Visible to the public Study on Data Security Policy Based on Cloud Storage

TitleStudy on Data Security Policy Based on Cloud Storage
Publication TypeConference Paper
Year of Publication2017
AuthorsZhe, D., Qinghong, W., Naizheng, S., Yuhan, Z.
Conference Name2017 ieee 3rd international conference on big data security on cloud (bigdatasecurity), ieee international conference on high performance and smart computing (hpsc), and ieee international conference on intelligent data and security (ids)
ISBN Number978-1-5090-6296-6
Keywordscloud computing, cloud computing environment, cloud storage, cloud storage security policy, cloud storage system structural characteristics, composability, compositionality, Computational Intelligence, Computational modeling, cryptography, data leakage, Data models, Data security, data security policy, network storage technology, pubcrawl, Secure storage, security of data, security policy, Servers, storage management, user data security risk analysis
Abstract

Along with the growing popularisation of Cloud Computing. Cloud storage technology has been paid more and more attention as an emerging network storage technology which is extended and developed by cloud computing concepts. Cloud computing environment depends on user services such as high-speed storage and retrieval provided by cloud computing system. Meanwhile, data security is an important problem to solve urgently for cloud storage technology. In recent years, There are more and more malicious attacks on cloud storage systems, and cloud storage system of data leaking also frequently occurred. Cloud storage security concerns the user's data security. The purpose of this paper is to achieve data security of cloud storage and to formulate corresponding cloud storage security policy. Those were combined with the results of existing academic research by analyzing the security risks of user data in cloud storage and approach a subject of the relevant security technology, which based on the structural characteristics of cloud storage system.

URLhttps://ieeexplore.ieee.org/document/7980332/
DOI10.1109/BigDataSecurity.2017.12
Citation Keyzhe_study_2017