Skip to main content

Research of Terminal Transparent Encryption Storage Mechanism for Multi-cloud Disks

  • Conference paper
  • First Online:
Cloud Computing and Big Data (CloudCom-Asia 2015)

Part of the book series: Lecture Notes in Computer Science ((LNPSE,volume 9106))

  • 1326 Accesses

Abstract

In the view of data storage security for the existing cloud disk, this paper presents a terminal transparent encryption storage mechanism which is irrelevant to existing cloud storage security mechanism. This mechanism can solve the problem of the user’s trusting in the cloud disk storage fundamentally. By the method of formatting into N size fixed files, this mechanism of cloud disk can be seen as a RAW storage device, which stores data into the physical sector. In Multi-cloud disks mode, a dynamic selection strategy based on partitioning factor is proposed to promote the efficiency of file storage by uneven parallel cloudy disk access. To prove the feasibility of data recovery, an interrupt retransmission mechanism and an encoding redundancy backup mechanism are put forward, respectively. By utilization of transferring the control of data security from the cloud storage to the client side, the effective terminal transparent encryption storage mechanism for multi-cloud disks is guaranteed, which not only solves the problem of the user’s trusting in the cloud disk storage fundamentally and concerns of the cloud storage operator reliability but also enhances the security and reliability of the file storage and improves the file access rate as well as storage rate of document transparent encryption.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Jian-Hua, Z., Nan, Z.: Cloud computing-based data storage and disaster recovery. In: Proceedings of the International Conference on Future Computer Science and Education (ICFCSE 2011), Xi’an, China, August 2011, pp. 629–632 (2011)

    Google Scholar 

  2. Vaquero, L.M., Rodero-Merino, L., Caceres, J.: A break in the clouds: towards a cloud definition. ACM SIGCOMM Comput. Commun. Rev. 39(1), 50–55 (2009)

    Article  Google Scholar 

  3. Armbrust, M., Fox, A., Griffith, R., et al.: A view of cloud computing. Commun. ACM 53(4), 50–58 (2010)

    Article  Google Scholar 

  4. Grossman, R.L., Gu, Y., Sabala, M., Zhang, W.: Compute and storage clouds using wide area high performance networks. Future Gener. Comput. Syst. 25(2), 179–183 (2009)

    Article  Google Scholar 

  5. Luo, J.Z., Jin, J.H., Song, A.B.: Cloud computing: architecture and key technologies. J. Commun. 32(7), 3–21 (2011)

    Google Scholar 

  6. Wu, J.Y., Fu, J.Q., Ping, L.D.: Study on the P2P cloud storage system. Acta Electronica Sinica 39(5), 1100–1107 (2011)

    Google Scholar 

  7. Chow, S.S., Chu, C.-K., Huang, X., Zhou, J., Deng, R.H.: Dynamic secure cloud storage with provenance. In: Naccache, D. (ed.) Cryphtography and Security: From Theory to Applications. LNCS, vol. 6805, pp. 442–464. Springer, Heidelberg (2012)

    Chapter  Google Scholar 

  8. Brinkmann, A., Eddert, S., Meyer Auf Der Heide, F.: Dynamic and redundant data placement. In: 27th International Conference on Distributed Computing Systems (ICDCS 2007), Toronto, pp. 87–95 (2007)

    Google Scholar 

  9. Feng, D.G., Zhang, M., Zhang, Y.: Study on cloud computing security. J. Softw. 22(1), 77–83 (2011)

    Article  Google Scholar 

  10. Yang, J., Wang, H.H., Wang, J.: Survey on some security issues of cloud computing. J. Chin. Comput. Syst. 33(3), 472–479 (2012)

    Google Scholar 

  11. Cachin, C., Alex, I.K., Shraer, E.: Trusting the cloud. ACM SIGACT News 40(2), 455–461 (2009)

    Google Scholar 

  12. Lin, Q.Y., Gui, X.L., Shi, D.Q., Wang, X.P.: Study of the secure access strategy of cloud storages. J. Comput. Res. Dev. 48, 240–243 (2011)

    Google Scholar 

  13. Blaze, M.: Cryptographic file system for Unix. In: Proceedings of the 1st ACM Conference on Computer and Communications Security, Fairfax, VA, USA, November 1993, pp. 9–16 (1993)

    Google Scholar 

  14. Fu, K., Kaashoek, M.F., Mazieres, D.: Fast and secure distributed read-only file system. In: Proceedings of the 4th Symposium on Operating Systems Design and Implementation (OSDI), San Diego, CA, pp. 181–196 (2000)

    Google Scholar 

  15. Wright, C.P., Martino, M.C., Zadok, E.: NCryptfs: a secure and convenient cryptographic file system. In: Proceedings of the Annual USENIX Technical Conference, San Antonio, pp. 197–210 (2003)

    Google Scholar 

  16. Storer, W.M., Greenan, M.K., Miller, E.: POTSHARDS: a secure, recoverable, long-term archival storage system. ACM Trans. Storage 5(2), 1–35 (2009)

    Article  Google Scholar 

  17. Zhao, Y.L., Dai, Z.X., Wang, Z.G.: Research on storage system architecture of the intelligent network disk (IND). Chin. J. Comput. 31(5), 858–867 (2008)

    Article  Google Scholar 

  18. Wang, Z., Luo, W.M., Yan, B.P.: Optimal mechanism of parallel downloading. J. Softw. 20(8), 2255–2268 (2009)

    Article  Google Scholar 

  19. Tao, M.: Design and Implementation of File Encryption System Based on Windows IFS Filter Driver. Chengdu Electronics Technology University, Chengdu (2012)

    Google Scholar 

  20. Zheng, L., Ma, Z.F., Gu, M.: Techniques of file system filter driver-based and security-enhanced encryption system. J. Chin. Comput. Syst. 28(7), 1181–1184 (2007)

    Google Scholar 

  21. Shvachko, K., Kuang, H.R., Radia, S.: The hadoop distributed file system. In: Proceedings of the IEEE 26th Symposium on Storage Systems and Technologies (MSST 2010), Piscataway, NJ, USA, May 2010, p. 1 (2010)

    Google Scholar 

  22. Subashini, S., Kavithaa, V.: A survey on security issues in service delivery models of cloud computing. J. Netw. Comput. Appl. 34(1), 1–11 (2011)

    Article  Google Scholar 

  23. Kaufman, L.M.: Data security in the world of cloud computing. IEEE Secur. Priv. 2009(7), 61–64 (2009)

    Article  Google Scholar 

  24. Yumerefendi, A.R., Chase, J.S.: Strong accountability for network storage. ACM Trans. Storage 3(3), 1–33 (2007). (article 11)

    Article  Google Scholar 

  25. Maheshwari, U., Vingralek, R., Shapiro, W.: How to build a trusted database system on untrusted storage. In: Proceedings of the Symposium on Operating System Design and Implementation, San Diego, Calif, USA, pp. 10–20 (2000)

    Google Scholar 

  26. Zhang, S.J., Wang, Z.D., Ding, D.R., Shu, H.S.: Fuzzy filtering with randomly occurring parameter uncertainties, interval delays, and channel fadings. IEEE Trans. Cybern. 44(3), 406–417 (2014)

    Article  Google Scholar 

  27. He, X., Wang, Z.D., Liu, Y.R., Zhou, D.H.: Least-squares fault detection and diagnosis for networked sensing systems using a direct state estimation approach. IEEE Trans. Industr. Inf. 9(3), 1670–1679 (2013)

    Article  Google Scholar 

  28. Wang, Z.D., Ding, D.R., Dong, H.L., Shu, H.: H consensus control for multi-agent systems with missing measurements: the finite-horizon case. Syst. Control Lett. 62(10), 827–836 (2013)

    Article  MATH  MathSciNet  Google Scholar 

  29. Hu, J., Wang, Z., Shen, B., Gao, H.: Quantised recursive filtering for a class of nonlinear systems with multiplicative noises and missing measurements. Int. J. Control 86(4), 650–663 (2013)

    Article  MATH  MathSciNet  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Chaowen Chang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Chang, C., Wang, S., Wang, Y., Han, P. (2015). Research of Terminal Transparent Encryption Storage Mechanism for Multi-cloud Disks. In: Qiang, W., Zheng, X., Hsu, CH. (eds) Cloud Computing and Big Data. CloudCom-Asia 2015. Lecture Notes in Computer Science(), vol 9106. Springer, Cham. https://doi.org/10.1007/978-3-319-28430-9_28

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-28430-9_28

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-28429-3

  • Online ISBN: 978-3-319-28430-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics