بحث ها و چالش ها در مورد حفاظت از حریم خصوصی در رایانش ابری
ترجمه نشده

بحث ها و چالش ها در مورد حفاظت از حریم خصوصی در رایانش ابری

عنوان فارسی مقاله: امنیت و حفاظت از حریم خصوصی در رایانش ابری: بحث ها و چالش ها
عنوان انگلیسی مقاله: Security and privacy protection in cloud computing: Discussions and challenges
مجله/کنفرانس: مجله کاربردهای رایانه و شبکه - Journal Of Network And Computer Applications
رشته های تحصیلی مرتبط: کامپیوتر
گرایش های تحصیلی مرتبط: امنیت اطلاعات، رایانش ابری، مهندسی نرم افزار
کلمات کلیدی فارسی: محاسبات ابری، امنیت حریم خصوصی، کنترل دسترسی، رمزگذاری مبتنی بر ویژگی ها، اعتماد
کلمات کلیدی انگلیسی: Cloud computing، Privacy security، Access control، Attribute-based encryption، Trust
نوع نگارش مقاله: مقاله مروری (Review Article)
نمایه: Scopus - Master Journals List - JCR
شناسه دیجیتال (DOI): https://doi.org/10.1016/j.jnca.2020.102642
دانشگاه: School of Electronic Information and Electrical Engineering, Shanghai Jiao Tong University, 800 Dongchuan RD, Minhang, Shanghai, China
صفحات مقاله انگلیسی: 34
ناشر: الزویر - Elsevier
نوع ارائه مقاله: ژورنال
نوع مقاله: ISI
سال انتشار مقاله: 2020
ایمپکت فاکتور: 7/092 در سال 2019
شاخص H_index: 77 در سال 2020
شاخص SJR: 0/903 در سال 2019
شناسه ISSN: 1084-8045
شاخص Quartile (چارک): Q1 در سال 2019
فرمت مقاله انگلیسی: PDF
وضعیت ترجمه: ترجمه نشده است
قیمت مقاله انگلیسی: رایگان
آیا این مقاله بیس است: بله
آیا این مقاله مدل مفهومی دارد: دارد
آیا این مقاله پرسشنامه دارد: ندارد
آیا این مقاله متغیر دارد: ندارد
کد محصول: E14911
رفرنس: دارای رفرنس در داخل متن و انتهای مقاله
فهرست مطالب (انگلیسی)

Abstract

1- Introduction

2- Privacy security of cloud computing

3- Access control in cloud computing

4- ABE in cloud computing

5- Searchable encryption

6- Combination technologies in cloud privacy

7- Challenges and future directions

8- Summary

References

بخشی از مقاله (انگلیسی)

Abstract

With the development of cloud computing, privacy security issues have become increasingly prominent, which is of concern to industry and academia. We review the research progress on privacy security issues from the perspective of several privacy security protection technologies in cloud computing. First, we introduce some privacy security risks of cloud computing and propose a comprehensive privacy security protection framework. Second, we show and discuss the research progress of several technologies, such as access control; ciphertext policy attribute-based encryption (CP-ABE); key policy attribute-based encryption (KP-ABE); the fine-grain, multi-authority, revocation mechanism; the trace mechanism; proxy re-encryption (PRE); hierarchical encryption; searchable encryption (SE); and multi-tenant, trust, and a combination of multiple technologies, and then compare and analyze the characteristics and application scope of typical schemes. Last, we discuss current challenges and highlight possible future research directions.

Challenges

Via analysis and contrast, we observe that cloud computing security protection work has achieved satisfactory research results. However, many problems remain, which prompt the consideration of a variety of security factors and continuous improvements in defense technology and security strategies. 1 All kinds of attacks are generally based on the defects of cloud infrastructure in a system management program. Different attack methods are adopted to enhance the operation authority or steal sensitive data. 2 To better defend cross-virtual machine side channel attacks, researchers should pay more attention to the forms of virtual machine attacks in the process of cloud migration, such as malicious theft of privacy information. 3 Design a security defense policy that can be independent of CSP to effectively limit the abuse of rights. In the process of security defense, researchers should also pay attention to the negative impact of defense schemes on the performance of public clouds. 4 The protection degree of sharing algorithms to a user's identity privacy needs improvement. The unidirectional and transitive characteristics of the proxy re-encryption algorithm need to be further investigated, while the efficiency of an attribute encryption algorithm in dynamic permission management is usually poor. 5 Recyclability proves that prevention of the illegal deletion of file level or block level cloud data and improved audit efficiency in the case of data updates are urgent. 6 Privacy requirements and service level agreements (SLAs). Hidden dangers of unintentional or malicious disclosure of user privacy exist in an SLA. Therefore, privacy modeling and verification, consistency detection, privacy description, and implementation are the key issues to be solved.