Skip to main content

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 212))

  • 1098 Accesses

Abstract

Cloud storage is a model of networked online storage based on cloud computing, and provides users with immediate access to a broad range of resources and applications. Although a lot of cloud storage providers adopt encryption to protect costumer data, but users still suspect the security and privacy of their data. The paper analyzed Information dispersal algorithms (IDAs), and proved that it can better address the issues of confidentiality, integrity and availability of data. On this basis, the paper presented a cloud storage system adopting IDAs, and illustrated its key component and the process of writing file in cloud storage.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 259.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 329.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Hou Q, Wu Y, Zheng W, Yang G (2011) A method on protection of user data privacy in cloud storage platform. J Comput Res Develop 48(7):1146–1154

    Google Scholar 

  2. Seiger R, GroB S, Schill A (2011) SecCSIE: a secure cloud storage integrator for enterprises, IEEE conference on commerce and enterprise computing, pp 252–255

    Google Scholar 

  3. Jiyi W, Jianqing F, Lingdi P, Qi X (2011) Study on the P2P cloud storage system. ACTA Electronica Sinica 139(5):1100–1106

    Google Scholar 

  4. Mar KK (2011) Secured virtual diffused file system for the cloud. 6th international conference on internet technology and secured transactions, United Arab Emirates, pp 116–121

    Google Scholar 

  5. Shixin L, Fengmei L, Ren C (2011) A hierarchy attribute-based access control model for cloud storage. International conference on machine learning and cybernetics, China, pp 1146–1150

    Google Scholar 

  6. Xu L, Hu J, Mkandawire S, Jiang H SHHC: a scalable hybrid hash cluster for cloud backup services in data centers. 31st International conference on distributed computing systems workshops, pp 61–65

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Honglei Wang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Wang, H., Zhang, X. (2013). Study on the Use of IDAs in Cloud Storage. In: Yin, Z., Pan, L., Fang, X. (eds) Proceedings of The Eighth International Conference on Bio-Inspired Computing: Theories and Applications (BIC-TA), 2013. Advances in Intelligent Systems and Computing, vol 212. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-37502-6_132

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-37502-6_132

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-37501-9

  • Online ISBN: 978-3-642-37502-6

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics