Computer Science ›› 2014, Vol. 41 ›› Issue (1): 202-207.

Previous Articles     Next Articles

Secure Private Cloud Storage System Based on Virtual Isolation Mechanism

BAO Ai-hua,YUAN Xiao-ping,CHEN Feng and MIAO Jia-jia   

  • Online:2018-11-14 Published:2018-11-14

Abstract: Cloud storage technology is an important research area of cloud computing,because of the loss of privacy and security concerns,public cloud storage services are often difficult to be widely used in organizations which keep the core data,such as the innovative enterprises or the army.VI-PCS,a secure private cloud storage system based on virtual isolation mechanism,was proposed in which physical storage media and public cloud storage services are virtualized as storage capabilities,which are managed through centralized life-cycle,provide storage services for applications in VI-PCS;file storage procedure is divided into three levels(i.e.Meta-data management,virtual storage and physical stora-ge),in which secure,reliable data storage is achieved by file renaming and transparent encryption and decryption technology;a secure net disk based on isolated sandbox is provided as access method,and data security,controllability and availability are achieved in this isolated environment;a file bidirectional synchronization method based on ordered hash tree is proposed,and its offline mode is also helpful to improve system availability and adaptability.The results show that VI-PCS has certain advantages in reliability,security,scalability and adaptability.

Key words: Cloud computing,Private cloud storage,Virtual isolation,Sandbox,Bidirectional synchronization

[1] Zhan Ying,Sun Yong.Cloud storage management technology[C]∥2009Second International Conference on Information and Computing Seience.2009
[2] Storage networking Industry Association.Cloud storage forcloud computing[EB/OL].http://www.snia.org
[3] Larry D.Cloud computing hasn’t gone fortune 500yet,but it’s coming[EB/OL].http://blogs.zdnet.corn/BTL/?p=8199
[4] Atenises G,Burns R,Curtmola R,et al.Provable data possession at untrusted stores[C]∥CCS’07:Proceedings f the 14th ACM Conference on Computer and Communications Security.New York:ACM Press,2007:598-609
[5] Atenises G,Kamara S,Katz J.Proofs of storage from homomorphic identification protocols[C]∥ASIACRYPT’09:Proceedings of the 15th International Conference on the Theory and Application of Cryptology and Information Security:Advances in Cryptology.Berlin:Springer-Verlag,2009:319-333
[6] Shah M A,Baker M,Mogul J C,et al.Auditing to keep online storage services honest[C]∥HOTOS’07:Proceedings of the 11th USENIX Workshop on Hot Topics in Operating Systems.Berkeley,CA:USENIX Association,2007:1-6
[7] 曹夕,许力,陈兰香.云存储系统中数据完整性验证协议[J].计算机应用,2012,32(1):8-12
[8] 颜湘涛,李益发.基于哈希树的云存储完整性检测算法[J].计算机科学,2012,39(12):94-97
[9] Sahai A,Wates B.Fuzzy identify-based encryption[C]∥Ad-vances in Cryptology-EUROCRYPT.Berlin:Springer-Verlag,2005:457-473
[10] Bethencourt J,Sahai A,Waters B.Ciphertext-policy attribute-based encryptio[C]∥Proc of IEEE Sympoisum on Security and privacy.Washington DC:IEEE Computer Society,2007:321-334
[11] 刘帆,杨明.一种用于云存储的密文策略属性基加密方案[J].计算机应用研究,2012,29(4):1452-1456
[12] 刘鹏等.云计算[M].北京:电子工业出版社,2010
[13] Goldberg I,Wagner D,Thomas R,et al.A Secure Environment for Untrusted Helper Applications (Confining the Wily Hacker)[C]∥Proceedings of the Sixth USENIX UNIX Security Symposium.1996
[14] Pierce B C,Vouillon J.What is in Unison[R].MS-CIS-03-06.Philadelphia,Pennsylvania:Department of Computer and Information Science,University of Pennsylvania,2004

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!