• 제목/요약/키워드: Cloud storage service

검색결과 148건 처리시간 0.035초

Adaptively Secure Anonymous Identity-based Broadcast Encryption for Data Access Control in Cloud Storage Service

  • Chen, Liqing;Li, Jiguo;Zhang, Yichen
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제13권3호
    • /
    • pp.1523-1545
    • /
    • 2019
  • Cloud computing is now a widespread and economical option when data owners need to outsource or share their data. Designing secure and efficient data access control mechanism is one of the most challenging issues in cloud storage service. Anonymous broadcast encryption is a promising solution for its advantages in the respects of computation cost and communication overload. We bring forward an efficient anonymous identity-based broadcast encryption construction combined its application to the data access control mechanism in cloud storage service. The lengths for public parameters, user private key and ciphertext in the proposed scheme are all constant. Compared with the existing schemes, in terms of encrypting and decrypting computation cost, the construction of our scheme is more efficient. Furthermore, the proposed scheme is proved to achieve adaptive security against chosen-ciphertext attack adversaries in the standard model. Therefore, the proposed scheme is feasible for the system of data access control in cloud storage service.

클라우드 스토리지 서비스에 대한 개인 사용자의 선호 요인 연구 (A Study on Individual User's Preference for Cloud Storage Service)

  • 이세원;홍아름;황준석
    • 기술혁신연구
    • /
    • 제23권1호
    • /
    • pp.1-36
    • /
    • 2015
  • 본 논문에서는 Daum클라우드, 네이버 N드라이브, 구글드라이브, 드롭박스, 마이크로소프트 SkyDrive, 애플 iCloud와 같은 클라우드 스토리지 서비스 기술혁신에 있어서의 각 속성에 대한 개인 사용자의 선호요인을 컨조인트 방법론으로 분석하였다. 기존 연구 문헌을 통해서 클라우드 스토리지 서비스를 구성하는 주요한 속성으로 무료저장용량, 인지된 비용, 파일공유 기능을 통한 협업성 여부, 모바일 접근성, 사회적 영향력, 신뢰성을 기반으로 한 인지된 보안의 6가지를 요소를 추출하였다. 또한 컨조인트 분석 결과 6가지 속성 모두 클라우드 스토리지 서비스 선호에 통계적으로 유의함을 확인할 수 있었다. 컨조인트 분석결과 가장 중요한 속성은 접근성 이었으며, 그 다음으로 중요한 속성은 무료저장용량과 협업성 이었다. 그 결과로부터 더 진일보된 기술 혁신을 위한 클라우드 스토리지 서비스 생태계 조성을 위해 각 회사의 서비스 간 상호호환성에 기반한 통합적인 클라우드 스토리지 서비스 제공이 중요할 것이라는 함의를 찾을 수 있었다. 본 논문의 방법론에서 접근성과 협업성을 경제적 카테고리로 묶고, 저장용량과 인지된 비용을 기술적 카테고리로, 사회적 영향력과 인지된 보안을 환경적 카테고리로 분류하였을때, 기술적인 부분이 가장 중요하게, 그 다음으로 경제적인 부분이, 그리고 그 뒤로 환경적인 요인이 중요하다는 결과가 나왔다. 시사점에서는 연구 결과를 바탕으로 현재의 클라우드 스토리지 서비스를 더욱 개선, 발전시킬 수 있는 사항들을 제안해 보았다.

Photo Management Cloud Service Using Deep Learning

  • Kim, Sung-Dong;Kim, Namyun
    • International journal of advanced smart convergence
    • /
    • 제9권3호
    • /
    • pp.183-191
    • /
    • 2020
  • Today, taking photos using smartphones has become an essential element of modern people. According to these social changes, modern people need a larger storage capacity, and the number of unnecessary photos has increased. To support the storage, cloud-based photo storage services from various platforms have appeared, and many people are using the services. As the number of photos increases, it is difficult for users to find the photos they want, and it takes a lot of time to organize. In this paper, we propose a cloud-based photo management service that facilitates photo management by classifying photos and recommending unnecessary photos using deep learning. The service provides the function of tagging photos by identifying what the subject is, the function of checking for wrongly taken photos, and the function of recommending similar photos. By using the proposed service, users can easily manage photos and use storage capacity efficiently.

Analysis of Cloud Service Providers

  • Lee, Yo-Seob
    • International Journal of Advanced Culture Technology
    • /
    • 제9권3호
    • /
    • pp.315-320
    • /
    • 2021
  • Currently, cloud computing is being used as a technology that greatly changes the IT field. For many businesses, many cloud services are available in the form of custom, reliable, and cost-effective web applications. Most cloud service providers provide functions such as IoT, machine learning, AI services, blockchain, AR & VR, mobile services, and containers in addition to basic cloud services that support the scalability of processors, memory, and storage. In this paper, we will look at the most used cloud service providers and compare the services provided by the cloud service providers.

모바일 클라우드 스토리지 서비스 이용만족에 영향을 미치는 요인에 관한 실증연구 (An Empirical Study on the Influence Factors of the Mobile Cloud Storage Service Satisfaction)

  • 최광두;조인수;박희준;이기원;강준모
    • 품질경영학회지
    • /
    • 제41권3호
    • /
    • pp.381-394
    • /
    • 2013
  • Purpose: Nowadays, Mobile Cloud Storage services are used widely. For sustainable use of this service, we need to determine what factors affect satisfaction. Therefore, the purpose of this study is to identify the factors that influence satisfaction. Methods: To analyze factors that influence satisfaction, this study sets the factors into three dimensions such as service quality, perceived risk, and individual characteristics and analyze the causal relationship between influence factors and satisfaction through Structural Equation Model. Results: The results of this study are as follows; among service quality, user interface and reliability influenced satisfaction, but adaptability did not have any influence. Perceived risk of illegal access had a negative influence on satisfaction, while perceived risk of privacy leakage did not have significant influence on satisfaction in perceived risk. At last, self-efficacy had a significant influence on satisfaction. Conclusion: We identified the influence factors that influence satisfaction. Our findings will be necessary for Mobile Cloud Storage service providers to strengthen their service.

AHP를 활용한 개인 클라우드 스토리지 서비스 선택 요인에 관한 연구 (A Study on Selection Factors of Personal Cloud Storage Service Using AHP)

  • 조현;조혜경;김영희;김하얀;전현정;이재광
    • 한국IT서비스학회지
    • /
    • 제14권3호
    • /
    • pp.197-215
    • /
    • 2015
  • Recently, many internet users are using cloud computing. Users can manage, store and share their data and information by using personal cloud storage. In this paper, we aim to figure out influencing factors on personal cloud storage selection. The causal relationship between factors were identified through a importance analysis by using AHP(Analytic Hierarchy Process). AHP is a structured technique for organizing and analyzing complex decisions, based on mathematics and psychology. Research model consists of upper factorsincluding system factor, service factor and user factor. 12 lower factors and 6 alternatives were also analyzed. Asa result, system factor of 3 upper factors was found as the most important factor. Purpose-coincidence, security andaccessibility were top 3 factors among lower factors. N drive showed top importance value. We also conducted ANOVAby classifying 4 groups according to gender, age, currently used cloud and cloud to use. The results of this researchcan be useful guidelines for cloud computing industry.

An Improved Privacy Preserving Construction for Data Integrity Verification in Cloud Storage

  • Xia, Yingjie;Xia, Fubiao;Liu, Xuejiao;Sun, Xin;Liu, Yuncai;Ge, Yi
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제8권10호
    • /
    • pp.3607-3623
    • /
    • 2014
  • The increasing demand in promoting cloud computing in either business or other areas requires more security of a cloud storage system. Traditional cloud storage systems fail to protect data integrity information (DII), when the interactive messages between the client and the data storage server are sniffed. To protect DII and support public verifiability, we propose a data integrity verification scheme by deploying a designated confirmer signature DCS as a building block. The DCS scheme strikes the balance between public verifiable signatures and zero-knowledge proofs which can address disputes between the cloud storage server and any user, whoever acting as a malicious player during the two-round verification. In addition, our verification scheme remains blockless and stateless, which is important in conducting a secure and efficient cryptosystem. We perform security analysis and performance evaluation on our scheme, and compared with the existing schemes, the results show that our scheme is more secure and efficient.

Improving efficiency of remote data audit for cloud storage

  • Fan, Kuan;Liu, Mingxi;Shi, Wenbo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제13권4호
    • /
    • pp.2198-2222
    • /
    • 2019
  • The cloud storage service becomes a rising trend based on the cloud computing, which promotes the remote data integrity auditing a hot topic. Some research can audit the integrity and correctness of user data and solve the problem of user privacy leakage. However, these schemes cannot use fewer data blocks to achieve better auditing results. In this paper, we figure out that the random sampling used in most auditing schemes is not well apply to the problem of cloud service provider (CSP) deleting the data that users rarely use, and we adopt the probability proportionate to size sampling (PPS) to handle such situation. A new scheme named improving audit efficiency of remote data for cloud storage is designed. The proposed scheme supports the public auditing with fewer data blocks and constrains the server's malicious behavior to extend the auditing cycle. Compared with the relevant schemes, the experimental results show that the proposed scheme is more effective.

Design of Cloud Service Platform for eGovernment

  • LEE, Choong Hyong
    • International Journal of Internet, Broadcasting and Communication
    • /
    • 제13권1호
    • /
    • pp.201-209
    • /
    • 2021
  • The term, eGovernmen or e-Government, uses technology communications devices such as computers and the Internet to provide public services to citizens and others. The eGovernment or e-government provides citizens with new opportunities to access the government directly and conveniently, while the government provides citizens with directservices. Also, in these days, cloud computing is a feature that enables users to use computer system resources, especially data storage (cloud storage) and on-demand computing power, without having to manage themselves. The term is commonly used to describe data centers that are available to many users over the Internet. Today, the dominant Big Cloud is distributed across multiple central servers. You can designate it as an Edge server if it is relatively close to the user. However, despite the prevalence of e-government and cloud computing, each of these concepts has evolved. Research attempts to combine these two concepts were not being made properly. For this reason, in this work, we aim to produce independent and objective analysis results by separating progress steps for the analysis of e-government cloud service platforms. This work will be done through an analysis of the development process and architectural composition of the e-government development standard framework and the cloud platform PaaS-TA. In addition, this study is expected to derive implications from an analysis perspective on the direction and service composition of the e-government cloud service platform currently being pursued.

Amazon S3 제로 트러스트 모델 설계 및 포렌식 분석 (Design and Forensic Analysis of a Zero Trust Model for Amazon S3)

  • 조경현;조재한;이현우;김지연
    • 정보보호학회논문지
    • /
    • 제33권2호
    • /
    • pp.295-303
    • /
    • 2023
  • 클라우드 컴퓨팅 시장이 성장하면서 다양한 클라우드 서비스가 안정적으로 제공되고 있으며 국내행정·공공기관은 모든 정보시스템을 클라우드 시스템으로 운영하기 위한 전환사업을 수행하고 있다. 그러나 인터넷을 통해 클라우드 자원에 접근할 경우, 내·외부 인력의 잘못된 자원 사용 및 악의적인 접근이 가능하기 때문에 사전에 클라우드 서비스를 안전하게 운영하기 위한 보안 기술을 마련하는 것이 필요하다. 본 논문은 클라우드 서비스 중, 민감한 데이터를 저장하는 클라우드 스토리지 서비스에 대해 제로 트러스트 기반으로 보안 기술을 설계하고, 설계된 보안기술을 실제 클라우드 스토리지에 적용하여 보안 기술의 실효성을 검증한다. 특히, 보안 기술 적용 여부에 따른 클라우드 사용자의 상세 접근 및 사용 행위를 추적하기 위하여 메모리 포렌식, 웹 포렌식, 네트워크 포렌식을 수행한다. 본 논문에서는 클라우드 스토리지 서비스로서 Amazon S3(Simple Storage Service)를 사용하고, S3의제로트러스트 기술로는 접근제어목록 및 키 관리 기술을 사용한다. 또한, S3에 대한 다양한 접근 유형을 고려하기 위하여 AWS(Amazon Web Services) 클라우드 내·외부에서 서비스 요청을 발생시키고, 서비스 요청위치에 따른 보안 기술 적용 효과를 분석한다.