIFTH INTERNATIONAL CONFERENCE ON FUTURE COMMUNICATION TECHNOLOGIES (FGCT), 2016, : 55 - 59
  • [29] Data security in cloud computing
    Meng, Du
    PROCEEDINGS OF THE 2013 8TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE & EDUCATION (ICCSE 2013), 2013, : 810 - 813
  • [30] A Productive Cloud Computing Platform Research for Big Data Analytics
    Yan, Yuzhong
    Chen, Chao
    Huang, Lei
    2015 IEEE 7TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING TECHNOLOGY AND SCIENCE (CLOUDCOM), 2015, : 499 - 502