Study on Strategy of Cloud Computing Data Storage Security
Authors
Sha Liu, Shuhua Zhu
Corresponding Author
Sha Liu
Available Online August 2015.
- DOI
- 10.2991/meita-15.2015.13How to use a DOI?
- Keywords
- Cloud Computing; Data Security; Trusted Platform Module
- Abstract
With the popularization and application of cloud computing services, cloud storage has become a typical representative of cloud computing services. But meanwhile, we must also recognize that the problem of storing data in a cloud environment can be brought to us. In this paper, we propose a cloud data storage security solution based on security chip. Combined with the feature of trusted cloud computing, we have put forward the corresponding solution ideas and methods, including user registration, root key and root certificate generation, identity authentication and data storage and transmission security protocol.
- Copyright
- © 2015, the Authors. Published by Atlantis Press.
- Open Access
- This is an open access article distributed under the CC BY-NC license (http://creativecommons.org/licenses/by-nc/4.0/).
Cite this article
TY - CONF AU - Sha Liu AU - Shuhua Zhu PY - 2015/08 DA - 2015/08 TI - Study on Strategy of Cloud Computing Data Storage Security BT - Proceedings of the 2015 International Conference on Materials Engineering and Information Technology Applications PB - Atlantis Press SP - 64 EP - 67 SN - 2352-5401 UR - https://doi.org/10.2991/meita-15.2015.13 DO - 10.2991/meita-15.2015.13 ID - Liu2015/08 ER -