0% found this document useful (0 votes)
286 views

Cloud Storage Security

This document discusses security issues related to cloud storage. It identifies some key advantages of cloud storage like backup/recovery and unlimited storage, but also notes security and privacy as major disadvantages. It outlines some common security problems like traditional security issues, legal issues with third parties controlling data. The document then presents some research related to cloud storage security including multi-level authorization, encryption techniques, and data segmentation models that break data into multiple parts stored across different servers or cloud providers.

Uploaded by

MostafaElBaz
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
286 views

Cloud Storage Security

This document discusses security issues related to cloud storage. It identifies some key advantages of cloud storage like backup/recovery and unlimited storage, but also notes security and privacy as major disadvantages. It outlines some common security problems like traditional security issues, legal issues with third parties controlling data. The document then presents some research related to cloud storage security including multi-level authorization, encryption techniques, and data segmentation models that break data into multiple parts stored across different servers or cloud providers.

Uploaded by

MostafaElBaz
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
You are on page 1/ 6

Cloud Storage Security

Name: Mingke Chen


Cloud Computing

Advantages:
• Backup and Recovery
• Almost Unlimited Storage
• Efficiency and Performance Increasing

Disadvantages:
• Security
• Privacy
Cloud Computing Storage Security Issues:
1.Traditional Security problems

2. Law Issue

3. Third party Issue


Related Research for Storage Security:
DATA
1.Authorization:
• Multi-level authorization
• The Face Fuzzy Vault
COPY 1 PART 1 PART 2 COPY 2
2.Encryption:
• RSA Encryption
• AES Encryption
• Hybrid Encryption
3. Segmentation:
• Metadata Based Storage Model
• Multi-cloud Architecture Model
SE R V E R SE R V E R SE R V E R SE R V E R

Figure: Segmentation Backup System


Table: Metadata Based Storage Model Level Figure: Multi-cloud Architecture Model
REFERENCES:

[1] L. Wentao, "Research on cloud computing security problem and strategy," in Consumer Electronics,
Communications and Networks (CECNet), 2012 2nd International Conference on, 2012, pp. 1216-1219.
[2] H. Bakshi, M. Mulla, N. Dutta, and V. Shinde, "Multi Cloud Architecture to Provide Data Security And Integrity,"
IJETAE, vol. 3, 2013.
[3] E. Chang, T. Dillon, and W. Chen, "Cloud Computing: Issues and Challenges," in Advanced Information
Networking and Applications (AINA), 2010 24th IEEE International Conference on, 2010, pp. 27-33.
[4] C. Zhibin and Y. Jianfeng, "Cloud Computing Research and Security Issues," in Computational Intelligence
and Software Engineering (CiSE), 2010 International Conference on, 2010, pp. 1-3.
[5] A. Y. Chang, C. Chun-Jung, L. Uei-Chin, and T. Chang-Lung, "Information security issue of enterprises adopting
the application of cloud computing," in Networked Computing and Advanced Information Management (NCM),
2010 Sixth International Conference on, 2010, pp. 645-649.
[6] P. Sanghavi and V. Joshi, "Three tier data storage security in cloud using Face fuzzy vault," in Computing,
Communication and Applications (ICCCA), 2012 International Conference on, 2012, pp. 1-6.
[7] A. Bogdanov, C. Paar, M. Wienecke, and T. Eisenbarth, "Differential cache-collision timing attacks on AES with
applications to embedded CPUs," in Topics in Cryptology-CT-RSA 2010, ed: Springer, 2010, pp. 235-251.
[8] L. Weiwei, L. Mingqi, and Y. Chao, "A Novel Triple Encryption Scheme for Hadoop-Based Cloud Data Security,"
in Emerging Intelligent Data and Web Technologies (EIDWT), 2013 Fourth International Conference on, 2013, pp.
437-442.
[9] C. SelvaKumar, M. R. Sumalatha, and M. Venkatesh, "Improving public auditability, data possession in data
storage security for cloud computing," in Recent Trends In Information Technology (ICRTIT), 2012 International
Conference on, 2012, pp. 463-467.

You might also like