Science, Technology, Engineering and Mathematics.
Open Access

RESEARCH ON FLEXIBLE AND VERIFIABLE SECURITY PROTOCOLS IN CLOUD COMPUTING ENVIRONMENTS

Download as PDF

Volume 6, Issue 3, Pp 1-7, 2024

DOI: 10.61784/jcsee3009

Author(s)

XiaoYin Yi1,2*, Qian Huang3

Affiliation(s)

1Chongqing Key Laboratory of Public Big Data Security Technology, Qijiang 401420, Chongqing, China.

2Chongqing College of Mobile Communication, Qijiang 401420, Chongqing, China.

3Chongqing Polytechnic University of Electronic Technology, Shapingba401331, Chongqing,China.

Corresponding Author

XiaoYin Yi

ABSTRACT

With the rapid development of cloud computing technology, an increasing number of enterprises and individuals are migrating their data and applications to cloud environments. Although cloud computing offers convenient services and flexible resource management, security issues remain a primary concern for users. This paper explores flexible and verifiable security protocols in cloud environments with the aim of enhancing data security and user trust. By analyzing and improving existing security protocols, a novel security protocol framework is proposed and experimentally validated. The results indicate that this framework demonstrates significant advantages in both flexibility and security.

KEYWORDS

Cloud Storage; Data Integrity; Hierarchical Merkle Tree; Multi-Grained

CITE THIS PAPER

XiaoYin Yi, Qian Huang. Research on flexible and verifiable security protocols in cloud computing environments. Journal of Computer Science and Electrical Engineering. 2024, 6(3): 1-7. DOI: 10.61784/jcsee3009.

REFERENCES

[1] Yue Ru. Research on Data Storage and Management Technology in Cloud Computing Environment. Science and Technology Information, 2023, 21(21): 29-32.

[2] Dhakad N, Kar J. EPPDP: An Efficient Privacy-Preserving Data Possession With Provable Security in Cloud Storage. IEEE Systems Journal, 2022, 16(4): 6658-6668.

[3] Li Hao, Zhang Qian, Wang Lei. A Hybrid Approach for Cloud Data Integrity Verification Based on Blockchain Technology. Future Generation Computer Systems, 2022, 128: 542-556.

[4] Sun Xize, Zhou Fucai, Li Yuxi, et al. A Database Encryption Scheme Based on Searchable Encryption Mechanism. Journal of Computer Research and Development, 2021, 44(4): 806-819.

[5] Ding Y, Li Y, Yang W, et al. Edge Data Integrity Verification Scheme Supporting Data Dynamics and Batch Auditing. Journal of Systems Architecture, 2022, 128: 128.

[6] Hou Huiying, Ning Jianting, Huang Xinyi, et al. Verifiable Attribute-Based Timed Signature Scheme and Its Application. Journal of Software, 2023, 34(5): 2465-2481. 

All published work is licensed under a Creative Commons Attribution 4.0 International License. sitemap
Copyright © 2017 - 2024 Science, Technology, Engineering and Mathematics.   All Rights Reserved.