طرح نگهداری از ذخیره سازی ابری سه لایه خصوصی مبتنی بر هوش محاسباتی در محاسبات مه / A Three-Layer Privacy Preserving Cloud Storage Scheme Based on Computational Intelligence in Fog Computing

طرح نگهداری از ذخیره سازی ابری سه لایه خصوصی مبتنی بر هوش محاسباتی در محاسبات مه A Three-Layer Privacy Preserving Cloud Storage Scheme Based on Computational Intelligence in Fog Computing

  • نوع فایل : کتاب
  • زبان : انگلیسی
  • ناشر : IEEE
  • چاپ و سال / کشور: 2018

توضیحات

رشته های مرتبط مهندسی کامپیوتر
گرایش های مرتبط رایانش ابری، هوش مصنوعی
مجله معاملات IEEE در مباحث تازه در محاسبات هوشمند – IEEE Transactions on Emerging Topics in Computational Intelligence
دانشگاه Department of Computer Science and Technology – Huaqiao University – Xiamen
شناسه دیجیتال – doi https://doi.org/10.1109/TETCI.2017.2764109
منتشر شده در نشریه IEEE
کلمات کلیدی انگلیسی Cloud computing, cloud storage, fog computing, privacy protection

Description

I. INTRODUCTION SINCE the 21st century, computer technology has developed rapidly. Cloud computing, an emerging technology, was first proposed in SES 2006 (Search Engine Strategies 2006) by San Jose and defined by NIST (National Institute of Standards and Technology) [1]. Since it was proposed, cloud computing has attracted great attention from different sectors of society. Cloud computing has gradually matured through so many people’s efforts [2]. Then there are some cloud-based technologies deriving from cloud computing. Cloud storage is an important part of them. With the rapid development of network bandwidth, the volume of user’s data is rising geometrically [3]. User’s requirement cannot be satisfied by the capacity of local machine any more. Therefore, people try to find new methods to store their data. Pursuing more powerful storage capacity, a growing number of users select cloud storage. Storing data on a public cloud server is a trend in the future and the cloud storage technology will become widespread in a few years. Cloud storage is a cloud computing system which provides data storage and management service. With a cluster of applications, network technology and distributed file system technology, cloud storage makes a large number of different storage devices work together coordinately [4], [5]. Nowadays there are a lot of companies providing a variety of cloud storage services, such as Dropbox, Google Drive, iCloud, Baidu Cloud, etc. These companies provide large capacity of storage and various services related to other popular applications, which in turn leads to their success in attracting humorous subscribers. However, cloud storage service still exists a lot of security problems. The privacy problem is particularly significant among those security issues. In history, there were some famous cloud storage privacy leakage events. For example, Apples iCloud leakage event in 2014, numerous Hollywood actresses private photos stored in the clouds were stolen. This event caused an uproar, which was responsible for the users’ anxiety about the privacy of their data stored in cloud server. As shown in Fig. 1, user uploads data to the cloud server directly. Subsequently, the Cloud Server Provider (CSP) will take place of user to manage the data. In consequence, user do not actually control the physical storage of their data, which results in the separation of ownership and management of data [6]. The CSP can freely access and search the data stored in the cloud. Meanwhile the attackers can also attack the CSP server to obtain the user’s data. The above two cases both make users fell into the danger of information leakage and data loss. Traditional secure cloud storage solutions for the above problems are usually focusing on access restrictions or data encryption.
اگر شما نسبت به این اثر یا عنوان محق هستید، لطفا از طریق "بخش تماس با ما" با ما تماس بگیرید و برای اطلاعات بیشتر، صفحه قوانین و مقررات را مطالعه نمایید.

دیدگاه کاربران


لطفا در این قسمت فقط نظر شخصی در مورد این عنوان را وارد نمایید و در صورتیکه مشکلی با دانلود یا استفاده از این فایل دارید در صفحه کاربری تیکت ثبت کنید.

بارگزاری