Abstract
The rapid development of technology has resulted in an increase in the need for computing assets and many organizations are moving in the direction of outsourcing their storage and computing needs. This new trend of outsourcing resources and processes has been called “Cloud Computing”. The challenge is to provide security for data stored in public cloud, where users have reduced control of their own information. In this paper, we are going to propose a new security architecture for customers to ensure that their data is secured by deploying both symmetric and asymmetric encryption in an environment that allows for lawful interception.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Marther, T., Kumaraswamy, S., Latif, S.: Cloud Security and Privacy. O’Rielly, Sebastopol, ISBN: 978-0-596-802769
An Oracle White Paper in Enterprise Architecture, Architectural Strategies for Cloud Computing (August 2009)
Furlani, C.: Cloud Computing: Benefits and Risks of Moving Federal IT into the Cloud, National Institute of Standards and Technology (January 2010)
Cloud Security Alliance CSA, Security Guidance for Critical Areas of Focus in Cloud Computing (April 2009)
European Network and Information Security Agency, Cloud Computing: Benefits, risks and recommendations for information security (November 2009)
Broadway, J., Turnbull, B., Slay, J.: Improving the Analysis of Lawfully Intercepted Network Packet Data Captured For Forensic Analysis. In: The Third International Conference on Availability, Reliability and Security (2008)
Kamara, S., Lauter, K.: Cryptographic Cloud Storage. In: The Proceedings of Financial Cryptography: Workshop on Real-Life Cryptographic Protocols and Standardization. Published by Microsoft Researcher (January 2010)
Wang, C., Chow, S., Wang, Q., Ren, K., Lou, W.: Privacy-Preserving Public Auditing for Secure Cloud Storage. In: The Proceeding of IEEE INFOCOM 2010, San Diego, USA, March 14-19 (2010)
Shamir, A.: How to Share a Secret. Communications of the ACM 22 (November 11, 1979)
International Telecommunication Union, Technical Aspects of Lawful Interception, Technology Watch Report (May 2008)
Branch, P.: Lawful Interception of the Internet. Australian Journal of Emerging Technologies and Society 1(1) (2003)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Almulla, S.A., Yeun, C.Y. (2011). New Secure Storage Architecture for Cloud Computing. In: Park, J.J., Yang, L.T., Lee, C. (eds) Future Information Technology. Communications in Computer and Information Science, vol 184. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-22333-4_9
Download citation
DOI: https://doi.org/10.1007/978-3-642-22333-4_9
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-22332-7
Online ISBN: 978-3-642-22333-4
eBook Packages: Computer ScienceComputer Science (R0)