Design and implementation of security system for cloud storage

Ju Shu Chueh, Min Te Sun

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

5 Scopus citations

Abstract

Cloud storage system provides storage to enterprises and end users, and it helps to reduce the cost of server maintenance. Unfortunately, this new type of data storage service also brings new security challenges as data owners do not have full control of their data. The existing research works cannot completely resolve these security issues efficiently or may cause other security problems. In this paper, a framework with the third party auditor is first proposed. Based on our system model, a key management scheme and an authentication process are proposed which can ensure the security of cloud storage. In addition, two types of key loading methods are proposed to improve the performance of key management. In order to create a system with balanced load, AES encryption algorithm is adopted to reduce the computation load on the user side. Through analyses and simulations, we have shown that the proposed system achieves both security and good overall performance.

Original languageEnglish
Title of host publication19th Asia-Pacific Network Operations and Management Symposium
Subtitle of host publicationManaging a World of Things, APNOMS 2017
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages129-134
Number of pages6
ISBN (Electronic)9781538611012
DOIs
StatePublished - 1 Nov 2017
Event19th Asia-Pacific Network Operations and Management Symposium, APNOMS 2017 - Seoul, Korea, Republic of
Duration: 27 Sep 201729 Sep 2017

Publication series

Name19th Asia-Pacific Network Operations and Management Symposium: Managing a World of Things, APNOMS 2017

Conference

Conference19th Asia-Pacific Network Operations and Management Symposium, APNOMS 2017
Country/TerritoryKorea, Republic of
CitySeoul
Period27/09/1729/09/17

Fingerprint

Dive into the research topics of 'Design and implementation of security system for cloud storage'. Together they form a unique fingerprint.

Cite this