Table of Contents Author Guidelines Submit a Manuscript
Mathematical Problems in Engineering
Volume 2014 (2014), Article ID 293214, 8 pages
http://dx.doi.org/10.1155/2014/293214
Research Article

An Enhanced Erasure Code-Based Security Mechanism for Cloud Storage

1Institute of Computer Network & Information Security, Nanchang Institute of Technology, Nanchang 330099, China
2School of Information Engineering, Nanchang Institute of Technology, Nanchang 330099, China
3Department of Scientific Research, Nanchang Institute of Technology, Nanchang 330099, China
4Network and Education Technology Center, Jinan University, Guangzhou 510632, China
5Institute of Information Engineering, Chinese Academy of Sciences, National Engineering Laboratory for Information Security Technologies, Beijing 100093, China

Received 1 July 2014; Accepted 11 September 2014; Published 16 November 2014

Academic Editor: Yuxin Mao

Copyright © 2014 Wenfeng Wang et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. S. Ma, “A review on cloud computing development,” Journal of Networks, vol. 7, no. 2, pp. 305–310, 2012. View at Publisher · View at Google Scholar · View at Scopus
  2. S. Misra, P. V. Krishna, K. Kalaiselvan, V. Saritha, and M. S. Obaidat, “Learning automata-based QoS framework for cloud IaaS,” IEEE Transactions on Network and Service Management, vol. 11, no. 1, pp. 15–24, 2014. View at Publisher · View at Google Scholar · View at Scopus
  3. Cloud Storage, 2014, http://en.wikipedia.org/wiki/Cloud_storage.
  4. J. Wu, L. Ping, X. Ge, W. Ya, and J. Fu, “Cloud storage as the infrastructure of cloud computing,” in Proceedings of the International Conference on Intelligent Computing and Cognitive Informatics (ICICCI '10), pp. 380–383, Kuala Lumpur, Malaysia, June 2010. View at Publisher · View at Google Scholar · View at Scopus
  5. L. M. Kaufman, “Data security in the world of cloud computing,” IEEE Security and Privacy, vol. 7, no. 4, pp. 61–64, 2009. View at Publisher · View at Google Scholar · View at Scopus
  6. J. Idziorek and M. Tannian, “Security analysis of public cloud computing,” International Journal of Communication Networks and Distributed Systems, vol. 9, no. 1-2, pp. 4–20, 2012. View at Publisher · View at Google Scholar · View at Scopus
  7. R. Rodrigues and B. Liskov, “High availability in DHTs: erasure coding vs. replication,” in Proceedings of the 4th International Conference on Peer-to-Peer Systems (IPTPS '05), pp. 226–239, Ithaca, NY, USA, 2005. View at Publisher · View at Google Scholar
  8. J. Li and B. Li, “Erasure coding for cloud storage systems: a survey,” Tsinghua Science and Technology, vol. 18, no. 3, pp. 259–272, 2013. View at Publisher · View at Google Scholar · View at Scopus
  9. Y. Ma, T. Nandagopal, K. P. N. Puttaswamy, and S. Banerjee, “An ensemble of replication and erasure codes for cloud file systems,” in Proceedings of the 32nd IEEE Conference on Computer Communications, pp. 1276–1284, April 2013. View at Publisher · View at Google Scholar · View at Scopus
  10. W. Ma, H. Wu, and P. Liu, “Architecture and reliability of cloud storage system mass cloud,” Journal of Hohai University, vol. 39, no. 3, pp. 348–354, 2011 (Chinese). View at Google Scholar
  11. H.-Y. Lin and W.-G. Tzeng, “A secure erasure code-based cloud storage system with secure data forwarding,” IEEE Transactions on Parallel and Distributed Systems, vol. 23, no. 6, pp. 995–1003, 2012. View at Publisher · View at Google Scholar · View at Scopus
  12. D. Chen and Y. He, “A study on secure data storage strategy in cloud computing,” Journal of Convergence Information Technology, vol. 5, no. 7, pp. 175–179, 2010. View at Publisher · View at Google Scholar · View at Scopus
  13. X. Xu, J. Zhou, and G. Yang, “Data privacy protection mechanism for cloud storage based on data partition and classification,” Journal of Computer Science, vol. 40, no. 2, pp. 98–102, 2013 (Chinese). View at Google Scholar
  14. P. Prasad, B. Ojha, R. R. Shahi, R. Lal, A. Vaish, and U. Goel, “3 Dimensional security in cloud computing,” in Proceedings of the 3rd International Conference on Computer Research and Development (ICCRD '11), pp. 198–201, March 2011. View at Publisher · View at Google Scholar · View at Scopus
  15. K. Hwang and D. Li, “Trusted cloud computing with secure resources and data coloring,” IEEE Internet Computing, vol. 14, no. 5, pp. 14–22, 2010. View at Publisher · View at Google Scholar · View at Scopus
  16. K. Yang and X. Jia, “An efficient and secure dynamic auditing protocol for data storage in cloud computing,” IEEE Transactions on Parallel and Distributed Systems, vol. 24, no. 9, pp. 1717–1726, 2013. View at Publisher · View at Google Scholar · View at Scopus
  17. S. K. Sood, “A combined approach to ensure data security in cloud computing,” Journal of Network and Computer Applications, vol. 35, no. 6, pp. 1831–1838, 2012. View at Publisher · View at Google Scholar · View at Scopus