Author_Institution :
Inf. Manage. Dept., Southern Taiwan Univ., Tainan, Taiwan
Abstract :
In recent years, cloud computing has gradually become the mainstream of Internet services. When cloud computing environments become more perfect, the business and user will be an enormous amount of data stored in the remote cloud storage devices, hoping to achieve random access, data collection, reduce costs, facilitate the sharing of other services. However, when the data is stored in the cloud storage device, a long time, enterprises and users inevitably will have security concerns, fearing that the information is actually stored in the cloud is still in the storage device or too long without access to, has long been the cloud server removed or destroyed, resulting in businesses and users in the future can´t access or restore the data files. Therefore, this scheme goal to research and design for data storage cloud computing environments that are proved. Stored in the cloud for data storage, research and develop a security and efficient storage of proof protocol, also can delegate or authorize others to public verifiability whether the data actually stored in the cloud storage devices.
Keywords :
cloud computing; security of data; storage management; Internet service; cloud computing; cloud server; data security; data storage; hybrid provable data possession; proof protocol; public verifiability; remote cloud storage device; Cloud computing; Encryption; Memory; Protocols; Servers; PDP; archival storage; cloud computing; hybrid cryptosystem; information security; provable data possession; storage;