Username   Password       Forgot your password?  Forgot your username? 

 

Security Storage of Sensitive Information in  Cloud Computing Data Center

Volume 15, Number 3, March 2019, pp. 1023-1032
DOI: 10.23940/ijpe.19.03.p32.10231032

Zhong Lia and Jia Wangb

aChangzhou Liu Guo-jun Branch, Jiangsu Union Technical Institute, Changzhou, 213000, China
bExperimental Instrument Center, Dalian Polytechnic University, Dalian, 116034, China


(Submitted on November 10, 2018; Revised on December 12, 2018; Accepted on January 8, 2019)

Abstract:

In order to increase the security of sensitive information, we need to research the security storage of sensitive information in CCDC (Cloud Computing Data Center). The traditional algorithm cannot guarantee the security of sensitive information when the hacker attacks the data center. Therefore, this paper proposes the three-dimensional CCDC sensitive information security storage algorithm. This algorithm uses the feature combination to filter the sensitive information and uses the sensitive information phase extraction technology to encrypt the sensitive information that was screened. This algorithm also uses three dimensional storage principle for the security storage of sensitive information. Experimental results show that this algorithm can effectively enhance the security of the sensitive information of CCDC.

 

References: 17

  1. Y. Yu, M. H. Au, Y. Mu, S. Tang, J. Ren, W. Susilo, et al., “Enhanced Privacy of a Remote Data Integrity-Checking Protocol for Secure Cloud Storage,” International Journal of Information Security, Vol. 14, pp. 307-318, 2015
  2. R. Jin, H. -J. Cho, and T.-s. Chung, “An Encryption Approach to Secure Modification and Deletion for Flash-based Storage,” IEEE Transactions on Consumer Electronics, Vol. 60, pp. 662-667, 2014
  3. J. Kaczmarek and M. R. Wrobel, “Operating System Security by Integrity Checking and Recovery using Write-Protected Storage,” IET Information Security, Vol. 8, pp. 122-131, 2014
  4. A. S. Rawat, O. O. Koyluoglu, N. Silberstein, and S. Vishwanath, “Optimal Locally Repairable and Secure Codes for Distributed Storage Systems,” IEEE Transactions on Information Theory, Vol. 60, pp. 212-236, 2014
  5. S. Distefano and A. Puliafito, “Information Dependability in Distributed Systems: The Dependable Distributed Storage System,” Integrated Computer-Aided Engineering, Vol. 21, pp. 3-18, 2014
  6. M. Liu, S. Liu, W. Fu, and J. Zhou, “Distributional Escape Time Algorithm based on Generalized Fractal Sets in Cloud Environment,” Chinese Journal of Electronics, Vol. 24, pp. 124-127, 2015
  7. A. N. Singh, “Information Security Management Maturity: a Study of Select Organizations,” 2014
  8. W. Au and B. White, “Integrating Information Technology in a Discovery Achool-A Case Study,” in Proceedings of International Conference on Computers in Education, pp. 701-702, 2002
  9. B. Yang, X. Tang, and J. Li, “A Systematic Piggybacking Design for Minimum Storage Regenerating Codes,” IEEE Transactions on Information Theory, Vol. 61, pp. 5779-5786, 2015
  10. Y. Ren, J. Shen, Y. Zheng, J. Wang, and H.-C. Chao, “Efficient Data Integrity Auditing for Storage Security in Mobile Health Cloud,” Peer-to-Peer Networking and Applications, Vol. 9, pp. 854-863, 2016
  11. A. H. Celdrán, G. D. Tormo, F. G. Mármol, M. G. Pérez, and G. M. Pérez, “Resolving Privacy-Preserving Relationships over Outsourced Encrypted Data Storages,” International Journal of Information Security, Vol. 15, pp. 195-209, 2016
  12. B. Jia, S. Liu, and Y. Yang, “Fractal Cross-Layer Service with Integration and Interaction in Internet of Things,” International Journal of Distributed Sensor Networks, Vol. 10, pp. 760248, 2014
  13. S.-W. Park, J. Kim, and D. G. Lee, “SecureDom: Secure Mobile-Sensitive Information Protection with Domain Separation,” The Journal of Supercomputing, Vol. 72, pp. 2682-2702, 2016
  14. H. Wu, X. Dang, L. Wang, and L. He, “Information Fusion-based Method for Distributed Domain Name System Cache Poisoning Attack Detection and Identification,” IET Information Security, Vol. 10, pp. 37-44, 2016
  15. G. Yang and S. Liu, “Distributed Cooperative Algorithm for k-M Set with Negative Integer k by Fractal Symmetrical Property,” International Journal of Distributed Sensor Networks, Vol. 10, pp. 398583, 2014
  16. H. Jiang, F. Shen, S. Chen, K. -C. Li, and Y. -S. Jeong, “A Secure and Scalable Storage System for Aggregate Data in IoT,” Future Generation Computer Systems, Vol. 49, pp. 133-141, 2015
  17. Y. Djemaiel and N. Boudriga, “Modeling and Assessing the Impact of Security Attacks on Enterprise Information Systems,” in Proceedings of International Conference on Business Information Systems, pp. 281-292, 2014

         

        Please note : You will need Adobe Acrobat viewer to view the full articles.Get Free Adobe Reader

         
        This site uses encryption for transmitting your passwords. ratmilwebsolutions.com