Abstract
As cloud computing brings ease of use and cost-saving features, the security and privacy of data is simultaneously becoming very challenging. The security of cloud data can be classified into two aspects: static storage security and dynamic processing security. Current researches only focus on either storage security or protecting the safety of data processing service. To offer a comprehensive data security solution, we present a secure data storage and processing framework (SDSPF) for cloud computing systems, which protects the whole life cycle of user data.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Kamara, S., Lauter, K.: Cryptographic Cloud Storage. In: Sion, R., Curtmola, R., Dietrich, S., Kiayias, A., Miret, J.M., Sako, K., Sebé, F. (eds.) RLCPS, WECSR, and WLC 2010. LNCS, vol. 6054, pp. 136–149. Springer, Heidelberg (2010)
Wang, C., Cao, N., Li, J., Ren, K., Lou, W.: Secure Ranked Keyword Search over Encrypted Cloud Data. In: 30th International Conference on Distributed Computing Systems, pp. 253–262. IEEE Press, Genoa (2010)
Cao, N., Wang, C., Li, M., Ren, K., Lou, W.: Privacy-Preserving Multi-keyword Ranked Search over Encrypt. In: 31st Conference on Computer Communications, pp. 829–837. IEEE Press, Shanghai (2011)
Narayan, S., Gagné, M., Safavi-Naini, R.: Privacy preserving EHR system using attribute-based infrastructure. In: 2010 ACM Workshop on Cloud Computing Security, pp. 47–52. ACM Press, New York (2010)
Bowers, K., Juels, A., Oprea, A.: HAIL: A High-Availability and Integrity Layer for Cloud Storage. In: 16th ACM Conference on Computer and Communications Security, pp. 187–198. ACM Press, New York (2009)
Heitzmann, A., Palazzi, B., Papamanthou, C., Tamassia, R.: Efficient Integrity Checking of Untrusted Network Storage. In: 4th ACM International Workshop on Storage Security and Survivability, pp. 43–54. ACM Press, New York (2008)
Wang, C., Wang, Q., Ren, K., Lou, W.: Ensuring Data Storage Security in Cloud Computing. In: 17th International Workshop on Quality of Service, pp. 1–9. IEEE Press, Charlestion (2009)
Erway, C., Küpçü, A., Papamanthou, C., Tamassia, R.: Dynamic provable data possession. In: 16th ACM Conference on Computer and Communications Security, pp. 213–222. ACM Press, New York (2009)
Kher, V., Kim, Y.: Building Trust in Storage Outsourcing: Secure Accounting of Utility Storage. In: 26th IEEE International Symposium on Reliable Distributed Systems, pp. 55–64. IEEE Press, Washington, DC (2007)
Dai, W., Jin, H., Zou, D., Xu, S., Zheng, W., Shi, L.: TEE: A Virtual DRTM Based Execution Environment for Secure Cloud-End Computing. In: 17th ACM Conference on Computer and Communications Security, pp. 663–665. ACM Press, Chicago (2010)
Zou, D., Long, J., Jin, H.: Trusted Deployment of Virtual Execution Environment in Grid Systems. In: Datta, A. (ed.) ASIAN 2009. LNCS, vol. 5913, pp. 124–136. Springer, Heidelberg (2009)
McCune, J., Parno, B., Perrig, A., Reiter, M., Isozaki, H.: Flicker: an execution infrastructure for TCB minimization. In: 3rd ACM SIGOPS/EuroSys European Conference on Computer Systems, pp. 315–328. ACM Press, New York (2008)
Zhang, F., Chen, J., Chen, H., Zang, B.: CloudVisor: retrofitting protection of virtual machines in multi-tenant cloud with nested virtualization. In: 23rd ACM Symposium on Operating Systems Principles, pp. 203–216. ACM Press, New York (2011)
Chen, X., Garfinkel, T., Lewis, E., Subrahmanyam, P., Waldspurger, C., Boneh, D., Dwoskin, J., Ports, D.: Overshadow: A Virtualization-Based Approach to Retrofitting Protection in Commodity Operating Systems. In: 13th Conference on Architectural Support for Programming Languages and Operating Systems, pp. 2–13. ACM Press, New York (2008)
Yang, J., Shin, K.: Using hypervisor to provide data secrecy for user applications on a per-page basis. In: 4th ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environments, pp. 71–80. ACM Press, New York (2008)
Xiang, G., Jin, H., Zou, D., Zhang, X., Wen, S., Zhao, F.: VMDriver: A Driver-based Monitoring Mechanism for Virtualization. In: 29th International Symposium on Reliable Distributed Systems, pp. 72–81. IEEE Press, New Delhi (2010)
Dinaburg, A., Royal, P., Sharif, M., Lee, W.: Ether: Malware Analysis via Hardware Virtualization Extensions. In: 15th ACM Conference on Computer and Communications Security, pp. 51–62. ACM Press, New York (2008)
O’Hearn, Z., Warner, B.: Tahoe: the least-authority filesystem. In: 4th ACM International Workshop on Storage Security and Survivability, pp. 21–26. ACM Press, New York (2008)
TCG Specification Architecture Overview, http://www.trustedcomputinggroup.org
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer Science+Business Media Dordrecht
About this paper
Cite this paper
Ran, L., Jin, H. (2012). SDSPF: A Secure Data Storage and Processing Framework for Cloud Computing Systems. In: Park, J., Kim, J., Zou, D., Lee, Y. (eds) Information Technology Convergence, Secure and Trust Computing, and Data Management. Lecture Notes in Electrical Engineering, vol 180. Springer, Dordrecht. https://doi.org/10.1007/978-94-007-5083-8_17
Download citation
DOI: https://doi.org/10.1007/978-94-007-5083-8_17
Publisher Name: Springer, Dordrecht
Print ISBN: 978-94-007-5082-1
Online ISBN: 978-94-007-5083-8
eBook Packages: EngineeringEngineering (R0)