DocumentCode :
643691
Title :
A secured metadata and data separation model for cloud storage
Author :
Lixuan Wang ; Shenling Liu ; Lifang Liu ; Dong Chen ; Yujiao Chen ; Shanshan Li ; Lei Liu
Author_Institution :
Nat. Univ. of Defense Technol., Changsha, China
fYear :
2013
fDate :
5-8 Aug. 2013
Firstpage :
1
Lastpage :
6
Abstract :
The increasing popularity of cloud service is leading people to concentrate more on cloud storage than traditional storage. Cloud storage platform is confronted with great challenges as the core infrastructure of all kinds of Internet applications, especially, the security of the out-sourced data (the data that is not stored/retrieved from the tenants´ own servers). Thus, to address the security issue, we proposed a metadata and real data separation model of cloud storage named MeSe. Metadata and real data are maintained separately in MeSe, it aims to provide tenants a secured and integrated cloud storage service with two parts of separate servers, the metadata server clusters and data server clusters. Considering tenants´ security requirement MeSe based on these two separate server clusters provided a better decision of cloud storage architecture for our tenants. Furthermore, we summarized protection challenges to MeSe and designed a threat model SEEIT, which thoroughly considers the security properties: Single Point of Failure, Eavesdropping, Elevation of Privilege, Information Disclosure and Tampering. SEEIT analyzed all kinds of threats and gave some inspirations that how to implement protection solutions for our metadata and data separation model MeSe.
Keywords :
cloud computing; meta data; security of data; software architecture; storage management; Internet applications; MeSe security requirement; SEEIT threat model; cloud storage architecture; cloud storage platform; cloud storage service; data server clusters; eavesdropping; elevation-of-privilege; information disclosure; metadata server clusters; out-sourced data security; real data separation model; secured metadata; single point-of-failure; tampering; Authentication; Authorization; Cloud computing; Computer architecture; Data models; Servers; cloud storage; metadata; secured; threat model;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Signal Processing, Communication and Computing (ICSPCC), 2013 IEEE International Conference on
Conference_Location :
KunMing
Type :
conf
DOI :
10.1109/ICSPCC.2013.6663995
Filename :
6663995
Link To Document :
بازگشت