메뉴 건너뛰기




Volumn 12, Issue 3, 2011, Pages 317-336

Secure access mechanism for cloud storage

Author keywords

[No Author keywords available]

Indexed keywords

ACCESS CONTROL MECHANISM; ACCESS CONTROL MODELS; ACCESS MECHANISM; ACCESS MODELS; CLOUD SERVICES; CLOUD SYSTEMS; DELEGATION MECHANISMS; SCALABLE STORAGE; SECURITY AND PERFORMANCE; STORAGE SYSTEMS; USAGE SCENARIOS;

EID: 84865066809     PISSN: 18951767     EISSN: None     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (13)

References (43)
  • 1
    • 0003969633 scopus 로고
    • Trusted computer system evaluation criteria
    • Technical Report DoD 5200.28-STD, Department of Defense, accessed Jan 20, 2010
    • Trusted computer system evaluation criteria. Technical Report DoD 5200.28-STD, Department of Defense, December 1985. http://csrc.nist.gov/publications/history/dod85.pdf, accessed Jan 20, 2010.
    • (1985)
  • 2
    • 84865102630 scopus 로고    scopus 로고
    • Amazon Simple Storage Service Developer Guide (API Version 2006-03-01)
    • Amazon, a, accessed Jan 12
    • Amazon Simple Storage Service Developer Guide (API Version 2006-03-01). Amazon, a. http://docs.amazonwebservices.com/AmazonS3/2006-03-01/, accessed Jan 12, 2010.
    • (2010)
  • 3
    • 67649141016 scopus 로고    scopus 로고
    • Amazon Simple Storage Service (Amazon S3)
    • Amazon, b.
    • Amazon Simple Storage Service (Amazon S3). Amazon, b. http://aws.amazon.com/s3/.
  • 4
    • 68249129760 scopus 로고    scopus 로고
    • Above the clouds: A berkeley view of cloud computing
    • Technical Report UCB/EECS-2009-28, EECS Department, University of California, Berkeley
    • M. Armbrust, A. Fox, R. Griffith, A. D. Joseph, R. Katz, A. Konwinski, G. Lee, D. A. Patterson, A. Rabkin, I. Stoica, and M. Zaharia. Above the clouds: A berkeley view of cloud computing. Technical Report UCB/EECS-2009-28, EECS Department, University of California, Berkeley, February 2009. http://www.eecs.berkeley.edu/Pubs/TechRpts/2009/EECS-2009-28.html.
    • (2009)
    • Armbrust, M.1    Fox, A.2    Griffith, R.3    Joseph, A.D.4    Katz, R.5    Konwinski, A.6    Lee, G.7    Patterson, D.A.8    Rabkin, A.9    Stoica, I.10    Zaharia, M.11
  • 5
    • 0042484568 scopus 로고
    • On the inability of an unmodified capability machine to enforce the *-property
    • W. Boebert. On the inability of an unmodified capability machine to enforce the *-property. In 7th DOD/NBS Computer Security Conference, pages 291-293, 1984.
    • (1984) 7th DOD/NBS Computer Security Conference , pp. 291-293
    • Boebert, W.1
  • 6
    • 0035163054 scopus 로고    scopus 로고
    • Universally composable security: A new paradigm for cryptographic protocols
    • R. Canetti. Universally composable security: A new paradigm for cryptographic protocols. In FOCS, pages 136-145, 2001.
    • (2001) FOCS , pp. 136-145
    • Canetti, R.1
  • 7
    • 84865101490 scopus 로고    scopus 로고
    • ACLs don't
    • T. Close. ACLs don't. http://www.hpl.hp.com/techreports/2009/HPL-2009-20.pdf.
    • Close, T.1
  • 9
    • 84865101104 scopus 로고    scopus 로고
    • Atmos Online Programmer's Guide
    • EMC, a., accessed Jan 12
    • Atmos Online Programmer's Guide. EMC, a. https://community.emc.com/docs/DOC-3481, accessed Jan 12, 2010.
    • (2010)
  • 10
    • 84865091331 scopus 로고    scopus 로고
    • EMC Atmos Online Services
    • EMC, b.
    • EMC Atmos Online Services. EMC, b. http://www.emccis.com/.
  • 13
    • 84963744744 scopus 로고    scopus 로고
    • Principled design of the modern web architecture
    • R. T. Fielding and R. N. Taylor. Principled design of the modern web architecture. ACM Trans. Internet Technol., 2(2): 115-150, May 2002. URL http://dx.doi.org/10.1145/514183.514185.
    • (2002) ACM Trans. Internet Technol. , vol.2 , Issue.2 , pp. 115-150
    • Fielding, R.T.1    Taylor, R.N.2
  • 14
    • 0003691180 scopus 로고    scopus 로고
    • Foundations of Cryptography: Basic Tools
    • Cambridge University Press
    • O. Goldreich. Foundations of Cryptography: Basic Tools. Cambridge University Press, 2000.
    • (2000)
    • Goldreich, O.1
  • 15
    • 47249132115 scopus 로고    scopus 로고
    • Enforcing confinement in distributed storage and a cryptographic model for access control
    • Report 2005/169
    • S. Halevi, P. Karger, and D. Naor. Enforcing confinement in distributed storage and a cryptographic model for access control. Cryptology ePrint Archive, Report 2005/169, 2005. http://eprint.iacr.org/.
    • (2005) Cryptology ePrint Archive
    • Halevi, S.1    Karger, P.2    Naor, D.3
  • 16
    • 77954595043 scopus 로고    scopus 로고
    • The OAuth 1.0 Protocol. Internet Engineering Task Force
    • E. Hammer-Lahav. The OAuth 1.0 Protocol. Internet Engineering Task Force, February 2010. http://tools.ietf.org/html/draft-hammer-oauth-10.
    • (2010)
    • Hammer-Lahav, E.1
  • 17
    • 74349096866 scopus 로고    scopus 로고
    • A RESTful approach to the management of cloud infrastructure
    • CLOUD '09, Washington, DC, USA, IEEE Computer Society. ISBN 978-0-7695-3840-2
    • H. Han, S. Kim, H. Jung, H. Y. Yeom, C. Yoon, J. Park, and Y. Lee. A RESTful approach to the management of cloud infrastructure. In Proceedings of the 2009 IEEE International Conference on Cloud Computing, CLOUD '09, pages 139-142, Washington, DC, USA, 2009. IEEE Computer Society. ISBN 978-0-7695-3840-2. doi: http://dx.doi.org/10.1109/CLOUD.2009.68. URL http://dx.doi.org/10.1109/CLOUD.2009.68.
    • (2009) Proceedings of the 2009 IEEE International Conference on Cloud Computing , pp. 139-142
    • Han, H.1    Kim, S.2    Jung, H.3    Yeom, H.Y.4    Yoon, C.5    Park, J.6    Lee, Y.7
  • 18
    • 33947625881 scopus 로고    scopus 로고
    • Assessment of Access Control Systems
    • NIST IR 7316
    • V. C. Hu, D. F. Ferraiolo, and D. R. Kuhn. Assessment of Access Control Systems. NIST IR 7316, September 2006. csrc.nist.gov/publications/nistir/7316/NISTIR-7316.pdf.
    • (2006)
    • Hu, V.C.1    Ferraiolo, D.F.2    Kuhn, D.R.3
  • 19
    • 18844441915 scopus 로고    scopus 로고
    • Fileteller: Paying and getting paid for file storage
    • M. Blaze, editor, volume 2357 of Lecture Notes in Computer Science, Springer, ISBN 3-540-00646-X
    • J. Ioannidis, S. Ioannidis, A. D. Keromytis, and V. Prevelakis. Fileteller: Paying and getting paid for file storage. In M. Blaze, editor, Financial Cryptography, volume 2357 of Lecture Notes in Computer Science, pages 282-299. Springer, 2002. ISBN 3-540-00646-X.
    • (2002) Financial Cryptography , pp. 282-299
    • Ioannidis, J.1    Ioannidis, S.2    Keromytis, A.D.3    Prevelakis, V.4
  • 20
    • 0038253143 scopus 로고
    • Improving security and performance for capability systems
    • ph.d. dissertation. Technical Report 149, Cambridge, England
    • P. Karger. Improving security and performance for capability systems, ph.d. dissertation. Technical Report 149, Cambridge, England, 1988.
    • (1988)
    • Karger, P.1
  • 21
    • 0021197579 scopus 로고
    • An augmented capability architecture to support lattice security and traceability of access
    • P. Karger and A. Herbert. An augmented capability architecture to support lattice security and traceability of access. In IEEE Symposium on Security and Privacy, pages 2-12, 1984.
    • (1984) IEEE Symposium on Security and Privacy , pp. 2-12
    • Karger, P.1    Herbert, A.2
  • 22
    • 0015672289 scopus 로고
    • A note on the confinement problem
    • B. Lampson. A note on the confinement problem. Commun. ACM, 16(10):613-615, 1973.
    • (1973) Commun. ACM , vol.16 , Issue.10 , pp. 613-615
    • Lampson, B.1
  • 23
    • 56749107608 scopus 로고    scopus 로고
    • Scalable security for petascale parallel file systems
    • New York, NY, USA, ACM. ISBN 978-1-59593-764-3. doi:
    • A. W. Leung, E. L. Miller, and S. Jones. Scalable security for petascale parallel file systems. In SC '07: Proceedings of the 2007 ACM/IEEE conference on Supercomputing, pages 1-12, New York, NY, USA, 2007. ACM. ISBN 978-1-59593-764-3. doi: http://doi.acm.org/10.1145/1362622.1362644.
    • (2007) SC '07: Proceedings of the 2007 ACM/IEEE conference on Supercomputing , pp. 1-12
    • Leung, A.W.1    Miller, E.L.2    Jones, S.3
  • 24
    • 49449108308 scopus 로고    scopus 로고
    • WebDAVA: An administrator-free approach to web file-sharing
    • IEEE Computer Society, ISBN 0-7695-1963-6.
    • A. Levine, V. Prevelakis, J. Ioannidis, S. Ioannidis, and A. D. Keromytis. WebDAVA: An administrator-free approach to web file-sharing. In WETICE, pages 59-64. IEEE Computer Society, 2003. ISBN 0-7695-1963-6.
    • (2003) WETICE
    • Levine, A.1    Prevelakis, V.2    Ioannidis, J.3    Ioannidis, S.4    Keromytis, A.D.5
  • 25
    • 84865067360 scopus 로고    scopus 로고
    • Are security issues delaying adoption of cloud computing?
    • accessed Jan 21, 2010
    • E. Messmer. Are security issues delaying adoption of cloud computing? Network World, April 2009. http://www.networkworld.com/news/2009/042709-burning-security-cloud-computing.html, accessed Jan 21, 2010.
    • (2009) Network World
    • Messmer, E.1
  • 26
    • 78649988138 scopus 로고    scopus 로고
    • Windows Azure Platform
    • Microsoft, a.
    • Windows Azure Platform. Microsoft, a. http://www.microsoft.com/windowsazure/windowsazure/.
  • 27
    • 84865064401 scopus 로고    scopus 로고
    • Windows Azure Storage Services API Reference
    • Microsoft Corp., b, accessed Jan 17
    • Windows Azure Storage Services API Reference. Microsoft Corp., b. http://msdn.microsoft.com/en-us/library/dd179355.aspx, accessed Jan 17, 2010.
    • (2010)
  • 29
    • 49449117747 scopus 로고    scopus 로고
    • Ioannidis. Decentralized access control in distributed file systems
    • ISSN 0360-0300. doi:
    • S. Miltchev, J. M. Smith, V. Prevelakis, A. Keromytis, and S. Ioannidis. Decentralized access control in distributed file systems. ACM Comput. Surv., 40(3):1-30, 2008. ISSN 0360-0300. doi: http://doi.acm.org/10.1145/1380584.1380588.
    • (2008) ACM Comput. Surv. , vol.40 , Issue.3 , pp. 1-30
    • Miltchev, S.1    Smith, J.M.2    Prevelakis, V.3    Keromytis, A.4    Ioannidis, S.5
  • 30
    • 84865106752 scopus 로고    scopus 로고
    • Cloud storage triggers security worries.
    • accessed Jan 21, 2010.
    • R. L. Mitchel. Cloud storage triggers security worries. Computerworld, July 2009. http://www.computerworld.com/s/article/340438/ Confidence_in_the_Cloud, accessed Jan 21, 2010.
    • (2009) Computerworld
    • Mitchel, R.L.1
  • 32
    • 84865079526 scopus 로고    scopus 로고
    • Nirvanix Web Services API Developer's Guide
    • Nirvanix, a., accessed Jan 13
    • Nirvanix Web Services API Developer's Guide. Nirvanix, a. http://developer.nirvanix.com/sitefiles/1000/API.html, accessed Jan 13, 2010.
    • (2010)
  • 33
    • 84865102627 scopus 로고    scopus 로고
    • Nirvanix Storage Delivery Network
    • Nirvanix, b.
    • Nirvanix Storage Delivery Network. Nirvanix, b. http://www.nirvanix.com/.
  • 34
    • 70449433284 scopus 로고    scopus 로고
    • Identification and authentication in large-scale storage systems
    • International Conference on, 0:421-427
    • Z. Niu, H. Jiang, K. Zhou, T. Yang, and W. Yan. Identification and authentication in large-scale storage systems. Networking, Architecture, and Storage, International Conference on, 0:421-427, 2009.
    • (2009) Networking, Architecture, and Storage
    • Niu, Z.1    Jiang, H.2    Zhou, K.3    Yang, T.4    Yan, W.5
  • 35
    • 84865101492 scopus 로고    scopus 로고
    • ParaScale Storage Cloud Supports Virtual File System
    • ParaScale Storage Cloud Supports Virtual File System. ParaScale. http://www.parascale.com/index.php/products/data-access-security.
    • ParaScale
  • 36
    • 57349153899 scopus 로고    scopus 로고
    • Restful web services vs. "big"' web services: making the right architectural decision
    • WWW '08, New York, NY, USA, ACM. ISBN 978-1-60558-085-2.
    • C. Pautasso, O. Zimmermann, and F. Leymann. Restful web services vs. "big"' web services: making the right architectural decision. In Proceeding of the 17th international conference on World Wide Web, WWW '08, pages 805-814, New York, NY, USA, 2008. ACM. ISBN 978-1-60558-085-2. doi: http://doi.acm.org/10.1145/1367497.1367606. URL http://doi.acm.org/10.1145/1367497.1367606.
    • (2008) Proceeding of the 17th international conference on World Wide Web , pp. 805-814
    • Pautasso, C.1    Zimmermann, O.2    Leymann, F.3
  • 37
    • 84865065239 scopus 로고    scopus 로고
    • The Rackspace Cloud: Cloud Files
    • The Rackspace Cloud: Cloud Files. Rackspace. http://www.rackspacecloud.com/cloud_hosting_products/files/.
  • 38
    • 79952045295 scopus 로고    scopus 로고
    • Security Assertion Markup Language (SAML) V2.0 Technical Overview
    • N. Ragouzis, J. Hughes, R. Philpott, E. Maler, P. Madsen, and T. Scavo. Security Assertion Markup Language (SAML) V2.0 Technical Overview. OASIS Committee Draft, March 2008. http://www.oasis-open.org/committees/download.php/27819/sstc-saml-tech-overview-2.0-cd-02.pdf.
    • (2008) OASIS Committee Draft
    • Ragouzis, N.1    Hughes, J.2    Philpott, R.3    Maler, E.4    Madsen, P.5    Scavo, T.6
  • 39
    • 0033906295 scopus 로고    scopus 로고
    • Authenticating network-attached storage
    • ISSN 0272-1732. doi:
    • B. C. Reed, E. G. Chron, R. C. Burns, and D. D. Long. Authenticating network-attached storage. IEEE Micro, 20:49-57, 2000. ISSN 0272-1732. doi: http://doi.ieeecomputersociety.org/10.1109/40.820053.
    • (2000) IEEE Micro , vol.20 , pp. 49-57
    • Reed, B.C.1    Chron, E.G.2    Burns, R.C.3    Long, D.D.4
  • 40
    • 0016555241 scopus 로고
    • The protection of information in computer systems
    • J. H. Saltzer and M. D. Schroeder. The protection of information in computer systems. In Proc. IEEE, 63(9):1278-1308, 1975. http://web.mit.edu/Saltzer/www/publications/protection.
    • (1975) Proc. IEEE , vol.63 , Issue.9 , pp. 1278-1308
    • Saltzer, J.H.1    Schroeder, M.D.2
  • 41
    • 78651556127 scopus 로고    scopus 로고
    • Eventually consistent
    • ISSN 1542-7730
    • W. Vogels. Eventually consistent. Queue, 6(6):14-19, 2008. ISSN 1542-7730.
    • (2008) Queue , vol.6 , Issue.6 , pp. 14-19
    • Vogels, W.1
  • 42
    • 85038881415 scopus 로고    scopus 로고
    • Ceph: A scalable, high-performance distributed file system
    • USENIX Association
    • S. A. Weil, S. A. Brandt, E. L. Miller, D. D. E. Long, and C. Maltzahn. Ceph: A scalable, high-performance distributed file system. In OSDI, pages 307-320. USENIX Association, 2006.
    • (2006) OSDI , pp. 307-320
    • Weil, S.A.1    Brandt, S.A.2    Miller, E.L.3    Long, D.D.E.4    Maltzahn, C.5
  • 43
    • 84865101491 scopus 로고    scopus 로고
    • Security is chief obstacle to cloud computing adoption, study says
    • accessed Jan 21, 2010
    • T. Wilson. Security is chief obstacle to cloud computing adoption, study says. DarkReading: Security, November 2009. http://www.darkreading.com/securityservices/security/perimeter/showArticle.jhtml?articleID=221901195, accessed Jan 21, 2010.
    • (2009) DarkReading: Security
    • Wilson, T.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.