CHENG Hongbing, QIAN Manyun, YU Shui. Securing Cloud Data Using a Pirate Scheme[J]. Chinese Journal of Electronics, 2017, 26(6): 1289-1296. doi: 10.1049/cje.2017.09.007
Citation: CHENG Hongbing, QIAN Manyun, YU Shui. Securing Cloud Data Using a Pirate Scheme[J]. Chinese Journal of Electronics, 2017, 26(6): 1289-1296. doi: 10.1049/cje.2017.09.007

Securing Cloud Data Using a Pirate Scheme

doi: 10.1049/cje.2017.09.007
Funds:  This work is supported by the National Natural Science Foundation of China (No.61402413), and the Nature Science Foundation of Zhejiang Province (No.LY14F020019).
  • Received Date: 2016-07-01
  • Rev Recd Date: 2016-08-05
  • Publish Date: 2017-11-10
  • Inspired by the approach of smart pirates dealing with their treasures, the paper proposed a scheme to protect the data security and privacy in cloud computing. In the proposed scheme, cloud data will be divided into some sequenced or logical blocks. These data blocks will be distributed among cloud storage service providers. Instead of protecting the data themselves, the proposed scheme protects the mapping of the data elements on each provider. Comprehensive analysis and simulation are designed to verify the proposed scheme, the results show that it is secure for cloud data, and the real implementation on Amazon S3 also indicates that the proposed scheme is feasible and efficient for the cloud data storage.
  • loading
  • R. Buyya, C.S. Yeo and S. Venugopal, "Cloud computing and emerging IT platforms:Vision, hype, and reality for delivering computing as the 5th utility", Future Generation Computer Systems, Vol.25, No.6, pp.599-616, 2009.
    D. Kusnetzky, "What is big Data?", available at, 2015-12-22.
    S. Pearson and G. Yee, "Privacy and security for cloud computing", Springer London, 2013.
    A. Bessani, M. Correia and B. Quaresma, "DepSky:Dependable and secure storage in a cloud-of-clouds", ACM Transactions on Storage, Vol.9, No.4, pp.12-21, 2013.
    C. Wang, Q. Wang and K. Ren, "Toward secure and dependable storage services in cloud computing", IEEE Transactions on Services Computing, Vol.5, No.2, pp.220-232, 2012.
    H. Cheng, C. Rong, et al., "Secure data storage and sharing scheme for cloud tenants", China Communications. Vol.12, No.6, pp.106-115, 2015.
    H. Li, B. Wang and B. Li, "Oruta:Privacy-preserving public auditing for shared data in the cloud", IEEE Transactions on Cloud Computing, Vol.2, No.1, pp.43-56, 2014.
    D. Patterson, G. Gibson and R. Katz, "The case for RAID:Redundant arrays of inexpensive disks", Proceeding of ACM SIGMOD, 2013.
    N. Sammeta, R.J. Kannan and L. Parthiban, "Enhanced trusted third party for cyber security in multi cloud storage", ICT and Critical Infrastructure:Proceedings of the 48th Annual Convention of Computer Society of India, 2014.
    Z. Tan, U.T. Nagar and X. He, "Enhancing big data security with collaborative intrusion detection", IEEE Cloud Computing, Vol.1, No.3, pp.27-33, 2015.
    X. Zhang, W. Dou and J. Pei, "Proximity-aware local-recoding anonymization with MapReduce for scalable big data privacy preservation in cloud", IEEE Transactions on Computers, Vol.64, No.8, pp.2293-2307, 2015.
    H. Li, Y. Yang and Luan Tom, "Enabling fine-grained multikeyword search supporting classified sub-dictionaries over encrypted cloud data", IEEE Transactions on Dependable and Secure Computing, Vol.13, No.3, pp.312-325, 2016.
    S. Niu, S. TU and Y. Huang, "An effective and secure access control system scheme in the cloud", Chinese Journal of Electronics, Vol.24, No.3, pp.524-528, 2015.
    Amazon, "Amazon S3", available at, 2015-03-23.
    Rackspace, "Rackspace Cloud Files", available at, 2015-03-26.
  • 加载中


    通讯作者: 陈斌,
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (225) PDF downloads(231) Cited by()
    Proportional views


    DownLoad:  Full-Size Img  PowerPoint