{"title":"一种基于上下文感知的按需云存储方案","authors":"R. Xie, Xiao Liu, Jinpo Fan, Guozhen Shi","doi":"10.1109/IICSPI48186.2019.9095908","DOIUrl":null,"url":null,"abstract":"To protect the confidentiality, integrity and privacy of users' data in cloud storage, a hierarchical cloud storage scheme based on environment features is proposed. The scheme maps the relationship between user attributes, data encryption security requirements, operating environment and data security storage levels. The hierarchical cloud storage addressed twice is realized. Firstly, the starting address of storage area corresponding to user data is determined according to the data security requirement level. Secondly, the data address offset is calculated through the data attribute set and account information set, and finally the hierarchical cloud storage of data is realized. Experimental results show that users' security requirements are met and security is improved, providing a solution for the implementation of cloud storage.","PeriodicalId":318693,"journal":{"name":"2019 2nd International Conference on Safety Produce Informatization (IICSPI)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"An on-demand cloud storage scheme based on context aware\",\"authors\":\"R. Xie, Xiao Liu, Jinpo Fan, Guozhen Shi\",\"doi\":\"10.1109/IICSPI48186.2019.9095908\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"To protect the confidentiality, integrity and privacy of users' data in cloud storage, a hierarchical cloud storage scheme based on environment features is proposed. The scheme maps the relationship between user attributes, data encryption security requirements, operating environment and data security storage levels. The hierarchical cloud storage addressed twice is realized. Firstly, the starting address of storage area corresponding to user data is determined according to the data security requirement level. Secondly, the data address offset is calculated through the data attribute set and account information set, and finally the hierarchical cloud storage of data is realized. Experimental results show that users' security requirements are met and security is improved, providing a solution for the implementation of cloud storage.\",\"PeriodicalId\":318693,\"journal\":{\"name\":\"2019 2nd International Conference on Safety Produce Informatization (IICSPI)\",\"volume\":\"36 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2019-11-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2019 2nd International Conference on Safety Produce Informatization (IICSPI)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/IICSPI48186.2019.9095908\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 2nd International Conference on Safety Produce Informatization (IICSPI)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IICSPI48186.2019.9095908","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
An on-demand cloud storage scheme based on context aware
To protect the confidentiality, integrity and privacy of users' data in cloud storage, a hierarchical cloud storage scheme based on environment features is proposed. The scheme maps the relationship between user attributes, data encryption security requirements, operating environment and data security storage levels. The hierarchical cloud storage addressed twice is realized. Firstly, the starting address of storage area corresponding to user data is determined according to the data security requirement level. Secondly, the data address offset is calculated through the data attribute set and account information set, and finally the hierarchical cloud storage of data is realized. Experimental results show that users' security requirements are met and security is improved, providing a solution for the implementation of cloud storage.