Lazy Disclosure - Mixing Cloud and Local Storage
نویسندگان
چکیده
The use of multiple computer systems by a single user makes data transfer a necessity. Cloud storage solutions provide synchronisation features and file accessibility across systems but the exact location and type of storage varies between services. Many systems rely on a client-server architecture where the data is held at the data centers of the service provider. This leads to several difficulties for the end user, for example with regard to privacy or data security. This is countered by the convenience of highly available servers. If the user wants to minimise exposure to the challenges of Cloud-based services, then he is required to either host a server infrastructure himself or to rely on inconvenient on-demand synchronisation by means of file transport protocols or even physical storage devices. The approach presented here tries to harvest the positive aspects of using Cloud-based services while keeping the user in control of his data. To this end, we focus on a hybrid system of a client-server and a peer-to-peer architecture which expands the Cloud to the user’s system giving him full control over which data he selects to be stored on a server in the Cloud and which data he prefers to keep private on personal computing devices while ensuring unified access to both types of storage over the network.
منابع مشابه
K2C: Cryptographic Cloud Storage with Lazy Revocation and Anonymous Access
Security and privacy concerns hinder the adoption of cloud storage and computing in sensitive environments. We present a user-centric privacypreserving cryptographic access control protocol called K2C (Key To Cloud) that enables end-users to securely store, share, and manage their sensitive data in an untrusted cloud storage anonymously. K2C is scalable and supports the lazy revocation. It can ...
متن کاملAchieving Fine-grained Access Control and Integrity Auditing in Cloud Storage ⋆
Attributes based encryption (ABE) can achieve flexible and scalable access control and gurantee the confidentiality of the data stored in the cloud. However, important issues such as efficient user revocation and fine-grained access control are not straightforward, which constrain the adoption of ABE in cloud storage systems.Our proposed scheme realizes fine-grained read and write access contro...
متن کاملA Literature Review on Cloud Computing Security Issues
The use of Cloud Computing has increasedrapidly in many organization .Cloud Computing provides many benefits in terms of low cost and accessibility of data. In addition Cloud Computing was predicted to transform the computing world from using local applications and storage into centralized services provided by organization.[10] Ensuring the security of Cloud Computing is major factor in the Clo...
متن کاملA Literature Review on Cloud Computing Security Issues
The use of Cloud Computing has increasedrapidly in many organization .Cloud Computing provides many benefits in terms of low cost and accessibility of data. In addition Cloud Computing was predicted to transform the computing world from using local applications and storage into centralized services provided by organization.[10] Ensuring the security of Cloud Computing is major factor in the Clo...
متن کاملAnalysis of Different Privacy Preserving Cloud Storage Frameworks
Privacy Security of data in Cloud Storage is one of the main issues. Many Frameworks and Technologies are used to preserve data security in cloud storage. [1] Proposes a framework which includes the design of data organization structure, the generation and management of keys, the treatment of change of user’s access right and dynamic operations of data, and the interaction between participants....
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2012