Annotated Bibliography No.6

Study on Data Security Policy Based On Cloud Storage

Zhe, D., Qinghong, W., Naizheng, S., & Yuhan, Z. (2017, May). Study on data security policy based on cloud storage. In 2017 ieee 3rd international conference on big data security on cloud (bigdatasecurity), ieee international conference on high performance and smart computing (hpsc), and ieee international conference on intelligent data and security (ids) (pp. 145-149). IEEE.

 

The purpose of this paper is to realize the data security of cloud storage and formulate corresponding cloud storage security policies. The author firstly analyzes the security risks of user data in cloud storage based on the existing academic research results, and proposes related security technology topics according to the structural characteristics of cloud storage systems. Aiming at the characteristics and security issues of cloud storage systems, this paper proposes an online distributed storage system with cloud storage as the core, and discusses them at different levels. When users store data, the cloud storage system processes the accessed data through chips, and then transmits the data to storage media distributed in different places. When a user reads data, after passing client authentication, the virtual view provided by the storage manager distributed in different places completes the reading operation. Compared with the previous discussion on cloud storage security, this article is obviously Insufficient depth, the technical discussion level is superficial and needs to be strengthened.

 

The Management of Security in Cloud Computing

Ramgovind, S., Eloff, M. M., & Smith, E. (2010, August). The management of security in cloud computing. In 2010 Information Security for South Africa (pp. 1-7). IEEE.

 

This article discusses and highlights the security issues that should be properly addressed and managed from a holistic security perspective in cloud computing. Gartner’s list of cloud security issues is the focus of this article. The main body of the article is the analysis of the following aspects: Privileged access; Regulatory compliance; Data location; Data segregation; Recovery; Investigative Support. The article explains how cloud computing security is guaranteed by asking questions and answering these aspects, evaluating, planning, implementing and evaluating customers’ needs for cloud computing. Finally, combined with the structure of cloud computing, it proves that cloud computing provides data for the market environment by providing data Storage and capacity and flexible and scalable computing processing power to match elastic demand and supply, while reducing capital expenditures. The analysis in this article has some effects, but it overlaps with mainstream content and does not highlight its own advantages.

Leave a Reply

Your email address will not be published. Required fields are marked *