Advertisement

Introduction

  • Kan YangEmail author
  • Xiaohua Jia
Chapter
  • 2k Downloads
Part of the SpringerBriefs in Computer Science book series (BRIEFSCOMPUTER)

Abstract

Cloud computing has emerged as a promising technique that greatly changes the modern IT industry. In this chapter, we first give a brief introduction to cloud storage systems. Then, we explore some security issues in cloud storage systems, including data integrity and data confidentiality. We also give an overview on how to solve these security problems.

Keywords

Cloud Service Cloud Storage Cloud Service Provider Data Owner Access Policy 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

References

  1. 1.
    Armbrust, M., Fox, A., Griffith, R., Joseph, A.D., Katz, R.H., Konwinski, A., Lee, G., Patterson, D.A., Rabkin, A., Stoica, I., Zaharia, M.: A view of cloud computing. Commun. ACM 53(4), 50–58 (2010)CrossRefGoogle Scholar
  2. 2.
    Bairavasundaram, L.N., Goodson, G.R., Pasupathy, S., Schindler, J.: An analysis of latent sector errors in disk drives. In: Proceedings of the 2007 ACM SIGMETRICS International Conference on Measurement and Modeling of Computer Systems (SIGMETRICS’07), pp. 289–300. ACM, New York (2007)Google Scholar
  3. 3.
    Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. In: Proceedings of the 2007 IEEE Symposium on Security and Privacy (S &P’07), pp. 321–334. IEEE Computer Society, Los Alamitos (2007)Google Scholar
  4. 4.
    Cellan-Jones, R.: The Sidekick Cloud Disaster. BBC News, vol. 1 (2009)Google Scholar
  5. 5.
    Gouglidis, A., Mavridis, I.: On the definition of access control requirements for grid and cloud computing systems. In: Proceedings of the 3rd International ICST Conference on Networks for Grid Applications (GridNets’09), pp. 19–26. Springer, New York (2009)Google Scholar
  6. 6.
    Kallahalla, M., Riedel, E., Swaminathan, R., Wang, Q., Fu, K.: Plutus: scalable secure file sharing on untrusted storage. In: Proceedings of the 2nd USENIX Conference on File and Storage Technologies (FAST’03). USENIX, Berkeley (2003)Google Scholar
  7. 7.
    Kubiatowicz, J., Bindel, D., Chen, Y., Czerwinski, S.E., Eaton, P.R., Geels, D., Gummadi, R., Rhea, S.C., Weatherspoon, H., Weimer, W., Wells, C., Zhao, B.Y.: Oceanstore: an architecture for global-scale persistent storage. In: Proceedings of the 9th International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS’00), pp. 190–201. ACM Press, New York (2000)Google Scholar
  8. 8.
    Li, J., Krohn, M.N., Mazières, D., Shasha, D.: Secure untrusted data repository (sundr). In: Proceedings of the 6th conference on Symposium on Operating Systems Design and Implementation, pp. 121–136. USENIX, Berkeley (2004)Google Scholar
  9. 9.
    Lomet, D.B.: Guest editor’s introduction: cloud data management. IEEE Trans. Knowl. Data Eng. 23(9), 1281 (2011)CrossRefGoogle Scholar
  10. 10.
    Maheshwari, U., Vingralek, R., Shapiro, W.: How to build a trusted database system on untrusted storage. In: Proceedings of the 4th conference on Symposium on Operating System Design and Implementation, pp. 135–150. USENIX, Berkeley (2000)Google Scholar
  11. 11.
    Maniatis, P., Roussopoulos, M., Giuli, T.J., Rosenthal, D.S.H., Baker, M.: The LOCKSS peer-to-peer digital preservation system. ACM Trans. Comput. Syst. 23(1), 2–50 (2005)CrossRefGoogle Scholar
  12. 12.
    Mell, P., Grance, T.: The NIST definition of cloud computing. Technical report, National Institute of Standards and Technology (2009)Google Scholar
  13. 13.
    Miller, R.: Amazon Addresses EC2 Power Outages. Data Center Knowledge, vol. 1 (2010)Google Scholar
  14. 14.
    Muthitacharoen, A., Morris, R., Gil, T.M., Chen, B.: Ivy: a read/write peer-to-peer file system. In: Proceedings of OSDI (2002)Google Scholar
  15. 15.
    Schroeder, B., Gibson, G.A.: Disk failures in the real world: What does an mttf of 1,000,000 hours mean to you. In: Proceedings of the 5th USENIX Conference on File and Storage Technologies (FAST’07), pp. 1–16. USENIX, Berkeley (2007)Google Scholar
  16. 16.
    Sohr, K., Drouineaud, M., Ahn, G.J., Gogolla, M.: Analyzing and managing role-based access control policies. IEEE Trans. Knowl. Data Eng. 20(7), 924–939 (2008)CrossRefGoogle Scholar
  17. 17.
    Velte, T., Velte, A., Elsenpeter, R.: Cloud Computing: A Practical Approach, 1st edn. McGraw-Hill Inc., New York (2010)Google Scholar
  18. 18.
    Wang, C., Ren, K., Lou, W., Li, J.: Toward publicly auditable secure cloud data storage services. IEEE Netw. 24(4), 19–24 (2010)CrossRefGoogle Scholar
  19. 19.
    Waters, B.: Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization. In: Proceedings of the 4th International Conference on Practice and Theory in Public Key Cryptography (PKC’11), pp. 53–70. Springer, New York (2011)Google Scholar
  20. 20.
    Yumerefendi, A.R., Chase, J.S.: Strong accountability for network storage. In: Proceedings of the 5th USENIX Conference on File and Storage Technologies (FAST’07), pp. 77–92. USENIX, Berkeley (2007)Google Scholar

Copyright information

© The Author(s) 2014

Authors and Affiliations

  1. 1.Department of Computer ScienceCity University of Hong KongKowloonHong Kong SAR

Personalised recommendations