Skip to main content

SDSPF: A Secure Data Storage and Processing Framework for Cloud Computing Systems

  • Conference paper
  • 1346 Accesses

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 180))

Abstract

As cloud computing brings ease of use and cost-saving features, the security and privacy of data is simultaneously becoming very challenging. The security of cloud data can be classified into two aspects: static storage security and dynamic processing security. Current researches only focus on either storage security or protecting the safety of data processing service. To offer a comprehensive data security solution, we present a secure data storage and processing framework (SDSPF) for cloud computing systems, which protects the whole life cycle of user data.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Kamara, S., Lauter, K.: Cryptographic Cloud Storage. In: Sion, R., Curtmola, R., Dietrich, S., Kiayias, A., Miret, J.M., Sako, K., Sebé, F. (eds.) RLCPS, WECSR, and WLC 2010. LNCS, vol. 6054, pp. 136–149. Springer, Heidelberg (2010)

    Google Scholar 

  2. Wang, C., Cao, N., Li, J., Ren, K., Lou, W.: Secure Ranked Keyword Search over Encrypted Cloud Data. In: 30th International Conference on Distributed Computing Systems, pp. 253–262. IEEE Press, Genoa (2010)

    Google Scholar 

  3. Cao, N., Wang, C., Li, M., Ren, K., Lou, W.: Privacy-Preserving Multi-keyword Ranked Search over Encrypt. In: 31st Conference on Computer Communications, pp. 829–837. IEEE Press, Shanghai (2011)

    Google Scholar 

  4. Narayan, S., Gagné, M., Safavi-Naini, R.: Privacy preserving EHR system using attribute-based infrastructure. In: 2010 ACM Workshop on Cloud Computing Security, pp. 47–52. ACM Press, New York (2010)

    Google Scholar 

  5. Bowers, K., Juels, A., Oprea, A.: HAIL: A High-Availability and Integrity Layer for Cloud Storage. In: 16th ACM Conference on Computer and Communications Security, pp. 187–198. ACM Press, New York (2009)

    Google Scholar 

  6. Heitzmann, A., Palazzi, B., Papamanthou, C., Tamassia, R.: Efficient Integrity Checking of Untrusted Network Storage. In: 4th ACM International Workshop on Storage Security and Survivability, pp. 43–54. ACM Press, New York (2008)

    Google Scholar 

  7. Wang, C., Wang, Q., Ren, K., Lou, W.: Ensuring Data Storage Security in Cloud Computing. In: 17th International Workshop on Quality of Service, pp. 1–9. IEEE Press, Charlestion (2009)

    Google Scholar 

  8. Erway, C., Küpçü, A., Papamanthou, C., Tamassia, R.: Dynamic provable data possession. In: 16th ACM Conference on Computer and Communications Security, pp. 213–222. ACM Press, New York (2009)

    Google Scholar 

  9. Kher, V., Kim, Y.: Building Trust in Storage Outsourcing: Secure Accounting of Utility Storage. In: 26th IEEE International Symposium on Reliable Distributed Systems, pp. 55–64. IEEE Press, Washington, DC (2007)

    Google Scholar 

  10. Dai, W., Jin, H., Zou, D., Xu, S., Zheng, W., Shi, L.: TEE: A Virtual DRTM Based Execution Environment for Secure Cloud-End Computing. In: 17th ACM Conference on Computer and Communications Security, pp. 663–665. ACM Press, Chicago (2010)

    Google Scholar 

  11. Zou, D., Long, J., Jin, H.: Trusted Deployment of Virtual Execution Environment in Grid Systems. In: Datta, A. (ed.) ASIAN 2009. LNCS, vol. 5913, pp. 124–136. Springer, Heidelberg (2009)

    Google Scholar 

  12. McCune, J., Parno, B., Perrig, A., Reiter, M., Isozaki, H.: Flicker: an execution infrastructure for TCB minimization. In: 3rd ACM SIGOPS/EuroSys European Conference on Computer Systems, pp. 315–328. ACM Press, New York (2008)

    Google Scholar 

  13. Zhang, F., Chen, J., Chen, H., Zang, B.: CloudVisor: retrofitting protection of virtual machines in multi-tenant cloud with nested virtualization. In: 23rd ACM Symposium on Operating Systems Principles, pp. 203–216. ACM Press, New York (2011)

    Google Scholar 

  14. Chen, X., Garfinkel, T., Lewis, E., Subrahmanyam, P., Waldspurger, C., Boneh, D., Dwoskin, J., Ports, D.: Overshadow: A Virtualization-Based Approach to Retrofitting Protection in Commodity Operating Systems. In: 13th Conference on Architectural Support for Programming Languages and Operating Systems, pp. 2–13. ACM Press, New York (2008)

    Google Scholar 

  15. Yang, J., Shin, K.: Using hypervisor to provide data secrecy for user applications on a per-page basis. In: 4th ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environments, pp. 71–80. ACM Press, New York (2008)

    Google Scholar 

  16. Xiang, G., Jin, H., Zou, D., Zhang, X., Wen, S., Zhao, F.: VMDriver: A Driver-based Monitoring Mechanism for Virtualization. In: 29th International Symposium on Reliable Distributed Systems, pp. 72–81. IEEE Press, New Delhi (2010)

    Google Scholar 

  17. Dinaburg, A., Royal, P., Sharif, M., Lee, W.: Ether: Malware Analysis via Hardware Virtualization Extensions. In: 15th ACM Conference on Computer and Communications Security, pp. 51–62. ACM Press, New York (2008)

    Google Scholar 

  18. O’Hearn, Z., Warner, B.: Tahoe: the least-authority filesystem. In: 4th ACM International Workshop on Storage Security and Survivability, pp. 21–26. ACM Press, New York (2008)

    Google Scholar 

  19. TCG Specification Architecture Overview, http://www.trustedcomputinggroup.org

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer Science+Business Media Dordrecht

About this paper

Cite this paper

Ran, L., Jin, H. (2012). SDSPF: A Secure Data Storage and Processing Framework for Cloud Computing Systems. In: Park, J., Kim, J., Zou, D., Lee, Y. (eds) Information Technology Convergence, Secure and Trust Computing, and Data Management. Lecture Notes in Electrical Engineering, vol 180. Springer, Dordrecht. https://doi.org/10.1007/978-94-007-5083-8_17

Download citation

  • DOI: https://doi.org/10.1007/978-94-007-5083-8_17

  • Publisher Name: Springer, Dordrecht

  • Print ISBN: 978-94-007-5082-1

  • Online ISBN: 978-94-007-5083-8

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics