A Novel Approach for Data Storage Security in a Hosted Environment
نویسندگان
چکیده
The introduction of hosted environments to computing has brought a lot of change in the industry. With the advent of Infrastructure-as-a-Service, the concept of renting data stores is catching up. Security for the data in a hosted environment is an alarming issue. The paper focuses on cloud data storage security. We propose a security model to maintain the data store. This model ensures the safety of data in the hosted environment. By utilizing the homomorphic token with random masking the model achieves the abstraction of data stored on the Hosted Environment.
منابع مشابه
DoS-Resistant Attribute-Based Encryption in Mobile Cloud Computing with Revocation
Security and privacy are very important challenges for outsourced private data over cloud storages. By taking Attribute-Based Encryption (ABE) for Access Control (AC) purpose we use fine-grained AC over cloud storage. In this paper, we extend previous Ciphertext Policy ABE (CP-ABE) schemes especially for mobile and resource-constrained devices in a cloud computing environment in two aspects, a ...
متن کاملA Literature Review on Cloud Computing Security Issues
The use of Cloud Computing has increasedrapidly in many organization .Cloud Computing provides many benefits in terms of low cost and accessibility of data. In addition Cloud Computing was predicted to transform the computing world from using local applications and storage into centralized services provided by organization.[10] Ensuring the security of Cloud Computing is major factor in the Clo...
متن کاملA Literature Review on Cloud Computing Security Issues
The use of Cloud Computing has increasedrapidly in many organization .Cloud Computing provides many benefits in terms of low cost and accessibility of data. In addition Cloud Computing was predicted to transform the computing world from using local applications and storage into centralized services provided by organization.[10] Ensuring the security of Cloud Computing is major factor in the Clo...
متن کاملDetailed Modeling and Novel Scheduling of Plug-in Electric Vehicle Energy Storage Systems for Energy Management of Multi-microgrids Considering the Probability of Fault Occurrence
As an effective means of displacing fossil fuel consumption and reducing greenhouse gas emissions, plug-in electric vehicles (PEVs) and plug-in hybrid electric vehicles (PHEVs) have attracted more and more attentions. From the power grid perspective, PHEVs and PEVs equipped with batteries can also be used as energy storage facilities, due to the fact that, these vehicles are parked most of the ...
متن کاملTracing Adaptive Security Decisions
One of the challenges of any adaptive system is to ensure that users can understand how and why the behaviour of the system changes at runtime. This is particularly important for adaptive security behaviours which are essential for applications that are used in many different contexts, such as those hosted in the cloud. In this paper, we propose an approach for using traceability information, e...
متن کامل