Secure Big Data Storage and Sharing Scheme for Cloud Tenants

被引:11
作者
CHENG Hongbing [1 ,2 ]
RONG Chunming [3 ]
HWANG Kai [4 ]
WANG Weihong [1 ]
LI Yanyan [1 ]
机构
[1] College of Computer Science,Zhejiang University of Technology
[2] State Key Laboratory for Novel Software Technology,Nanjing University
[3] Department of Electronic Engineering & Computer Science,University of Stavanger
[4] Electrical Engineering and Computer Science,University of Southern California
关键词
cloud computing; big data; storage and sharing; security;
D O I
暂无
中图分类号
TP333 [存贮器];
学科分类号
081201 ;
摘要
The Cloud is increasingly being used to store and process big data for its tenants and classical security mechanisms using encryption are neither sufficiently efficient nor suited to the task of protecting big data in the Cloud.In this paper,we present an alternative approach which divides big data into sequenced parts and stores them among multiple Cloud storage service providers.Instead of protecting the big data itself,the proposed scheme protects the mapping of the various data elements to each provider using a trapdoor function.Analysis,comparison and simulation prove that the proposed scheme is efficient and secure for the big data of Cloud tenants.
引用
收藏
页码:106 / 115
页数:10
相关论文
共 6 条
[1]   The design of a redundant array of independent net-storages for improved confidentiality in cloud computing [J].
Jaatun, Martin Gilje ;
Zhao, Gansen ;
Vasilakos, Athanasios V. ;
Nyre, Asmund Ahlmann ;
Alapnes, Stian ;
Tang, Yong .
JOURNAL OF CLOUD COMPUTING-ADVANCES SYSTEMS AND APPLICATIONS, 2012, 1 (01) :1-19
[2]  
Secure and privacy preserving keyword searching for cloud storage services[J] . Qin Liu,Guojun Wang,Jie Wu. Journal of Network and Computer Applications . 2011 (3)
[3]  
Database encryption[J] . Erez Shmueli,Ronen Vaisenberg,Yuval Elovici,Chanan Glezer. ACM SIGMOD Record . 2010 (3)
[4]  
A survey on security issues in service delivery models of cloud computing[J] . S. Subashini,V. Kavitha. Journal of Network and Computer Applications . 2010 (1)
[5]  
Building web applications on top of encrypted data using Mylar .2 Popa R A,Stark E,Heifer J,et al. USENIX Symposium of Networked Systems Design and Implementation . 2014
[6]  
Ens ure Data Security inCloud Storage .2 Xiao Zhang,Hong-tao Du,Jian-quan Chen,et a l. Network Comp uting a nd Information Security (NCIS) . 2011