Abstract
Cloud computing is one of the most cutting-edge advanced technologies around the world. According to the recent research, many CIOs who work for famous corporation mentioned that security issues have been the most critical obstacles in the adoption of cloud technology. As one of the prominent application of cloud computing, cloud storage has attracted more concerns; however, many security problems existing in cloud storage need to be resolved. This applied research paper briefly analyzes the development of cloud storage security, comprehensive discussion of several general solutions to those problems introducing several non-technical issues, such as third-party issues, trust mechanism in cloud computing. Finally, some possible improvement to those solutions is provided.
Access provided by Autonomous University of Puebla. Download to read the full chapter text
Chapter PDF
Similar content being viewed by others
References
Brohi, S.N., Bamiah, M.A., Brohi, M.N., Kamran, R.: Identifying and analyzing security threats to Virtualized Cloud Computing Infrastructures. In: 2012 International Conference on Cloud Computing Technologies, Applications and Management (ICCCTAM), December 8-10, pp. 151–155 (2012) ISBN: 978-1-4673-4415-9
CIOTIMES. 云计算安全架构中的加密. TechTarget China (October 19, 2012), http://www.ciotimes.com/cloud/cjs/72702.html
Han, S., Xing, J.: Ensuring data storage security through a novel third party auditor scheme in cloud computing. In: 2011 IEEE International Conference on Cloud Computing and Intelligence Systems (CCIS), September 15-17, pp. 264–268 (2011) ISBN: 978-1-61284-203-5
Brodkin J. : Gartner: Seven cloud-computing security risks. NetworkWorld (July 2, 2008), http://www.networkworld.com/article/2281535/data-center/gartner--seven-cloud-computing-security-risks.html
Whitman, M.M., Mattord, H.J.: Principles of information security, 4th edn. Cengage Learning (January 1, 2011) ISBN: 978-1111138219
Singh, Y., Kandah, F., Zhang, W.: A secured cost-effective multi-cloud storage in cloud computing. In: 2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), April 10-15, pp. 619–624 (2011) ISBN: 978-1-4577-0249-5
Wylie, J.J., Bakkaloglu, M., Pandurangan, V., Bigrigg, M.W., Oguz, S., Tew, K., Williams, C., Ganger, G.R., Khosla, P.K.: Selecting the Right Data Distribution Scheme for a Survivable Storage System. Carnegie Mellon University (May 2001), http://www.pdl.cmu.edu/ftp/Storage/CMU-CS-01-120.pdf
Abu-Libdeh, H., Princehouse, L., Weatherspoon, H.: RACS: a case for cloud storage diversity. In: SoCC 2010 Proceedings of the 1st ACM Symposium on Cloud Computing, pp. 229–240 (2010) ISBN: 978-1-4503-0036-0
Rabin, M.O.: Efficient dispersal of information for security, load balancing, and fault tolerance. Journal of the ACM (JACM) 36(2), 335–348 (1989), doi:10.1145/62044.62050
Bowers, K.D., Juels, A., Oprea, A.: HAIL: a high-availability and integrity layer for cloud storage. In: Proceedings of the 16th ACM Conference on Computer and Communications Security, pp. 187–198(2009) ISBN: 978-1-60558-894-0
AlZain, M.A., Soh, B., Pardede, E.: MCDB: Using Multi-clouds to Ensure Security in Cloud Computing. In: 2011 IEEE Ninth International Conference on Dependable, Autonomic and Secure Computing (DASC), pp. 784–791 (2011) ISBN: 978-1-4673-0006-3
Zhang, N., Jing, J., Liu, P.: CLOUD SHREDDER: Removing the laptop on-road data disclosure threat in the cloud computing era. In: 2011 IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), November 16-18, pp. 1592–1599 (2011) ISBN: 978-1-4577-2135-9
Ranchal, R., Bhargava, B., Othmane, L.B., Lilien, L., Kim, A., Kang, M., Linderman, M.: Protection of identity information in cloud computing without trusted third party. In: 2010 29th IEEE Symposium on Reliable Distributed Systems, October 31- November 3, pp. 368–372 (2010) ISBN: 978-0-7695-4250-8
Amazon EC2. Availability Region and Availability Zone concept, http://docs.aws.amazon.com/AWSEC2/latest/UserGuide/using-regions-availability-zones.html
McKnight, D.H., Choudhury, V., Kacmar, C.: The impact of initial consumer trust on intentions to transact with a web site: a trust building model. Journal of Strategic Information Systems 11, 297–323 (2002)
Komiak, S.Y.X., Benbasat, I.: The effects of personalization and familiarity on trust and adoption of recommendation agents. MIS Quarterly 30(4), 941–960 (2006)
Dean, J., Ghemawat, S.: MapReduce: Simplified Data Processing on Large Clusters. Communications of the ACM 51(1), 107–113 (2008), doi:10.1145/1327452.1327492
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Tse, D.W.K., Chen, D., Liu, Q., Wang, F., Wei, Z. (2014). Emerging Issues in Cloud Storage Security: Encryption, Key Management, Data Redundancy, Trust Mechanism. In: Wang, L.SL., June, J.J., Lee, CH., Okuhara, K., Yang, HC. (eds) Multidisciplinary Social Networks Research. MISNC 2014. Communications in Computer and Information Science, vol 473. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-45071-0_24
Download citation
DOI: https://doi.org/10.1007/978-3-662-45071-0_24
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-662-45070-3
Online ISBN: 978-3-662-45071-0
eBook Packages: Computer ScienceComputer Science (R0)