RESEARCH ON FLEXIBLE AND VERIFIABLE SECURITY PROTOCOLS IN CLOUD COMPUTING ENVIRONMENTS
Volume 6, Issue 3, Pp 1-7, 2024
DOI: 10.61784/jcsee3009
Author(s)
XiaoYin Yi1,2*, Qian Huang3
Affiliation(s)
1Chongqing Key Laboratory of Public Big Data Security Technology, Qijiang 401420, Chongqing, China.
2Chongqing College of Mobile Communication, Qijiang 401420, Chongqing, China.
3Chongqing Polytechnic University of Electronic Technology, Shapingba401331, Chongqing,China.
Corresponding Author
XiaoYin Yi
ABSTRACT
With the rapid development of cloud computing technology, an increasing number of enterprises and individuals are migrating their data and applications to cloud environments. Although cloud computing offers convenient services and flexible resource management, security issues remain a primary concern for users. This paper explores flexible and verifiable security protocols in cloud environments with the aim of enhancing data security and user trust. By analyzing and improving existing security protocols, a novel security protocol framework is proposed and experimentally validated. The results indicate that this framework demonstrates significant advantages in both flexibility and security.
KEYWORDS
Cloud Storage; Data Integrity; Hierarchical Merkle Tree; Multi-Grained
CITE THIS PAPER
XiaoYin Yi, Qian Huang. Research on flexible and verifiable security protocols in cloud computing environments. Journal of Computer Science and Electrical Engineering. 2024, 6(3): 1-7. DOI: 10.61784/jcsee3009.
REFERENCES
[1] Yue Ru. Research on Data Storage and Management Technology in Cloud Computing Environment. Science and Technology Information, 2023, 21(21): 29-32.
[2] Dhakad N, Kar J. EPPDP: An Efficient Privacy-Preserving Data Possession With Provable Security in Cloud Storage. IEEE Systems Journal, 2022, 16(4): 6658-6668.
[3] Li Hao, Zhang Qian, Wang Lei. A Hybrid Approach for Cloud Data Integrity Verification Based on Blockchain Technology. Future Generation Computer Systems, 2022, 128: 542-556.
[4] Sun Xize, Zhou Fucai, Li Yuxi, et al. A Database Encryption Scheme Based on Searchable Encryption Mechanism. Journal of Computer Research and Development, 2021, 44(4): 806-819.
[5] Ding Y, Li Y, Yang W, et al. Edge Data Integrity Verification Scheme Supporting Data Dynamics and Batch Auditing. Journal of Systems Architecture, 2022, 128: 128.
[6] Hou Huiying, Ning Jianting, Huang Xinyi, et al. Verifiable Attribute-Based Timed Signature Scheme and Its Application. Journal of Software, 2023, 34(5): 2465-2481.