scholarly journals Study on Encryption Techniques Used to Secure Cloud Storage System

Author(s):  
Athulya V S ◽  
Dileesh E D

Cloud storage is used generally to store data and realize the data sharing with others. A cloud storage system stores large number of data in its storage server. Data that are stored to the cloud have to be secured in order to avoid the data from exploiting. There are several techniques and methods that are used to secure the data before uploading it to the cloud such as cryptographic encryption techniques. In this paper, we study about different encryption technique to protect the cloud storage environment. This paper covers some of the existing cryptographic approaches that can be used to improve the security in cloud environment.

2014 ◽  
Vol 668-669 ◽  
pp. 1257-1262
Author(s):  
Jun Zuo ◽  
Zhen Zhu ◽  
Jing Yan Wang

In order to meet growing demand of storage resources, improve the security and integrity of enterprise information resources, this paper analyzes storage resources status and existing problems of Foshan XY Elec-Mech Limited Corp in the first. Based on detailed analysis of cloud storage hierarchy and its advantages, the cloud storage framework is designed to meet enterprise’s demands, security control strategies and backup strategies are also discussed. After implementation, the integration of information resources in multi-systems and multi-platforms may realized for providing users with massive information storage and access services. Furthermore, when disaster coming, multiple backups may be used to recovery for ensuring the continuity of enterprise’s business processing.


2019 ◽  
Vol 30 (04) ◽  
pp. 551-570 ◽  
Author(s):  
Wenjuan Meng ◽  
Jianhua Ge ◽  
Tao Jiang

A cloud storage system which incorporates the deletion and deduplication functionalities will have both security and efficiency advantages over exiting solutions which provide only one of them. However, the security models of secure data deletion and data deduplication functionalities are not compatible with each other, which will cause security and efficiency vulnerability under coercive adversaries. To solve these security and efficiency challenges, we define and construct a scheme, whose security relies on the proper erasure of keys in the wrapped key tree and periodical update of the deduplication encryption keys. Moreover, we enhance the efficiency of the proposed scheme by introducing incremental data update, where only the changed part is encrypted/decrypted and uploaded/downloaded in data updating. Further security analysis shows that the proposed scheme is secure against coercive attack. Finally, the practical implementation shows that our scheme is performance efficient in computation, storage and communication for both the cloud storage server and users.


2015 ◽  
Vol 20 (4) ◽  
pp. 1437-1448 ◽  
Author(s):  
Xuan Li ◽  
Jin Li ◽  
Faliang Huang

2021 ◽  
Vol 2021 ◽  
pp. 1-12
Author(s):  
Won-Bin Kim ◽  
Daehee Seo ◽  
Donghyun Kim ◽  
Im-Yeong Lee

In general, ID-based proxy reencryption (IBPRE) includes data transfer in a 1 : 1 manner between a sender and receiver. Therefore, only the data owner has the authority to decrypt or reencrypt the data that is encrypted with his/her public key. However, in an environment with data self-sovereignty, such as an enterprise IoT-cloud environment, the data are directly managed by cloud once data is uploaded from user-controlled IoT devices. In such a situation, there is no way of sharing data if the data owner has no access over the data due to being outside the workplace and other issues. In this study, to solve this problem, data can be shared even when the data cannot be accessed by delegating the authority of the data owner to generate the reencryption key to other users. In addition, by solving the security threats that may appear in this process, data sharing can be performed securely and efficiently in the corporate environment.


Sign in / Sign up

Export Citation Format

Share Document