Computer Science ›› 2016, Vol. 43 ›› Issue (4): 118-121, 154.doi: 10.11896/j.issn.1002-137X.2016.04.024

Previous Articles     Next Articles

Security Access to Cloud Disk via Virtual Isolation Mechanism

CHEN Feng, BAO Ai-hua and ZHANG Wei-ming   

  • Online:2018-12-01 Published:2018-12-01

Abstract: The cloud storage technology is an important research area of cloud computing.Because of the hidden trouble about data leakage,cloud storage services are often difficult to be widely used in organizations with the core data,such as the innovative enterprises or the army.For this issue,a noval security access model for cloud disk was proposed via the virtual isolation mechanism.Theoretical analysis shows that the model has ability to prevent sensitive data leakage in cloud disk of the enterprise.Further,an enterprise private cloud storage-oriented electronic document centralized ma-nagement and control system CFS was presented to test read/write operations performance based on the model.Until now,the system has been successfully applied to a number of important user units,and has very good development prospects.

Key words: Cloud disk,Virtual isolation,Date security

[1] https://www.dropbox.com
[2] https://skydrive.live.com
[3] http://www.ksyun.com
[4] http://yunpan.360.cn
[5] Cao Xi,Xu Li,Chen Lan-xiang.Data integrity verification protocol in cloud storage system[J].Journal of Computer Applications,2012,32(1):8-12(in Chinese) 曹夕,许力,陈兰香.云存储系统中数据完整性验证协议[J].计算机应用,2012,32(1):8-12
[6] Yan Xiang-tao,Li Yi-fa.Integrity Checking Algorithm Based on Hash Tree for Cloud Storage[J].Computer Science,2012,39(12):94-97(in Chinese) 颜湘涛,李益发.基于哈希树的云存储完整性检测算法[J].计算机科学,2012,39(12):94-97
[7] Liu Fan,Yang Ming.Ciphertext policy attribute based on en-cryption scheme for cloud storage[J].Application Research of Computers,2012,29(4):1452-1456(in Chinese) 刘帆,杨明.一种用于云存储的密文策略属性基加密方案[J].计算机应用研究,2012,29(4):1452-1456
[8] Lim H,Kapoor V,Wighe C.Active disk file system:Adistribu-ted,scalable filesystem[C]∥Proceedings of the Eighteenth IEEE Symposium.Washington,DC:IEEE Computer Society,2001:101-114
[9] Swank J D,Goodson G R,Scheinholtz M L,et al.Self-securing storage:Protecting data incompromised systems[C]∥Proc of the 4th Symposium on Operating Systems Design and Implementation.Berkeley,CA:USENIX Association,2000:12-26
[10] Jin Chao,Zhen Wei-min,Zhang You-hui.Active Storage Architecture[J].Chinese Journal of Computers,2005,8(6):1013-1020(in Chinese) 靳超,郑纬民,张悠慧.主动存储系统结构[J].计算机学报,2005,8(6):1013-1020
[11] Zhao Yue-long,Jiang Qian.Research and Design of the Virtua-lization Storage Technology Based on Intelligent Network Disk[J].Journal of Computer Research and Development,2009,6(Supp1):44-49(in Chinese) 赵跃龙,蒋骞.基于智能网络磁盘的虚拟存储技术的研究与设计[J].计算机研究与发展,2009,6(Supp1):44-49
[12] Using virtual desktop to improve the ability of the management and control [EB/OL].[2010-3-15].http://www.vmware.com/cn/solutions/desktop
[13] King S T,Dunlap G W,Chen P M.Operaring System Support for Virtual Machines[C]∥Proc of the 2003 Annual USENIX Technical Conference.2003:6
[14] Griffin J L,Jaeger T,Perez R,et al.Trusted virtual domains:Toward secure distributed services[C]∥Proceedings of the 1st IEEE Workshop on Hot Topics in System Dependability.Los Alamitos:IEEE Computer Society.2005:274-281
[15] Gasmi Y,Sadeghi A-R,Stewin P,et al.Flexible and Secure Enterprise Rights Management Based on Trusted Virtual Domains[C]∥Proc of the 3rd ACM Workshop on Scalable Trusted Computing.2008:71-88
[16] Yang Yu.OS level virtualization and its applications[D].NewYork:Stony Brook University,2007
[17] http://dokan-dev.net/en
[18] Denning D E.A lattice model of secure information flow[J].Communications of the ACM,1976,9(5):236-243

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
[1] LEI Li-hui and WANG Jing. Parallelization of LTL Model Checking Based on Possibility Measure[J]. Computer Science, 2018, 45(4): 71 -75, 88 .
[2] XIA Qing-xun and ZHUANG Yi. Remote Attestation Mechanism Based on Locality Principle[J]. Computer Science, 2018, 45(4): 148 -151, 162 .
[3] LI Bai-shen, LI Ling-zhi, SUN Yong and ZHU Yan-qin. Intranet Defense Algorithm Based on Pseudo Boosting Decision Tree[J]. Computer Science, 2018, 45(4): 157 -162 .
[4] WANG Huan, ZHANG Yun-feng and ZHANG Yan. Rapid Decision Method for Repairing Sequence Based on CFDs[J]. Computer Science, 2018, 45(3): 311 -316 .
[5] SUN Qi, JIN Yan, HE Kun and XU Ling-xuan. Hybrid Evolutionary Algorithm for Solving Mixed Capacitated General Routing Problem[J]. Computer Science, 2018, 45(4): 76 -82 .
[6] ZHANG Jia-nan and XIAO Ming-yu. Approximation Algorithm for Weighted Mixed Domination Problem[J]. Computer Science, 2018, 45(4): 83 -88 .
[7] WU Jian-hui, HUANG Zhong-xiang, LI Wu, WU Jian-hui, PENG Xin and ZHANG Sheng. Robustness Optimization of Sequence Decision in Urban Road Construction[J]. Computer Science, 2018, 45(4): 89 -93 .
[8] LIU Qin. Study on Data Quality Based on Constraint in Computer Forensics[J]. Computer Science, 2018, 45(4): 169 -172 .
[9] ZHONG Fei and YANG Bin. License Plate Detection Based on Principal Component Analysis Network[J]. Computer Science, 2018, 45(3): 268 -273 .
[10] SHI Wen-jun, WU Ji-gang and LUO Yu-chun. Fast and Efficient Scheduling Algorithms for Mobile Cloud Offloading[J]. Computer Science, 2018, 45(4): 94 -99, 116 .