Research of Data Security Model in Cloud Computing Platform for SMEs

被引:4
|
作者
Sun, Tao [1 ,2 ]
Wang, Xinjun [1 ]
机构
[1] Shandong Univ Jinan, Sch Comp Sci & Technol, Jinan 250101, Shandong, Peoples R China
[2] Qilu Univ Technol, Sch Informat, Jinan 250353, Shandong, Peoples R China
关键词
data security; cloud computing; integrity verification; cipher text retrieval;
D O I
10.14257/ijsia.2013.7.6.10
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In recent years, cloud computing has become a major mode to address SMEs inefficient and help improve their competitiveness. As cloud providers have priority access to data, so it is difficult to guarantee the confidentiality and integrity of users' data. For this reason this paper proposed a model to solve the problem of data security in cloud computing. The model adopts efficient encryption mechanisms to protect users' data. As the encrypted data is difficult to retrieve, we present a method of cipher text retrieval. Experimental results show that the model can better ensure data confidentiality and integrity.
引用
收藏
页码:97 / 107
页数:11
相关论文
共 50 条
  • [41] The Proposed Model to Increase Security of Sensitive Data in Cloud Computing
    Hyseni, Dhurate
    Luma, Artan
    Selimi, Besnik
    Cico, Betim
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2018, 9 (02) : 203 - 210
  • [42] A Hybrid Model Encryption for Enhancing Data Security in Cloud Computing
    Zibouh, Ouadia
    Dalli, Anouar
    Drissi, Hilal
    EDUCATION EXCELLENCE AND INNOVATION MANAGEMENT THROUGH VISION 2020, 2019, : 3840 - 3849
  • [43] Research on the Security Issues of Cloud Computing
    Jia Weihua
    Sun Shibing
    INTELLIGENCE COMPUTATION AND EVOLUTIONARY COMPUTATION, 2013, 180 : 845 - 848
  • [44] Research on the key technology of data security protection based on cloud computing
    Guo, Juan
    PROCEEDINGS OF THE 2015 3RD INTERNATIONAL CONFERENCE ON MACHINERY, MATERIALS AND INFORMATION TECHNOLOGY APPLICATIONS, 2015, 35 : 66 - 69
  • [45] Research on Security and Privacy of Big Data under Cloud Computing Environment
    Zhang Maohong
    Yang Aihua
    Liu Hui
    PROCEEDINGS OF THE 2018 2ND INTERNATIONAL CONFERENCE ON BIG DATA RESEARCH (ICBDR 2018), 2018, : 52 - 55
  • [46] Research on cloud computing data security protection technology satisfying differential
    Yang, Hui
    BASIC & CLINICAL PHARMACOLOGY & TOXICOLOGY, 2019, 125 : 101 - 101
  • [47] Data Security Policy In The Cloud Computing
    Ran Shuanglin
    PROCEEDINGS OF 2012 7TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE & EDUCATION, VOLS I-VI, 2012, : 222 - 225
  • [48] Data Security in the World of Cloud Computing
    Kaufman, Lori M.
    IEEE SECURITY & PRIVACY, 2009, 7 (04) : 61 - 64
  • [49] ANALYSIS OF DATA SECURITY IN CLOUD COMPUTING
    Iyer, K. B. Priya
    Manisha, R.
    Subhashree, R.
    Vedhavalli, K.
    PROCEEDINGS OF THE 2016 IEEE 2ND INTERNATIONAL CONFERENCE ON ADVANCES IN ELECTRICAL & ELECTRONICS, INFORMATION, COMMUNICATION & BIO INFORMATICS (IEEE AEEICB-2016), 2016, : 540 - 543
  • [50] Data Security: the Challenges of Cloud Computing
    Hu Shuijing
    2014 SIXTH INTERNATIONAL CONFERENCE ON MEASURING TECHNOLOGY AND MECHATRONICS AUTOMATION (ICMTMA), 2014, : 203 - 206