云数据安全保护方法综述

Translated title of the contribution: Protection Methods for Cloud Data Security

Jian Shen, Tianqi Zhou, Zhenfu Cao

Research output: Contribution to journalReview articlepeer-review

23 Scopus citations

Abstract

The rapid development of computer networks and the popularization of big data have promoted the further development of cloud computing. The cloud environment is an important platform for data interaction in the network and information age. It provides great convenience for the efficient data interaction of individuals, enterprises and countries, but it also poses new challenges for the security of cloud data. In this paper, we first present the existing cloud computing model, investigate and analyze the threats in cloud data security protection schemes. On this basis, a systematic analysis of the latest research results of cloud data security protection schemes at home and abroad is conducted, namely, access control, key agreement, secure data auditing and secure data sharing. Secondly, we conduct systematic research and propose solutions to the problems such as easy disclosure of user privacy during the access control process, difficulty in controlling overhead during key generation, low efficiency in dynamic operations during auditing, and difficulty in tracking malicious users during data sharing in existing cloud data security protection schemes. Finally, the current challenges and future research directions of cloud data security protection are discussed, with a view to promoting the establishment of a more complete cloud data protection system.

Translated title of the contributionProtection Methods for Cloud Data Security
Original languageChinese (Traditional)
Pages (from-to)2079-2098
Number of pages20
JournalJisuanji Yanjiu yu Fazhan/Computer Research and Development
Volume58
Issue number10
DOIs
StatePublished - Oct 2021

Fingerprint

Dive into the research topics of 'Protection Methods for Cloud Data Security'. Together they form a unique fingerprint.

Cite this