Skip to main content

Emerging Issues in Cloud Storage Security: Encryption, Key Management, Data Redundancy, Trust Mechanism

  • Conference paper
Multidisciplinary Social Networks Research (MISNC 2014)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 473))

Included in the following conference series:

  • International Conference, MISNC

Abstract

Cloud computing is one of the most cutting-edge advanced technologies around the world. According to the recent research, many CIOs who work for famous corporation mentioned that security issues have been the most critical obstacles in the adoption of cloud technology. As one of the prominent application of cloud computing, cloud storage has attracted more concerns; however, many security problems existing in cloud storage need to be resolved. This applied research paper briefly analyzes the development of cloud storage security, comprehensive discussion of several general solutions to those problems introducing several non-technical issues, such as third-party issues, trust mechanism in cloud computing. Finally, some possible improvement to those solutions is provided.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Brohi, S.N., Bamiah, M.A., Brohi, M.N., Kamran, R.: Identifying and analyzing security threats to Virtualized Cloud Computing Infrastructures. In: 2012 International Conference on Cloud Computing Technologies, Applications and Management (ICCCTAM), December 8-10, pp. 151–155 (2012) ISBN: 978-1-4673-4415-9

    Google Scholar 

  2. CIOTIMES. 云计算安全架构中的加密. TechTarget China (October 19, 2012), http://www.ciotimes.com/cloud/cjs/72702.html

  3. Han, S., Xing, J.: Ensuring data storage security through a novel third party auditor scheme in cloud computing. In: 2011 IEEE International Conference on Cloud Computing and Intelligence Systems (CCIS), September 15-17, pp. 264–268 (2011) ISBN: 978-1-61284-203-5

    Google Scholar 

  4. Brodkin J. : Gartner: Seven cloud-computing security risks. NetworkWorld (July 2, 2008), http://www.networkworld.com/article/2281535/data-center/gartner--seven-cloud-computing-security-risks.html

  5. Whitman, M.M., Mattord, H.J.: Principles of information security, 4th edn. Cengage Learning (January 1, 2011) ISBN: 978-1111138219

    Google Scholar 

  6. Singh, Y., Kandah, F., Zhang, W.: A secured cost-effective multi-cloud storage in cloud computing. In: 2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), April 10-15, pp. 619–624 (2011) ISBN: 978-1-4577-0249-5

    Google Scholar 

  7. Wylie, J.J., Bakkaloglu, M., Pandurangan, V., Bigrigg, M.W., Oguz, S., Tew, K., Williams, C., Ganger, G.R., Khosla, P.K.: Selecting the Right Data Distribution Scheme for a Survivable Storage System. Carnegie Mellon University (May 2001), http://www.pdl.cmu.edu/ftp/Storage/CMU-CS-01-120.pdf

  8. Abu-Libdeh, H., Princehouse, L., Weatherspoon, H.: RACS: a case for cloud storage diversity. In: SoCC 2010 Proceedings of the 1st ACM Symposium on Cloud Computing, pp. 229–240 (2010) ISBN: 978-1-4503-0036-0

    Google Scholar 

  9. Rabin, M.O.: Efficient dispersal of information for security, load balancing, and fault tolerance. Journal of the ACM (JACM) 36(2), 335–348 (1989), doi:10.1145/62044.62050

    Article  MathSciNet  MATH  Google Scholar 

  10. Bowers, K.D., Juels, A., Oprea, A.: HAIL: a high-availability and integrity layer for cloud storage. In: Proceedings of the 16th ACM Conference on Computer and Communications Security, pp. 187–198(2009) ISBN: 978-1-60558-894-0

    Google Scholar 

  11. AlZain, M.A., Soh, B., Pardede, E.: MCDB: Using Multi-clouds to Ensure Security in Cloud Computing. In: 2011 IEEE Ninth International Conference on Dependable, Autonomic and Secure Computing (DASC), pp. 784–791 (2011) ISBN: 978-1-4673-0006-3

    Google Scholar 

  12. Zhang, N., Jing, J., Liu, P.: CLOUD SHREDDER: Removing the laptop on-road data disclosure threat in the cloud computing era. In: 2011 IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), November 16-18, pp. 1592–1599 (2011) ISBN: 978-1-4577-2135-9

    Google Scholar 

  13. Ranchal, R., Bhargava, B., Othmane, L.B., Lilien, L., Kim, A., Kang, M., Linderman, M.: Protection of identity information in cloud computing without trusted third party. In: 2010 29th IEEE Symposium on Reliable Distributed Systems, October 31- November 3, pp. 368–372 (2010) ISBN: 978-0-7695-4250-8

    Google Scholar 

  14. Amazon EC2. Availability Region and Availability Zone concept, http://docs.aws.amazon.com/AWSEC2/latest/UserGuide/using-regions-availability-zones.html

  15. McKnight, D.H., Choudhury, V., Kacmar, C.: The impact of initial consumer trust on intentions to transact with a web site: a trust building model. Journal of Strategic Information Systems 11, 297–323 (2002)

    Article  Google Scholar 

  16. Komiak, S.Y.X., Benbasat, I.: The effects of personalization and familiarity on trust and adoption of recommendation agents. MIS Quarterly 30(4), 941–960 (2006)

    Google Scholar 

  17. Dean, J., Ghemawat, S.: MapReduce: Simplified Data Processing on Large Clusters. Communications of the ACM 51(1), 107–113 (2008), doi:10.1145/1327452.1327492

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Tse, D.W.K., Chen, D., Liu, Q., Wang, F., Wei, Z. (2014). Emerging Issues in Cloud Storage Security: Encryption, Key Management, Data Redundancy, Trust Mechanism. In: Wang, L.SL., June, J.J., Lee, CH., Okuhara, K., Yang, HC. (eds) Multidisciplinary Social Networks Research. MISNC 2014. Communications in Computer and Information Science, vol 473. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-45071-0_24

Download citation

  • DOI: https://doi.org/10.1007/978-3-662-45071-0_24

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-662-45070-3

  • Online ISBN: 978-3-662-45071-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics