ISSN 1000-1239 CN 11-1777/TP

Journal of Computer Research and Development ›› 2021, Vol. 58 ›› Issue (10): 2079-2098.doi: 10.7544/issn1000-1239.2021.20210805

Special Issue: 2021密码学与网络空间安全治理专题

Previous Articles     Next Articles

Protection Methods for Cloud Data Security

Shen Jian1, Zhou Tianqi1, Cao Zhenfu2   

  1. 1(School of Computer and Software, Nanjing University of Information Science and Technology, Nanjing 210044);2(Shanghai Key Laboratory of Trustworthy Computing (East China Normal University), Shanghai 200062)
  • Online:2021-10-01
  • Supported by: 
    This work was supported by the National Natural Science Foundation of China (61922045, U1836115, 61672295), the Natural Science Foundation of Jiangsu Province (BK20181408), and the Project of the Cyberspace Security Research Center, Peng Cheng Laboratory of Guangdong Province (PCL2018KP004).

Abstract: The rapid development of computer networks and the popularization of big data have promoted the further development of cloud computing. The cloud environment is an important platform for data interaction in the network and information age. It provides great convenience for the efficient data interaction of individuals, enterprises and countries, but it also poses new challenges for the security of cloud data. In this paper, we first present the existing cloud computing model, investigate and analyze the threats in cloud data security protection schemes. On this basis, a systematic analysis of the latest research results of cloud data security protection schemes at home and abroad is conducted, namely, access control, key agreement, secure data auditing and secure data sharing. Secondly, we conduct systematic research and propose solutions to the problems such as easy disclosure of user privacy during the access control process, difficulty in controlling overhead during key generation, low efficiency in dynamic operations during auditing, and difficulty in tracking malicious users during data sharing in existing cloud data security protection schemes. Finally, the current challenges and future research directions of cloud data security protection are discussed, with a view to promoting the establishment of a more complete cloud data protection system.

Key words: cloud data security, access control, key agreement, secure data auditing, secure data sharing

CLC Number: