[go: up one dir, main page]

Computer Science ›› 2016, Vol. 43 ›› Issue (4): 118-121.doi: 10.11896/j.issn.1002-137X.2016.04.024

Previous Articles     Next Articles

Security Access to Cloud Disk via Virtual Isolation Mechanism

CHEN Feng, BAO Ai-hua and ZHANG Wei-ming   

  • Online:2018-12-01 Published:2018-12-01

Abstract: The cloud storage technology is an important research area of cloud computing.Because of the hidden trouble about data leakage,cloud storage services are often difficult to be widely used in organizations with the core data,such as the innovative enterprises or the army.For this issue,a noval security access model for cloud disk was proposed via the virtual isolation mechanism.Theoretical analysis shows that the model has ability to prevent sensitive data leakage in cloud disk of the enterprise.Further,an enterprise private cloud storage-oriented electronic document centralized ma-nagement and control system CFS was presented to test read/write operations performance based on the model.Until now,the system has been successfully applied to a number of important user units,and has very good development prospects.

Key words: Cloud disk,Virtual isolation,Date security

[1] https://www.dropbox.com
[2] https://skydrive.live.com
[3] http://www.ksyun.com
[4] http://yunpan.360.cn
[5] Cao Xi,Xu Li,Chen Lan-xiang.Data integrity verification protocol in cloud storage system[J].Journal of Computer Applications,2012,32(1):8-12(in Chinese) 曹夕,许力,陈兰香.云存储系统中数据完整性验证协议[J].计算机应用,2012,32(1):8-12
[6] Yan Xiang-tao,Li Yi-fa.Integrity Checking Algorithm Based on Hash Tree for Cloud Storage[J].Computer Science,2012,39(12):94-97(in Chinese) 颜湘涛,李益发.基于哈希树的云存储完整性检测算法[J].计算机科学,2012,39(12):94-97
[7] Liu Fan,Yang Ming.Ciphertext policy attribute based on en-cryption scheme for cloud storage[J].Application Research of Computers,2012,29(4):1452-1456(in Chinese) 刘帆,杨明.一种用于云存储的密文策略属性基加密方案[J].计算机应用研究,2012,29(4):1452-1456
[8] Lim H,Kapoor V,Wighe C.Active disk file system:Adistribu-ted,scalable filesystem[C]∥Proceedings of the Eighteenth IEEE Symposium.Washington,DC:IEEE Computer Society,2001:101-114
[9] Swank J D,Goodson G R,Scheinholtz M L,et al.Self-securing storage:Protecting data incompromised systems[C]∥Proc of the 4th Symposium on Operating Systems Design and Implementation.Berkeley,CA:USENIX Association,2000:12-26
[10] Jin Chao,Zhen Wei-min,Zhang You-hui.Active Storage Architecture[J].Chinese Journal of Computers,2005,8(6):1013-1020(in Chinese) 靳超,郑纬民,张悠慧.主动存储系统结构[J].计算机学报,2005,8(6):1013-1020
[11] Zhao Yue-long,Jiang Qian.Research and Design of the Virtua-lization Storage Technology Based on Intelligent Network Disk[J].Journal of Computer Research and Development,2009,6(Supp1):44-49(in Chinese) 赵跃龙,蒋骞.基于智能网络磁盘的虚拟存储技术的研究与设计[J].计算机研究与发展,2009,6(Supp1):44-49
[12] Using virtual desktop to improve the ability of the management and control [EB/OL].[2010-3-15].http://www.vmware.com/cn/solutions/desktop
[13] King S T,Dunlap G W,Chen P M.Operaring System Support for Virtual Machines[C]∥Proc of the 2003 Annual USENIX Technical Conference.2003:6
[14] Griffin J L,Jaeger T,Perez R,et al.Trusted virtual domains:Toward secure distributed services[C]∥Proceedings of the 1st IEEE Workshop on Hot Topics in System Dependability.Los Alamitos:IEEE Computer Society.2005:274-281
[15] Gasmi Y,Sadeghi A-R,Stewin P,et al.Flexible and Secure Enterprise Rights Management Based on Trusted Virtual Domains[C]∥Proc of the 3rd ACM Workshop on Scalable Trusted Computing.2008:71-88
[16] Yang Yu.OS level virtualization and its applications[D].NewYork:Stony Brook University,2007
[17] http://dokan-dev.net/en
[18] Denning D E.A lattice model of secure information flow[J].Communications of the ACM,1976,9(5):236-243

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!