高级检索

    公共云存储服务数据安全及隐私保护技术综述

    Secure and Privacy-Preserving Data Storage Service in Public Cloud

    • 摘要: 随着云计算技术的日益普及,公共云存储服务已经得到普遍的应用,DropBox、Google Drive、金山快盘等公共云存储应用的用户飞速增长.然而,用户对他们保存在云端数据的隐私性、完整性以及可控分享的关切也日益增长.针对这一问题,近年来学术界对公共云存储服务中数据的细粒度访问控制、密文搜索、数据完整性审计以及云存储数据的安全销毁等问题展开了大量研究.对云存储数据安全和隐私保护技术方向的研究进展进行综述,并指出待解决的关键问题.

       

      Abstract: Cloud computing has been gradually considered the most significant turning point in the development of information technology during past few years. People reap the benefits from cloud, such as ubiquitous and flexible access, considerable capital expenditure savings, pay-as-you-go computing resources configuration, etc. Many companies, organizations, and individual users have adopted the public cloud storage service to facilitate their business operations, research, or everyday needs. However, in the outsourcing cloud computing model, users’ physical control of the underlying infrastructure including the system hardware and lower levels of software stack, is shifted to third-party public cloud service providers, such as Dropbox, Google Drive, Microsoft SkyDrive and so on. In addition, the sensitive data of users are also outsourced to and stored in the cloud, e.g., they may upload emails, photos, financial reports, and health records to the cloud. Thus, the potential private information leakage and integrity of the outsourced data is one of the primary concerns for the cloud users. To build users’ confidence in such cloud storage service paradigm, tons of attentions have been drawn and a number of related problems have been studied extensively in the literature, such as fine-grained cloud data access control mechanism, secure search over encrypted cloud data, outsourced data integrity auditing, secure deletion for cloud data, etc., which ensure that cloud users enjoy the convenience the cloud offers in a privacy-preserving way. Otherwise, the cloud will become merely a remote storage which provides limited values to all parties. This paper focuses on the enabling and critical cloud computing security protection techniques and surveys on the recent researches in these areas. In addition, we further point out some unsolved but important challenging issues and hopefully provides insight into their possible solutions.

       

    /

    返回文章
    返回