Guest Editorial for Special Section on Advanced Techniques for Efficient and Reliable Cloud Storage
نویسندگان
چکیده
CLOUD computing has emerged as a disruptive technology andnew computing paradigm inwhich IT resources (hardware, software, applications, data storage, computing capacity, etc.) are provided as services over the Internet, through “everything-as-a-service”. It builds on the foundations of distributed computing, grid computing, virtualization, service orientation, etc. Cloud storage, which is one of the most attractive cloud services, offers numerous benefits from both the technology and functionality perspectives such as increased availability, flexibility, functionality and costs. However, Cloud environment needs to manage data center virtualization, lower cost and boost reliability by consolidating systems in the cloud. Despite of very fast advances, the new Cloud environment creates major data management challenges such as efficient and reliable remote storage, online data query processing, outsourcing computation and secure virtualization. This special section addresses such challenging issues covering recent advances in cloud storage, with emphasis on Cloud storage service selection, Cloud data auditing, Cloud data encryption and Cloud data de-duplication. After a very rigorous review process in three rounds, four high quality papers were selected for this special section, which are arranged as follows. In the first paper “Smart Cloud Storage Service Selection Based on Fuzzy Logic, Theory of Evidence and Game Theory”, Esposito et al. present an approach for optimal selection of Cloud services fitting the customer requirements in terms of quality of service and costs. The aim is to handle uncertainty in the expression of subjective preferences from customers in presence of rational/selfish providers, exposing untrustworthy indications concerning the quality of service levels and prices associated to their offers. Fuzzy sets theory is used to express vagueness in the subjective preferences of the customers while the selection strategy is complemented by the adoption of a game theoretic approach for promoting truth-telling ones among service providers. In the second paper, “Public Integrity Auditing for Shared Dynamic Cloud Data with Secure Group User Revocation” by Jiang et al., the authors investigate secure remote data auditing to achieve secure and efficient public data integrity auditing for shared dynamic data. An efficient public integrity auditing schemewith secure groupuser revocation based on vector commitment and verifier-local revocation group signature is therefore presented, which supports the public checking and efficient user revocation and also some properties, such as confidently, efficiency, accountability and traceability of secure group user revocation. Cui et al. in the third paper, “Key-Aggregate Searchable Encryption (KASE) for Group Data Sharing via Cloud Storage”, study security concerns over inadvertent data leaks in the cloud due to the capability of selectively sharing encrypted data with different users via public cloud storage. The authors propose a novel concept of key-aggregate searchable encryption and instantiating the concept through a concrete KASE scheme, in which a data owner only needs to distribute a single key to a user for sharing a large number of documents, and the user only needs to submit a single trapdoor to the cloud for querying the shared documents. The final paper, “Secure Auditing and De-duplicating Data in Cloud” by Li et al., deals with some research issues related to data outsourcing to cloud service. In their approach their consider how to realize data deduplication in cloud while achieving integrity auditing. Aiming at achieving both data integrity and deduplication in cloud, they propose two secure systems to enable integrity auditing and secure deduplication on encrypted data. The guest editors would like to thank Prof. Albert Zomaya for the opportunity to edit this special section. The support by journal managers during the editorial process is also highly appreciated.
منابع مشابه
Guest Editorial: Impact of Integrated Intelligent Information and Analytical Systems on Society
The Special Issue of the Journal of Information Technology Management (JITM) is publishing very selective papers on information management, technology in higher education, integrated systems, enterprise management, cultural thoughts, strategic contributions, management information systems, and cloud computing. We received numerous papers for this special issue but after an extensive pe...
متن کاملGuest Editorial Introduction to the Special Section on Advanced Servo Control for Emerging Data Storage Systems
متن کامل
An Efficient Secret Sharing-based Storage System for Cloud-based Internet of Things
Internet of things (IoTs) is the newfound information architecture based on the internet that develops interactions between objects and services in a secure and reliable environment. As the availability of many smart devices rises, secure and scalable mass storage systems for aggregate data is required in IoTs applications. In this paper, we propose a new method for storing aggregate data in Io...
متن کاملGuest Editorial Communication Methodologies for the Next-Generation Storage Systems
INFORMATION is being generated at a rapid pace. To sustain this information revolution, next-generation data storage must be more practical, economical, and reliable than ever before. There are presently more than half a million data centers world-wide and this number is expected to rise even further. Companies like Google, Facebook, and Microsoft have already invested billions of dollars into ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- IEEE Trans. Computers
دوره 65 شماره
صفحات -
تاریخ انتشار 2016