• Title/Summary/Keyword: Cloud storage service

Search Result 148, Processing Time 0.03 seconds

Adaptively Secure Anonymous Identity-based Broadcast Encryption for Data Access Control in Cloud Storage Service

  • Chen, Liqing;Li, Jiguo;Zhang, Yichen
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.3
    • /
    • pp.1523-1545
    • /
    • 2019
  • Cloud computing is now a widespread and economical option when data owners need to outsource or share their data. Designing secure and efficient data access control mechanism is one of the most challenging issues in cloud storage service. Anonymous broadcast encryption is a promising solution for its advantages in the respects of computation cost and communication overload. We bring forward an efficient anonymous identity-based broadcast encryption construction combined its application to the data access control mechanism in cloud storage service. The lengths for public parameters, user private key and ciphertext in the proposed scheme are all constant. Compared with the existing schemes, in terms of encrypting and decrypting computation cost, the construction of our scheme is more efficient. Furthermore, the proposed scheme is proved to achieve adaptive security against chosen-ciphertext attack adversaries in the standard model. Therefore, the proposed scheme is feasible for the system of data access control in cloud storage service.

A Study on Individual User's Preference for Cloud Storage Service (클라우드 스토리지 서비스에 대한 개인 사용자의 선호 요인 연구)

  • Lee, Sewon;Hong, Ahreum;Hwang, Junseok
    • Journal of Technology Innovation
    • /
    • v.23 no.1
    • /
    • pp.1-36
    • /
    • 2015
  • The purpose of this research is to find individual user's preference for cloud storage service such as Daum Cloud, Naver N-Drive, GoogleDrive, Dropbox, SkyDrive and iCloud. Through literature reviewed and pilot tests, 6 attributes of cloud storage service (storage capacity, perceived cost, collaboration, accessibility, social influence and perceived security) were selected and all 6 attributes had significant effects on the preference of cloud storage service by conjoint analysis. The results shows that the user's willingness to pay is estimated 10,553 won for the free storage, 4,646 won for the function for mobile accessibility, and 2,443 won for more reliable cloud computing service provider. This study has significance to apply conjoint analysis with economic, technological, and environmental factors to cloud storage service (SaaS) and shed light on policy promotion of next generation of cloud computing ecosystem by user perception with willingness to pay on the storage service.

Photo Management Cloud Service Using Deep Learning

  • Kim, Sung-Dong;Kim, Namyun
    • International journal of advanced smart convergence
    • /
    • v.9 no.3
    • /
    • pp.183-191
    • /
    • 2020
  • Today, taking photos using smartphones has become an essential element of modern people. According to these social changes, modern people need a larger storage capacity, and the number of unnecessary photos has increased. To support the storage, cloud-based photo storage services from various platforms have appeared, and many people are using the services. As the number of photos increases, it is difficult for users to find the photos they want, and it takes a lot of time to organize. In this paper, we propose a cloud-based photo management service that facilitates photo management by classifying photos and recommending unnecessary photos using deep learning. The service provides the function of tagging photos by identifying what the subject is, the function of checking for wrongly taken photos, and the function of recommending similar photos. By using the proposed service, users can easily manage photos and use storage capacity efficiently.

Analysis of Cloud Service Providers

  • Lee, Yo-Seob
    • International Journal of Advanced Culture Technology
    • /
    • v.9 no.3
    • /
    • pp.315-320
    • /
    • 2021
  • Currently, cloud computing is being used as a technology that greatly changes the IT field. For many businesses, many cloud services are available in the form of custom, reliable, and cost-effective web applications. Most cloud service providers provide functions such as IoT, machine learning, AI services, blockchain, AR & VR, mobile services, and containers in addition to basic cloud services that support the scalability of processors, memory, and storage. In this paper, we will look at the most used cloud service providers and compare the services provided by the cloud service providers.

An Empirical Study on the Influence Factors of the Mobile Cloud Storage Service Satisfaction (모바일 클라우드 스토리지 서비스 이용만족에 영향을 미치는 요인에 관한 실증연구)

  • Choi, Kwangdoo;Cho, Insu;Park, Heejun;Lee, Kiwon;Kang, Junmo
    • Journal of Korean Society for Quality Management
    • /
    • v.41 no.3
    • /
    • pp.381-394
    • /
    • 2013
  • Purpose: Nowadays, Mobile Cloud Storage services are used widely. For sustainable use of this service, we need to determine what factors affect satisfaction. Therefore, the purpose of this study is to identify the factors that influence satisfaction. Methods: To analyze factors that influence satisfaction, this study sets the factors into three dimensions such as service quality, perceived risk, and individual characteristics and analyze the causal relationship between influence factors and satisfaction through Structural Equation Model. Results: The results of this study are as follows; among service quality, user interface and reliability influenced satisfaction, but adaptability did not have any influence. Perceived risk of illegal access had a negative influence on satisfaction, while perceived risk of privacy leakage did not have significant influence on satisfaction in perceived risk. At last, self-efficacy had a significant influence on satisfaction. Conclusion: We identified the influence factors that influence satisfaction. Our findings will be necessary for Mobile Cloud Storage service providers to strengthen their service.

A Study on Selection Factors of Personal Cloud Storage Service Using AHP (AHP를 활용한 개인 클라우드 스토리지 서비스 선택 요인에 관한 연구)

  • Jo, Hyeon;Cho, Hyegyeong;Kim, Younghee;Kim, Hayan;Jeon, Hyeon-Jeong;Lee, Jae Kwang
    • Journal of Information Technology Services
    • /
    • v.14 no.3
    • /
    • pp.197-215
    • /
    • 2015
  • Recently, many internet users are using cloud computing. Users can manage, store and share their data and information by using personal cloud storage. In this paper, we aim to figure out influencing factors on personal cloud storage selection. The causal relationship between factors were identified through a importance analysis by using AHP(Analytic Hierarchy Process). AHP is a structured technique for organizing and analyzing complex decisions, based on mathematics and psychology. Research model consists of upper factorsincluding system factor, service factor and user factor. 12 lower factors and 6 alternatives were also analyzed. Asa result, system factor of 3 upper factors was found as the most important factor. Purpose-coincidence, security andaccessibility were top 3 factors among lower factors. N drive showed top importance value. We also conducted ANOVAby classifying 4 groups according to gender, age, currently used cloud and cloud to use. The results of this researchcan be useful guidelines for cloud computing industry.

An Improved Privacy Preserving Construction for Data Integrity Verification in Cloud Storage

  • Xia, Yingjie;Xia, Fubiao;Liu, Xuejiao;Sun, Xin;Liu, Yuncai;Ge, Yi
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.10
    • /
    • pp.3607-3623
    • /
    • 2014
  • The increasing demand in promoting cloud computing in either business or other areas requires more security of a cloud storage system. Traditional cloud storage systems fail to protect data integrity information (DII), when the interactive messages between the client and the data storage server are sniffed. To protect DII and support public verifiability, we propose a data integrity verification scheme by deploying a designated confirmer signature DCS as a building block. The DCS scheme strikes the balance between public verifiable signatures and zero-knowledge proofs which can address disputes between the cloud storage server and any user, whoever acting as a malicious player during the two-round verification. In addition, our verification scheme remains blockless and stateless, which is important in conducting a secure and efficient cryptosystem. We perform security analysis and performance evaluation on our scheme, and compared with the existing schemes, the results show that our scheme is more secure and efficient.

Improving efficiency of remote data audit for cloud storage

  • Fan, Kuan;Liu, Mingxi;Shi, Wenbo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.4
    • /
    • pp.2198-2222
    • /
    • 2019
  • The cloud storage service becomes a rising trend based on the cloud computing, which promotes the remote data integrity auditing a hot topic. Some research can audit the integrity and correctness of user data and solve the problem of user privacy leakage. However, these schemes cannot use fewer data blocks to achieve better auditing results. In this paper, we figure out that the random sampling used in most auditing schemes is not well apply to the problem of cloud service provider (CSP) deleting the data that users rarely use, and we adopt the probability proportionate to size sampling (PPS) to handle such situation. A new scheme named improving audit efficiency of remote data for cloud storage is designed. The proposed scheme supports the public auditing with fewer data blocks and constrains the server's malicious behavior to extend the auditing cycle. Compared with the relevant schemes, the experimental results show that the proposed scheme is more effective.

Design of Cloud Service Platform for eGovernment

  • LEE, Choong Hyong
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.13 no.1
    • /
    • pp.201-209
    • /
    • 2021
  • The term, eGovernmen or e-Government, uses technology communications devices such as computers and the Internet to provide public services to citizens and others. The eGovernment or e-government provides citizens with new opportunities to access the government directly and conveniently, while the government provides citizens with directservices. Also, in these days, cloud computing is a feature that enables users to use computer system resources, especially data storage (cloud storage) and on-demand computing power, without having to manage themselves. The term is commonly used to describe data centers that are available to many users over the Internet. Today, the dominant Big Cloud is distributed across multiple central servers. You can designate it as an Edge server if it is relatively close to the user. However, despite the prevalence of e-government and cloud computing, each of these concepts has evolved. Research attempts to combine these two concepts were not being made properly. For this reason, in this work, we aim to produce independent and objective analysis results by separating progress steps for the analysis of e-government cloud service platforms. This work will be done through an analysis of the development process and architectural composition of the e-government development standard framework and the cloud platform PaaS-TA. In addition, this study is expected to derive implications from an analysis perspective on the direction and service composition of the e-government cloud service platform currently being pursued.

Design and Forensic Analysis of a Zero Trust Model for Amazon S3 (Amazon S3 제로 트러스트 모델 설계 및 포렌식 분석)

  • Kyeong-Hyun Cho;Jae-Han Cho;Hyeon-Woo Lee;Jiyeon Kim
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.2
    • /
    • pp.295-303
    • /
    • 2023
  • As the cloud computing market grows, a variety of cloud services are now reliably delivered. Administrative agencies and public institutions of South Korea are transferring all their information systems to cloud systems. It is essential to develop security solutions in advance in order to safely operate cloud services, as protecting cloud services from misuse and malicious access by insiders and outsiders over the Internet is challenging. In this paper, we propose a zero trust model for cloud storage services that store sensitive data. We then verify the effectiveness of the proposed model by operating a cloud storage service. Memory, web, and network forensics are also performed to track access and usage of cloud users depending on the adoption of the zero trust model. As a cloud storage service, we use Amazon S3(Simple Storage Service) and deploy zero trust techniques such as access control lists and key management systems. In order to consider the different types of access to S3, furthermore, we generate service requests inside and outside AWS(Amazon Web Services) and then analyze the results of the zero trust techniques depending on the location of the service request.