• 제목/요약/키워드: Cloud storage

검색결과 419건 처리시간 0.027초

클라우드 스토리지에서 안전한 중복 제거 기법들에 대한 보안 취약점 분석 (Analysis of Security Weakness on Secure Deduplication Schemes in Cloud Storage)

  • 박지선;신상욱
    • 한국멀티미디어학회논문지
    • /
    • 제21권8호
    • /
    • pp.909-916
    • /
    • 2018
  • Cloud storage services have many advantages. As a result, the amount of data stored in the storage of the cloud service provider is increasing rapidly. This increase in demand forces cloud storage providers to apply deduplication technology for efficient use of storages. However, deduplication technology has inherent security and privacy concerns. Several schemes have been proposed to solve these problems, but there are still some vulnerabilities to well-known attacks on deduplication techniques. In this paper, we examine some of the existing schemes and analyze their security weaknesses.

클라우드 스토리지 인프라 구축을 위한 오픈 소스 기술 동향 (Trend analysis of Open Source Technologies for Cloud Storage Infrastructure)

  • 배유미;정성재;배정민;박정수;성경
    • 한국정보통신학회:학술대회논문집
    • /
    • 한국정보통신학회 2013년도 춘계학술대회
    • /
    • pp.263-266
    • /
    • 2013
  • 클라우드 컴퓨팅 환경의 보편화, 모바일 기기의 증가, 다양한 웹 기반 서비스의 등장으로 대용량의 저장 공간이 요구되고 있다. 특히, 구글 드라이브, 네이버 ndrive, 다음 클라우드 등 웹 기반의 저장형 서비스의 이용이 보편화되면서 많은 저장 공간이 요구되고 있다. 따라서, 스토리지 분야도 네트워크를 통하여 가상화된 스토리지 자원을 사용자의 요구에 따라 제공이 가능하고, 대규모 확장이 쉽고, 특정 지리적 위치에 구애받지 않는 클라우드 스토리지 기술이 각광받도 있다. 본 논문에서는 클라우드 스토리지 인프라 구축을 위하여 공개 소프트웨어 기술인 하둡, 스위프트, GlusterFS의 특징에 대해 알아본다.

  • PDF

Secure and Efficient Storage of Video Data in a CCTV Environment

  • Kim, Won-Bin;Lee, Im-Yeong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제13권6호
    • /
    • pp.3238-3257
    • /
    • 2019
  • Closed-circuit television (CCTV) technology continuously captures and stores video streams. Users are typically required by policy to store all the captured video for a certain period. Accordingly, increasing the number of CCTV operation cycles and photographing positions expands the amount of data to be stored. However, expanding the available storage space for video data incurs increased costs. In recent years, this problem has been addressed with cloud storage solutions, which enable multiple users and devices to access and store data simultaneously. However, because of the large amount of data to be stored, a vast storage space is required. Consequently, cloud storage administrators need a way to store data more efficiently. To save storage space, deduplication technology has been proposed to prevent duplicate storage of the same data. However, because cloud storage is hosted on remote servers, data encryption technology must be applied to address data exposure issues. Although deduplication techniques for encrypted data have been studied, there have been various security vulnerabilities. We attempted to solve this problem by addressing various issues such as poison attacks, property forgery, and ownership management while removing the redundant data and handling the data more securely.

Photo Management Cloud Service Using Deep Learning

  • Kim, Sung-Dong;Kim, Namyun
    • International journal of advanced smart convergence
    • /
    • 제9권3호
    • /
    • pp.183-191
    • /
    • 2020
  • Today, taking photos using smartphones has become an essential element of modern people. According to these social changes, modern people need a larger storage capacity, and the number of unnecessary photos has increased. To support the storage, cloud-based photo storage services from various platforms have appeared, and many people are using the services. As the number of photos increases, it is difficult for users to find the photos they want, and it takes a lot of time to organize. In this paper, we propose a cloud-based photo management service that facilitates photo management by classifying photos and recommending unnecessary photos using deep learning. The service provides the function of tagging photos by identifying what the subject is, the function of checking for wrongly taken photos, and the function of recommending similar photos. By using the proposed service, users can easily manage photos and use storage capacity efficiently.

Adaptive Deadline-aware Scheme (ADAS) for Data Migration between Cloud and Fog Layers

  • Khalid, Adnan;Shahbaz, Muhammad
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제12권3호
    • /
    • pp.1002-1015
    • /
    • 2018
  • The advent of Internet of Things (IoT) and the evident inadequacy of Cloud networks concerning management of numerous end nodes have brought about a shift of paradigm giving birth to Fog computing. Fog computing is an extension of Cloud computing that extends Cloud resources at the edge of the network, closer to the user. Cloud computing has become one of the essential needs of people over the Internet but with the emerging concept of IoT, traditional Clouds seem inadequate. IoT entails extremely low latency and for that, the Cloud servers that are distant and unknown to the user appear to be unsuitable. With the help of Fog computing, the Fog devices installed would be closer to the user that will provide an immediate storage for the frequently needed data. This paper discusses data migration between different storage types especially between Cloud devices and then presents a mechanism to migrate data between Cloud and Fog Layer. We call this mechanism Adaptive Deadline-Aware Scheme (ADAS) for Data migration between Cloud and Fog. We will demonstrate that we can access and process latency sensitive "hot" data through the proposed ADAS more efficiently than with a traditional Cloud setup.

클라우드 스토리지 최적화를 위한 고속 캐싱 및 대용량 파일 전송 기법 (A Scheme on High-Performance Caching and High-Capacity File Transmission for Cloud Storage Optimization)

  • 김태훈;김정한;엄영익
    • 한국통신학회논문지
    • /
    • 제37권8C호
    • /
    • pp.670-679
    • /
    • 2012
  • 최근 클라우드 컴퓨팅 환경의 보급과 함께 스토리지의 데이터양이 급증함에 따라 그에 따른 스토리지 저장 비용이 빠르게 증가하고 있다. 더불어, 사용자들의 다양한 서비스 및 데이터 요청으로 클라우드 스토리지의 부하 또한 급증하고 있다. 이러한 문제를 해결하기 위해 분산 파일 시스템을 통한 저비용 고성능 스토리지 환경을 제공하고자 하는 기존의 연구가 있었으나, 이에는 데이터 병렬처리, 임의위치 접근처리, 빈번한 작은 워크로드 접근처리 등의 취약점이 존재한다. 최근에는 캐싱 기술을 이용하여 이를 개선하려는 연구가 주목받고 있다. 본 논문에서는 분산 파일 시스템 환경에서 병렬 캐싱, 분산 캐싱과 공유 자원을 고려한 데이터 병렬 전송방법을 제공하는 CHPC(Cloud storage High-Performance Caching) 구조를 제안하며, 또한 이를 기존의 방법들과 비교 평가하여 스토리지 부하를 최적화하는 방법을 제시한다. 더불어, 제안 기법이 기존 클라우드 시스템에 비하여 스토리지 서버의 디스크 입출력 감소, 서버로 데이터의 요청이 집중되어 발생하는 병목현상 방지, 각 클라이언트의 중복되는 페이지 캐시 제거, 데이터 전송률 향상의 장점을 가짐을 보인다.

Efficient Update Method for Cloud Storage System

  • Khill, Ki-Jeong;Lee, Sang-Min;Kim, Young-Kyun;Shin, Jaeryong;Song, Seokil
    • International Journal of Contents
    • /
    • 제10권1호
    • /
    • pp.62-67
    • /
    • 2014
  • Usually, cloud storage systems are developed based on DFS (Distributed File System) for scalability and reliability reasons. DFSs are designed to improve throughput than IO response time, and therefore, they are appropriate for batch processing jobs. Recently, cloud storage systems have been used for update intensive applications such as OLTP and so on. However, in DFSs, in-place update operations are not carefully considered. Therefore, when updates are frequent, I/O performance of DFSs are degraded significantly. DFSs with RAID techniques have been proposed to improve their performance and reliability. Their performance degradation caused by frequent update operations can be more significant. In this paper, we propose an in-place update method for DFS RAID exploiting a differential logging technique. The proposed method reduces the I/O costs, network traffic and XOR operation costs for RAID. We demonstrate the efficiency of our proposed in-place update method through various experiments.

An Improved Privacy Preserving Construction for Data Integrity Verification in Cloud Storage

  • Xia, Yingjie;Xia, Fubiao;Liu, Xuejiao;Sun, Xin;Liu, Yuncai;Ge, Yi
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제8권10호
    • /
    • pp.3607-3623
    • /
    • 2014
  • The increasing demand in promoting cloud computing in either business or other areas requires more security of a cloud storage system. Traditional cloud storage systems fail to protect data integrity information (DII), when the interactive messages between the client and the data storage server are sniffed. To protect DII and support public verifiability, we propose a data integrity verification scheme by deploying a designated confirmer signature DCS as a building block. The DCS scheme strikes the balance between public verifiable signatures and zero-knowledge proofs which can address disputes between the cloud storage server and any user, whoever acting as a malicious player during the two-round verification. In addition, our verification scheme remains blockless and stateless, which is important in conducting a secure and efficient cryptosystem. We perform security analysis and performance evaluation on our scheme, and compared with the existing schemes, the results show that our scheme is more secure and efficient.

An Efficient Provable Secure Public Auditing Scheme for Cloud Storage

  • Xu, Chunxiang;Zhang, Yuan;Yu, Yong;Zhang, Xiaojun;Wen, Junwei
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제8권11호
    • /
    • pp.4226-4241
    • /
    • 2014
  • Cloud storage provides an easy, cost-effective and reliable way of data management for users without the burden of local data storage and maintenance. Whereas, this new paradigm poses many challenges on integrity and privacy of users' data, since users losing grip on their data after outsourcing the data to the cloud server. In order to address these problems, recently, Worku et al. have proposed an efficient privacy-preserving public auditing scheme for cloud storage. However, in this paper, we point out the security flaw existing in the scheme. An adversary, who is on-line and active, is capable of modifying the outsourced data arbitrarily and avoiding the detection by exploiting the security flaw. To fix this security flaw, we further propose a secure and efficient privacy-preserving public auditing scheme, which makes up the security flaw of Worku et al.'s scheme while retaining all the features. Finally, we give a formal security proof and the performance analysis, they show the proposed scheme has much more advantages over the Worku et al.'s scheme.

클라우드 저장장치 가상화 시스템을 위한 보안 요구사항 제안 (Proposal of Security Requirements for the Cloud Storage Virtualization System)

  • 여영민;이찬우;문종섭
    • 정보보호학회논문지
    • /
    • 제23권6호
    • /
    • pp.1247-1257
    • /
    • 2013
  • 클라우드 저장장치 가상화 환경에서는 기존의 컴퓨터 시스템 환경과는 다른 형태의 새로운 보안 취약점들이 발생하고 있으며, 기존의 보안 시스템으로는 이러한 보안위협요소들에 대해 적절한 대응이 어려우므로 기술적 해결 방안의 수립이 시급하다. 이를 위해서는 먼저 클라우드 저장장치 가상화 기술들을 상세하게 분석하고, 클라우드 저장장치 서비스를 이용하는 다양한 이해관계자들의 보안 요구사항을 조사하여, 보안 요구사항의 기술적 가이드라인에 대한 연구가 선행되어야 한다. 이에 본 논문은 클라우드 저장장치 가상화의 보안 요구사항 정의하고, 사용자 역할별 보안 요구사항과 시스템 계층별 보안 요구사항을 각각 도출하여 계층 및 역할별 보안 요구사항을 제안한다. 제안된 보안 요구사항은 가상화 보안 솔루션을 개발할 수 있는 기초를 제공할 것으로 예상된다.