Preventing Data Leakage in a Cloud Environment  

Preventing Data Leakage in a Cloud Environment

在线阅读下载全文

作  者:Fuzhi Cang Mingxing Zhang Yongwei Wu Weimin Zheng 

机构地区:[1]Department of Computer Science and Technology, Tsinghua National Laboratory for Information Science and Technology Tsinghua University

出  处:《ZTE Communications》2013年第4期27-31,共5页中兴通讯技术(英文版)

基  金:supported by National Basic Research (973) Program of China (2011CB302505);Natural Science Foundation of China (61373145, 61170210);National High-Tech R&D (863) Program of China (2012AA012600,2011AA01A203);Chinese Special Project of Science and Technology (2012ZX01039001)

摘  要:Despite the multifaceted advantages of cloud computing,concerns about data leakage or abuse impedes its adoption for security-sensi tive tasks.Recent investigations have revealed that the risk of unauthorized data access is one of the biggest concerns of users of cloud-based services.Transparency and accountability for data managed in the cloud is necessary.Specifically,when using a cloudhost service,a user typically has to trust both the cloud service provider and cloud infrastructure provider to properly handling private data.This is a multi-party system.Three particular trust models can be used according to the credibility of these providers.This pa per describes techniques for preventing data leakage that can be used with these different models.Despite the multifaceted advantages of cloud computing,concerns about data leakage or abuse impedes its adoption for security-sensi tive tasks.Recent investigations have revealed that the risk of unauthorized data access is one of the biggest concerns of users of cloud-based services.Transparency and accountability for data managed in the cloud is necessary.Specifically,when using a cloudhost service,a user typically has to trust both the cloud service provider and cloud infrastructure provider to properly handling private data.This is a multi-party system.Three particular trust models can be used according to the credibility of these providers.This pa per describes techniques for preventing data leakage that can be used with these different models.

关 键 词:cloud computing data leakage data tracking data provenance homomorphic encryption 

分 类 号:TP309[自动化与计算机技术—计算机系统结构] X24[自动化与计算机技术—计算机科学与技术]

 

参考文献:

正在载入数据...

 

二级参考文献:

正在载入数据...

 

耦合文献:

正在载入数据...

 

引证文献:

正在载入数据...

 

二级引证文献:

正在载入数据...

 

同被引文献:

正在载入数据...

 

相关期刊文献:

正在载入数据...

相关的主题
相关的作者对象
相关的机构对象