Shen Jian, Zhou Tianqi, Cao Zhenfu. Protection Methods for Cloud Data Security[J]. Journal of Computer Research and Development, 2021, 58(10): 2079-2098. DOI: 10.7544/issn1000-1239.2021.20210805
Citation:
Shen Jian, Zhou Tianqi, Cao Zhenfu. Protection Methods for Cloud Data Security[J]. Journal of Computer Research and Development, 2021, 58(10): 2079-2098. DOI: 10.7544/issn1000-1239.2021.20210805
Shen Jian, Zhou Tianqi, Cao Zhenfu. Protection Methods for Cloud Data Security[J]. Journal of Computer Research and Development, 2021, 58(10): 2079-2098. DOI: 10.7544/issn1000-1239.2021.20210805
Citation:
Shen Jian, Zhou Tianqi, Cao Zhenfu. Protection Methods for Cloud Data Security[J]. Journal of Computer Research and Development, 2021, 58(10): 2079-2098. DOI: 10.7544/issn1000-1239.2021.20210805
1(School of Computer and Software, Nanjing University of Information Science and Technology, Nanjing 210044)
2(Shanghai Key Laboratory of Trustworthy Computing (East China Normal University), Shanghai 200062)
Funds: This work was supported by the National Natural Science Foundation of China (61922045, U1836115, 61672295), the Natural Science Foundation of Jiangsu Province (BK20181408), and the Project of the Cyberspace Security Research Center, Peng Cheng Laboratory of Guangdong Province (PCL2018KP004).
The rapid development of computer networks and the popularization of big data have promoted the further development of cloud computing. The cloud environment is an important platform for data interaction in the network and information age. It provides great convenience for the efficient data interaction of individuals, enterprises and countries, but it also poses new challenges for the security of cloud data. In this paper, we first present the existing cloud computing model, investigate and analyze the threats in cloud data security protection schemes. On this basis, a systematic analysis of the latest research results of cloud data security protection schemes at home and abroad is conducted, namely, access control, key agreement, secure data auditing and secure data sharing. Secondly, we conduct systematic research and propose solutions to the problems such as easy disclosure of user privacy during the access control process, difficulty in controlling overhead during key generation, low efficiency in dynamic operations during auditing, and difficulty in tracking malicious users during data sharing in existing cloud data security protection schemes. Finally, the current challenges and future research directions of cloud data security protection are discussed, with a view to promoting the establishment of a more complete cloud data protection system.