{"title":"A View about Cloud Data Security from Data Life Cycle","authors":"Xiaojun Yu, Q. Wen","doi":"10.1109/CISE.2010.5676895","DOIUrl":null,"url":null,"abstract":"Data security has become one of core problems of cloud computing. Many security solutions have been proposed, however, most of them only focus one stage of data life cycle, such as storage stage, which is not enough to solve cloud data security problem as threats exist in whole data life cycle. In this paper, we argue that the cloud data security problem should be solved form data life cycle. After detail analysis of data life cycle model and data security threats, a suggested design process of data security solution is given. The proposed idea is simple but important to create the complete security solution to cloud data security.","PeriodicalId":232832,"journal":{"name":"2010 International Conference on Computational Intelligence and Software Engineering","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2010-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"78","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2010 International Conference on Computational Intelligence and Software Engineering","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CISE.2010.5676895","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 78
Abstract
Data security has become one of core problems of cloud computing. Many security solutions have been proposed, however, most of them only focus one stage of data life cycle, such as storage stage, which is not enough to solve cloud data security problem as threats exist in whole data life cycle. In this paper, we argue that the cloud data security problem should be solved form data life cycle. After detail analysis of data life cycle model and data security threats, a suggested design process of data security solution is given. The proposed idea is simple but important to create the complete security solution to cloud data security.