Abstract
In the view of data storage security for the existing cloud disk, this paper presents a terminal transparent encryption storage mechanism which is irrelevant to existing cloud storage security mechanism. This mechanism can solve the problem of the user’s trusting in the cloud disk storage fundamentally. By the method of formatting into N size fixed files, this mechanism of cloud disk can be seen as a RAW storage device, which stores data into the physical sector. In Multi-cloud disks mode, a dynamic selection strategy based on partitioning factor is proposed to promote the efficiency of file storage by uneven parallel cloudy disk access. To prove the feasibility of data recovery, an interrupt retransmission mechanism and an encoding redundancy backup mechanism are put forward, respectively. By utilization of transferring the control of data security from the cloud storage to the client side, the effective terminal transparent encryption storage mechanism for multi-cloud disks is guaranteed, which not only solves the problem of the user’s trusting in the cloud disk storage fundamentally and concerns of the cloud storage operator reliability but also enhances the security and reliability of the file storage and improves the file access rate as well as storage rate of document transparent encryption.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Jian-Hua, Z., Nan, Z.: Cloud computing-based data storage and disaster recovery. In: Proceedings of the International Conference on Future Computer Science and Education (ICFCSE 2011), Xi’an, China, August 2011, pp. 629–632 (2011)
Vaquero, L.M., Rodero-Merino, L., Caceres, J.: A break in the clouds: towards a cloud definition. ACM SIGCOMM Comput. Commun. Rev. 39(1), 50–55 (2009)
Armbrust, M., Fox, A., Griffith, R., et al.: A view of cloud computing. Commun. ACM 53(4), 50–58 (2010)
Grossman, R.L., Gu, Y., Sabala, M., Zhang, W.: Compute and storage clouds using wide area high performance networks. Future Gener. Comput. Syst. 25(2), 179–183 (2009)
Luo, J.Z., Jin, J.H., Song, A.B.: Cloud computing: architecture and key technologies. J. Commun. 32(7), 3–21 (2011)
Wu, J.Y., Fu, J.Q., Ping, L.D.: Study on the P2P cloud storage system. Acta Electronica Sinica 39(5), 1100–1107 (2011)
Chow, S.S., Chu, C.-K., Huang, X., Zhou, J., Deng, R.H.: Dynamic secure cloud storage with provenance. In: Naccache, D. (ed.) Cryphtography and Security: From Theory to Applications. LNCS, vol. 6805, pp. 442–464. Springer, Heidelberg (2012)
Brinkmann, A., Eddert, S., Meyer Auf Der Heide, F.: Dynamic and redundant data placement. In: 27th International Conference on Distributed Computing Systems (ICDCS 2007), Toronto, pp. 87–95 (2007)
Feng, D.G., Zhang, M., Zhang, Y.: Study on cloud computing security. J. Softw. 22(1), 77–83 (2011)
Yang, J., Wang, H.H., Wang, J.: Survey on some security issues of cloud computing. J. Chin. Comput. Syst. 33(3), 472–479 (2012)
Cachin, C., Alex, I.K., Shraer, E.: Trusting the cloud. ACM SIGACT News 40(2), 455–461 (2009)
Lin, Q.Y., Gui, X.L., Shi, D.Q., Wang, X.P.: Study of the secure access strategy of cloud storages. J. Comput. Res. Dev. 48, 240–243 (2011)
Blaze, M.: Cryptographic file system for Unix. In: Proceedings of the 1st ACM Conference on Computer and Communications Security, Fairfax, VA, USA, November 1993, pp. 9–16 (1993)
Fu, K., Kaashoek, M.F., Mazieres, D.: Fast and secure distributed read-only file system. In: Proceedings of the 4th Symposium on Operating Systems Design and Implementation (OSDI), San Diego, CA, pp. 181–196 (2000)
Wright, C.P., Martino, M.C., Zadok, E.: NCryptfs: a secure and convenient cryptographic file system. In: Proceedings of the Annual USENIX Technical Conference, San Antonio, pp. 197–210 (2003)
Storer, W.M., Greenan, M.K., Miller, E.: POTSHARDS: a secure, recoverable, long-term archival storage system. ACM Trans. Storage 5(2), 1–35 (2009)
Zhao, Y.L., Dai, Z.X., Wang, Z.G.: Research on storage system architecture of the intelligent network disk (IND). Chin. J. Comput. 31(5), 858–867 (2008)
Wang, Z., Luo, W.M., Yan, B.P.: Optimal mechanism of parallel downloading. J. Softw. 20(8), 2255–2268 (2009)
Tao, M.: Design and Implementation of File Encryption System Based on Windows IFS Filter Driver. Chengdu Electronics Technology University, Chengdu (2012)
Zheng, L., Ma, Z.F., Gu, M.: Techniques of file system filter driver-based and security-enhanced encryption system. J. Chin. Comput. Syst. 28(7), 1181–1184 (2007)
Shvachko, K., Kuang, H.R., Radia, S.: The hadoop distributed file system. In: Proceedings of the IEEE 26th Symposium on Storage Systems and Technologies (MSST 2010), Piscataway, NJ, USA, May 2010, p. 1 (2010)
Subashini, S., Kavithaa, V.: A survey on security issues in service delivery models of cloud computing. J. Netw. Comput. Appl. 34(1), 1–11 (2011)
Kaufman, L.M.: Data security in the world of cloud computing. IEEE Secur. Priv. 2009(7), 61–64 (2009)
Yumerefendi, A.R., Chase, J.S.: Strong accountability for network storage. ACM Trans. Storage 3(3), 1–33 (2007). (article 11)
Maheshwari, U., Vingralek, R., Shapiro, W.: How to build a trusted database system on untrusted storage. In: Proceedings of the Symposium on Operating System Design and Implementation, San Diego, Calif, USA, pp. 10–20 (2000)
Zhang, S.J., Wang, Z.D., Ding, D.R., Shu, H.S.: Fuzzy filtering with randomly occurring parameter uncertainties, interval delays, and channel fadings. IEEE Trans. Cybern. 44(3), 406–417 (2014)
He, X., Wang, Z.D., Liu, Y.R., Zhou, D.H.: Least-squares fault detection and diagnosis for networked sensing systems using a direct state estimation approach. IEEE Trans. Industr. Inf. 9(3), 1670–1679 (2013)
Wang, Z.D., Ding, D.R., Dong, H.L., Shu, H.: H ∞ consensus control for multi-agent systems with missing measurements: the finite-horizon case. Syst. Control Lett. 62(10), 827–836 (2013)
Hu, J., Wang, Z., Shen, B., Gao, H.: Quantised recursive filtering for a class of nonlinear systems with multiplicative noises and missing measurements. Int. J. Control 86(4), 650–663 (2013)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this paper
Cite this paper
Chang, C., Wang, S., Wang, Y., Han, P. (2015). Research of Terminal Transparent Encryption Storage Mechanism for Multi-cloud Disks. In: Qiang, W., Zheng, X., Hsu, CH. (eds) Cloud Computing and Big Data. CloudCom-Asia 2015. Lecture Notes in Computer Science(), vol 9106. Springer, Cham. https://doi.org/10.1007/978-3-319-28430-9_28
Download citation
DOI: https://doi.org/10.1007/978-3-319-28430-9_28
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-28429-3
Online ISBN: 978-3-319-28430-9
eBook Packages: Computer ScienceComputer Science (R0)