XML signature element wrapping attacks and countermeasures
Proceedings of the 2005 workshop on Secure web services
Towards secure SOAP message exchange in a SOA
Proceedings of the 3rd ACM workshop on Secure web services
Breaking and fixing the inline approach
Proceedings of the 2007 ACM workshop on Secure web services
Stealthy malware detection through vmm-based "out-of-the-box" semantic view reconstruction
Proceedings of the 14th ACM conference on Computer and communications security
A break in the clouds: towards a cloud definition
ACM SIGCOMM Computer Communication Review
Challenges and opportunities for virtualized security in the clouds
Proceedings of the 14th ACM symposium on Access control models and technologies
ACM SIGACT News
What's inside the Cloud? An architectural map of the Cloud landscape
CLOUD '09 Proceedings of the 2009 ICSE Workshop on Software Engineering Challenges of Cloud Computing
Taking account of privacy when designing cloud computing services
CLOUD '09 Proceedings of the 2009 ICSE Workshop on Software Engineering Challenges of Cloud Computing
Vulnerable Cloud: SOAP Message Security Validation Revisited
ICWS '09 Proceedings of the 2009 IEEE International Conference on Web Services
Cloud Computing Resource Management through a Grid Middleware: A Case Study with DIET and Eucalyptus
CLOUD '09 Proceedings of the 2009 IEEE International Conference on Cloud Computing
Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds
Proceedings of the 16th ACM conference on Computer and communications security
Secure virtualization for cloud computing
Journal of Network and Computer Applications
Addressing cloud computing security issues
Future Generation Computer Systems
Security Issues for Cloud Computing
International Journal of Information Security and Privacy
Hi-index | 0.00 |
With the development of multi-core processors, virtualisation, distributed storage, broadband internet and automatic management, a new type of computing mode named cloud computing is produced. The cloud computing has drastically altered everyone's perception of infrastructure architectures, software delivery and development models. Cloud computing adoption and diffusion are threatened by unresolved security issues that affect both the cloud provider and the cloud user. A secure data storage architecture based on cloud computing is presented in this paper to deal with the data security in the cloud storage systems and applications. This architecture research, the security issues from data storage and data security including the data storage model based on caching and data security model based on the third party secure publication. This method improves the high availability of data. Protection measures from the data storage to transmission are taken to ensure safety.