State of The Art and Hot Aspects in Cloud DataStorage Security

作者: Fredric Morenius , Nicolae Paladi , Christian Gehrmann

DOI:

关键词:

摘要: Along with the evolution of cloud computing and storage towards matu- rity, researchers have analyzed an increasing range security aspects, data security being important topic in this area. In paper, we examine state art through overview of selected peer reviewed publications. We address question defining cloud storage its different aspects, as well enumerate main vec- tors attack on storage. The papers present techniques for key management controlled disclosure encrypted storage, while novel ideas regarding secure operations methods pro- tection fully virtualized environments provide a glimpse toolbox available securing Finally, new challenges such emergent government regulation call solutions to problems that did not receive enough attention earlier stages computing, example geographical location data. presented selected review represent only small fraction wide research effort within storage security. Nevertheless, they serve indication diversity problems that are addressed.

参考文章(24)
Martin Mulazzani, Sebastian Schrittwieser, Manuel Leithner, Markus Huber, Edgar Weippl, None, Dark clouds on the horizon: using cloud storage as attack vector and online slack space usenix security symposium. pp. 5- 5 ,(2011)
Saman Zarandioon, Danfeng Yao, Vinod Ganapathy, K2C: Cryptographic Cloud Storage with Lazy Revocation and Anonymous Access Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering. pp. 59- 76 ,(2012) , 10.1007/978-3-642-31909-9_4
Raluca Ada Popa, David Molnar, Helen J. Wang, Jacob R. Lorch, Li Zhuang, Enabling security in cloud storage SLAs with CloudProof usenix annual technical conference. pp. 31- 31 ,(2011)
Melissa Chase, Seny Kamara, Structured Encryption and Controlled Disclosure international conference on the theory and application of cryptology and information security. ,vol. 6477, pp. 577- 594 ,(2010) , 10.1007/978-3-642-17373-8_33
Nafise Sadat Moosavi, Reza Azmi, Hamed Nemati, Mohamad Rezaei, TCvisor: A hypervisor level secure storage international conference for internet technology and secured transactions. pp. 1- 9 ,(2010)
Krishna P. Gummadi, Nuno Santos, Rodrigo Rodrigues, Stefan Saroiu, Policy-sealed data: a new abstraction for building trusted cloud services usenix security symposium. pp. 10- 10 ,(2012)
Craig Gentry, Computing arbitrary functions of encrypted data Communications of the ACM. ,vol. 53, pp. 97- 105 ,(2010) , 10.1145/1666420.1666444
Men Long, Prashant Dewan, Hormuzd Khosravi, David Durham, Gayathri Nagabhushan, A hypervisor-based system for protecting software runtime memory and persistent storage spring simulation multiconference. pp. 828- 835 ,(2008) , 10.5555/1400549.1400685
Fengzhe Zhang, Jin Chen, Haibo Chen, Binyu Zang, CloudVisor Proceedings of the Twenty-Third ACM Symposium on Operating Systems Principles - SOSP '11. pp. 203- 216 ,(2011) , 10.1145/2043556.2043576
Yushi Omote, Yosuke Chubachi, Takahiro Shinagawa, Tomohiro Kitamura, Hideki Eiraku, Katsuya Matsubara, Hypervisor-based background encryption acm symposium on applied computing. pp. 1829- 1836 ,(2012) , 10.1145/2245276.2232073