254 research outputs found

    State of The Art and Hot Aspects in Cloud Data Storage Security

    Get PDF
    Along with the evolution of cloud computing and cloud storage towards matu- rity, researchers have analyzed an increasing range of cloud computing security aspects, data security being an important topic in this area. In this paper, we examine the state of the art in cloud storage security through an overview of selected peer reviewed publications. We address the question of defining cloud storage security and its different aspects, as well as enumerate the main vec- tors of attack on cloud storage. The reviewed papers present techniques for key management and controlled disclosure of encrypted data in cloud storage, while novel ideas regarding secure operations on encrypted data and methods for pro- tection of data in fully virtualized environments provide a glimpse of the toolbox available for securing cloud storage. Finally, new challenges such as emergent government regulation call for solutions to problems that did not receive enough attention in earlier stages of cloud computing, such as for example geographical location of data. The methods presented in the papers selected for this review represent only a small fraction of the wide research effort within cloud storage security. Nevertheless, they serve as an indication of the diversity of problems that are being addressed

    Cloud Storage Security Using Blockchain Technology

    Get PDF
    Data is increasing with increasing Internet technology. To handle the large data, more applications choose to enlarge storage capacity via Cloud plate form. It will not a surprise if we say most organizations have moved towards the cloud. While using the cloud, we have to keep our trust for our sensitive and private data in third parties and the data is usually not encrypted. But we need to implement nearly procedures for the assurance of our reserved data. This will be occupied by blockchains. Blockchain has been a center of attention as a next-generation goal because of its security. A comprehensive approach is used in this paper by signifying diverse blockchain methods to protect cloud computing

    Self-Protecting Documents for Cloud Storage Security

    Get PDF
    International audienceInformation security is currently one of the most important issues in information systems. This concerns the confidentiality of information but also its integrity and availability. The problem becomes even more difficult when several companies are working together on a project and that the various documents "go out of" their respective information systems. We propose an architecture in which the documents themselves ensure their security and thus can be exchanged over uncontrolled resources such as cloud storage or even USB flash drives. For this we encapsulate within the document itself some security components (e.g. access control, usage control) to achieve an autonomic document architecture for Enterprise DRM (E-DRM). Using such self-protecting documents, a company can ensure security and privacy for its documents when outsourcing storage services (e.g. cloud)

    Research work cloud storage security

    Get PDF
    В данной статье рассматриваются основные угрозы безопасности облачных хранилищ, такие как утечки данных, атаки злоумышленников, несанкционированный доступ к данным и др. Также описываются основные меры безопасности, которые могут быть приняты для защиты облачных хранилищ данных

    ANALYSIS AND APPLICATION OF CLOUD STORAGE SECURITY UTILIZATION BASED ON AS A SERVICE (IaaS) INFRASTRUCTURE SERVICE MODEL AS A DOCUMENT SHARING MEDIA DURING PANDEMI

    Get PDF
    Storage via the cloud is very necessary which is carried out in this research can be used as a basis for research at PT. Indocode technology has a problem where the problem is that the process of storing and sharing data on storage media via the cloud can be used both on internal and external networks. Implementing cloud-based storage greatly simplifies the process of sharing files with employees or the board of directors to be able to filter which data can be accessed by all employees and limited needs.. The server is designed using the Owncloud application which aims to support the process of information or data transactions with commissioners, directors and employees using owncloud, so that the data transfer process no longer uses external storage from the internet or other physical storage media. In addition, the use of owncloud for enterprises is very helpful because it is easy to use and the file sharing capabilities can be adjusted according to the user's permissions and can be accessed anywhere and anytime

    Secure Cloud Storage with Client-Side Encryption Using a Trusted Execution Environment

    Full text link
    With the evolution of computer systems, the amount of sensitive data to be stored as well as the number of threats on these data grow up, making the data confidentiality increasingly important to computer users. Currently, with devices always connected to the Internet, the use of cloud data storage services has become practical and common, allowing quick access to such data wherever the user is. Such practicality brings with it a concern, precisely the confidentiality of the data which is delivered to third parties for storage. In the home environment, disk encryption tools have gained special attention from users, being used on personal computers and also having native options in some smartphone operating systems. The present work uses the data sealing, feature provided by the Intel Software Guard Extensions (Intel SGX) technology, for file encryption. A virtual file system is created in which applications can store their data, keeping the security guarantees provided by the Intel SGX technology, before send the data to a storage provider. This way, even if the storage provider is compromised, the data are safe. To validate the proposal, the Cryptomator software, which is a free client-side encryption tool for cloud files, was integrated with an Intel SGX application (enclave) for data sealing. The results demonstrate that the solution is feasible, in terms of performance and security, and can be expanded and refined for practical use and integration with cloud synchronization services

    Efficient cloud storage security scheme and data sharing in cloud

    Get PDF
    We propose the Secure Data Sharing in Clouds (SeDaSC) approach that gives: 1) information privacy and integrity; 2) get to control; 3) information sharing (sending) without utilizing register concentrated reencryption; 4) insider threat security; and 5) forward and in reverse access control. The SeDaSC strategy encodes a file with a solitary encryption key. Two distinctive key offers for every one of the clients are created, with the client just getting one offer. The ownership of a solitary offer of a key enables the SeDaSC system to counter the insider dangers. The other key offer is put away by a confided in outsider, which is known as the cryptographic server. The SeDaSC strategy is appropriate to traditional and portable cloud computing situations

    A Study on “Security of Cyber-Physical Systems in the Cloud”

    Get PDF
    The existing security models are built with certain assumptions. The solutions like distributed accountability, provable data possession (PDP), Third Party Auditing (TPA) and so on are secure as long as the assumptions hold true. To ensure fool proof security for cloud storage security little research has been made on quantum key cryptography. Since the quantum key distribution is unconditionally secure, we propose a new scheme known as Cloud QKDP (Quantum Key Distribution Protocol for Cloud Computing) which exploits the benefits of quantum mechanisms to secure cloud storage and data dynamics. We consider a case study in which three parties such as cloud server, data owner and trusted client have provably secure communications with our proposed scheme which uses random oracle model. Our empirical study revealed mixture of success and failure rates with private and public clouds respectively

    Reliable Techniques for Providing Secure Access Control for Cloud Storage on Mobile Devices

    Get PDF
    This research focuses on the development of a credible access control method for mobile device cloud storage. The proposed method involves a six-step process, including user registration and login, key generation, data encryption and upload, authentication theory between mobile devices, and data download and decryption. The method incorporates the use of mobile TPM (Trusted Platform Module) chips to ensure trust chain transmission during key exchange. Additionally, encryption based on elliptic curve cryptography is employed to reduce the key length and facilitate secure key sharing among multiple mobile devices. The proposed method offers enhanced security and reliability compared to conventional data encryption methods provided by cloud storage service providers, with minimal interaction data and increased confidence level. It holds significant practical value and exhibits a wide range of potential applications in the field of cloud storage security technology

    Developing a Cloud Computing Framework for University Libraries

    Get PDF
    Our understanding of the library context on security challenges on storing research output on the cloud is inadequate and incomplete. Existing research has mostly focused on profit-oriented organizations. To address the limitation within the university environment, the paper unravels the data/information security concerns of cloud storage services within the university libraries. On the score of changes occurring in the libraries, this paper serves to inform users and library managers of the traditional approaches that have not guaranteed the security of research output. The paper is built upon the work of Shaw and the cloud storage security framework, which links aspects of cloud security and helps explain reasons for university libraries moving research output into cloud infrastructure, and how the cloud service is more secured. Specifically, this paper examined the existing storage carriers/media for storing research output and the associated risks with cloud storage services for university libraries. The paper partly fills this gap by a case study examination of two (2) African countries’ (Ghana and Uganda) reports on research output and cloud storage security in university libraries. The paper argues that in storing university research output on the cloud, libraries consider the security of content, the resilience of librarians, determining access levels and enterprise cloud storage platforms. The interview instrument is used to collect qualitative data from librarians and the thematic content analysis is used to analyze the research data. Significantly, results show that copyright law infringement, unauthorized data accessibility, policy issues, insecurity of content, cost and no interoperable cloud standards were major risks associated with cloud storage services. It is expected that university libraries pay more attention to the security/confidentiality of content, the resilience of librarians, determining access levels and enterprise cloud storage platforms to enhance cloud security of research output. The paper contributes to the field of knowledge by developing a framework that supports an approach to understand security in cloud storage. It also enables actors in the library profession to understand the makeup and measures of security issues in cloud storage. By presenting empirical evidence, it is clear that university libraries have migrated research output into cloud infrastructure as an alternative for continued storage, maintenance and access of information
    corecore