Presentation is loading. Please wait.

Presentation is loading. Please wait.

Cloud Storage Security Name: Mingke Chen. Cloud Computing Advantages: Security Privacy Disadvantages: Backup and Recovery Almost Unlimited Storage Efficiency.

Similar presentations


Presentation on theme: "Cloud Storage Security Name: Mingke Chen. Cloud Computing Advantages: Security Privacy Disadvantages: Backup and Recovery Almost Unlimited Storage Efficiency."— Presentation transcript:

1 Cloud Storage Security Name: Mingke Chen

2 Cloud Computing Advantages: Security Privacy Disadvantages: Backup and Recovery Almost Unlimited Storage Efficiency and Performance Increasing

3 Cloud Computing Storage Security Issues: 1.Traditional Security problems 2. Law Issue 3. Third party Issue

4 Related Research for Storage Security : 1.Authorization: 2.Encryption: 3. Segmentation: Multi-level authorization The Face Fuzzy Vault RSA Encryption AES Encryption Hybrid Encryption Metadata Based Storage Model Multi-cloud Architecture Model Figure: Segmentation Backup System

5 Figure: Multi-cloud Architecture Model Table: Metadata Based Storage Model Level

6 REFERENCES : [1]L. Wentao, "Research on cloud computing security problem and strategy," in Consumer Electronics, Communications and Networks (CECNet), nd International Conference on, 2012, pp [2]H. Bakshi, M. Mulla, N. Dutta, and V. Shinde, "Multi Cloud Architecture to Provide Data Security And Integrity," IJETAE, vol. 3, [3]E. Chang, T. Dillon, and W. Chen, "Cloud Computing: Issues and Challenges," in Advanced Information Networking and Applications (AINA), th IEEE International Conference on, 2010, pp [4]C. Zhibin and Y. Jianfeng, "Cloud Computing Research and Security Issues," in Computational Intelligence and Software Engineering (CiSE), 2010 International Conference on, 2010, pp [5]A. Y. Chang, C. Chun-Jung, L. Uei-Chin, and T. Chang-Lung, "Information security issue of enterprises adopting the application of cloud computing," in Networked Computing and Advanced Information Management (NCM), 2010 Sixth International Conference on, 2010, pp [6]P. Sanghavi and V. Joshi, "Three tier data storage security in cloud using Face fuzzy vault," in Computing, Communication and Applications (ICCCA), 2012 International Conference on, 2012, pp [7]A. Bogdanov, C. Paar, M. Wienecke, and T. Eisenbarth, "Differential cache-collision timing attacks on AES with applications to embedded CPUs," in Topics in Cryptology-CT-RSA 2010, ed: Springer, 2010, pp [8]L. Weiwei, L. Mingqi, and Y. Chao, "A Novel Triple Encryption Scheme for Hadoop-Based Cloud Data Security," in Emerging Intelligent Data and Web Technologies (EIDWT), 2013 Fourth International Conference on, 2013, pp [9]C. SelvaKumar, M. R. Sumalatha, and M. Venkatesh, "Improving public auditability, data possession in data storage security for cloud computing," in Recent Trends In Information Technology (ICRTIT), 2012 International Conference on, 2012, pp


Download ppt "Cloud Storage Security Name: Mingke Chen. Cloud Computing Advantages: Security Privacy Disadvantages: Backup and Recovery Almost Unlimited Storage Efficiency."

Similar presentations


Ads by Google