Title :
Research on cloud computing data security model based on multi-dimension
Author :
Xin, Zhang ; Song-qing, Lai ; Nai-wen, Liu
Author_Institution :
Sch. of Inf. Sci. & Eng., Shan Dong Normal Univ., Jinan, China
Abstract :
Cloud computing is considered to be the next generation of information technology framework. It is the next generation computing platforms that can provide dynamic resource pools, virtualization and high availability. The new character brings a lot of new security challenges which have not been taken into account completely in the current cloud computing system. As a consequence, to build a cloud computing data security system is the basis to build cloud computing security system. In this article, the cloud computing technology architecture and the cloud computing data security features are the first to be studied and considered, then the cloud computing data security model is raised. At last, the realization of data security model has been researched. The model adopts a multi-dimension architecture of three - layers defense. First of all, user authentication is required to ensure that user data cannot be tampered. Users who pass the anthentication can get relative operation on the user data, such as addition, modification, deletion. If the unauthorized user use illegal means to deceive the authentication system, the file entered the system encrypt and privacy defense levels. In this layer, user data is encrypted. If key has been got by the intruder. The user data cannot be got valid information even it is obtained through function of privacy protection. It is very important for commercial users of the cloud computing to protect their business secrets. The last is the file quick regeneration layer, user data can get maximum regeneration even it is damaged through rapid regeneration algorithm in this layer. Each layer accomplishes its own job and combines with others to ensure data security in the cloud computing.
Keywords :
cloud computing; cryptography; data privacy; message authentication; virtualisation; cloud computing data security features; cloud computing data security model; cloud computing technology architecture; dynamic resource pools; file quick regeneration layer; information technology framework; multidimension architecture; next generation computing platforms; privacy defense levels; privacy protection; rapid regeneration algorithm; system encryption; three-layers defense; user authentication; virtualization; Computational modeling; Security; Cloud computing; Data security model; Erasure codes; Multi-dimensional; Vander monde matrix;
Conference_Titel :
Information Technology in Medicine and Education (ITME), 2012 International Symposium on
Conference_Location :
Hokodate, Hokkaido
Print_ISBN :
978-1-4673-2109-9
DOI :
10.1109/ITiME.2012.6291448