Skip to main content

New Secure Storage Architecture for Cloud Computing

  • Conference paper

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 184))

Abstract

The rapid development of technology has resulted in an increase in the need for computing assets and many organizations are moving in the direction of outsourcing their storage and computing needs. This new trend of outsourcing resources and processes has been called “Cloud Computing”. The challenge is to provide security for data stored in public cloud, where users have reduced control of their own information. In this paper, we are going to propose a new security architecture for customers to ensure that their data is secured by deploying both symmetric and asymmetric encryption in an environment that allows for lawful interception.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Marther, T., Kumaraswamy, S., Latif, S.: Cloud Security and Privacy. O’Rielly, Sebastopol, ISBN: 978-0-596-802769

    Google Scholar 

  2. An Oracle White Paper in Enterprise Architecture, Architectural Strategies for Cloud Computing (August 2009)

    Google Scholar 

  3. Furlani, C.: Cloud Computing: Benefits and Risks of Moving Federal IT into the Cloud, National Institute of Standards and Technology (January 2010)

    Google Scholar 

  4. Cloud Security Alliance CSA, Security Guidance for Critical Areas of Focus in Cloud Computing (April 2009)

    Google Scholar 

  5. European Network and Information Security Agency, Cloud Computing: Benefits, risks and recommendations for information security (November 2009)

    Google Scholar 

  6. Broadway, J., Turnbull, B., Slay, J.: Improving the Analysis of Lawfully Intercepted Network Packet Data Captured For Forensic Analysis. In: The Third International Conference on Availability, Reliability and Security (2008)

    Google Scholar 

  7. Kamara, S., Lauter, K.: Cryptographic Cloud Storage. In: The Proceedings of Financial Cryptography: Workshop on Real-Life Cryptographic Protocols and Standardization. Published by Microsoft Researcher (January 2010)

    Google Scholar 

  8. Wang, C., Chow, S., Wang, Q., Ren, K., Lou, W.: Privacy-Preserving Public Auditing for Secure Cloud Storage. In: The Proceeding of IEEE INFOCOM 2010, San Diego, USA, March 14-19 (2010)

    Google Scholar 

  9. Shamir, A.: How to Share a Secret. Communications of the ACM 22 (November 11, 1979)

    Google Scholar 

  10. International Telecommunication Union, Technical Aspects of Lawful Interception, Technology Watch Report (May 2008)

    Google Scholar 

  11. Branch, P.: Lawful Interception of the Internet. Australian Journal of Emerging Technologies and Society 1(1) (2003)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Almulla, S.A., Yeun, C.Y. (2011). New Secure Storage Architecture for Cloud Computing. In: Park, J.J., Yang, L.T., Lee, C. (eds) Future Information Technology. Communications in Computer and Information Science, vol 184. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-22333-4_9

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-22333-4_9

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-22332-7

  • Online ISBN: 978-3-642-22333-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics