Cloud Storage Device Mechanisms: A Comprehensive Report on Research

Verified

Added on  2022/08/27

|4
|695
|56
Report
AI Summary
This report reviews the research article by Liu et al. (2015) which focuses on a two-factor data security protection mechanism for cloud storage. The article proposes a system where a sender can encrypt data and send it to a receiver via a cloud storage network. The report highlights the importance of data security in cloud computing and discusses the use of identity-based encryption (IBE) and public key encryption (PKE) for secure communication. The mechanism involves the use of a secret key and a security device to access the encrypted data. The article's strength lies in its mathematical calculations and its proposal to increase information privacy and tool revocability. The report emphasizes the two-factor security and security device revocability, showing that the proposed framework achieves these without excessive complexity. The researcher used two encryption techniques IBE and PKE and also presented an innovative two-factor information security safety tool for the cloud loading method.
Document Page
Running head: CLOUD STORAGE DEVICE MECHANISMS
CLOUD STORAGE DEVICE MECHANISMS
Name of the Student:
Name of the University:
Author’s Note:
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
1CLOUD STORAGE DEVICE MECHANISMS
Article review:-
This mechanism signifies storage devices that are considered explicitly for cloud-based
provisioning. This term contains stashing information on hardware in a problematic physical
position, which can be retrieved from any tools through the internet. This research article by Liu
et al., (2015) develops the concept of the Two-Factor Information Safety Shielding Mechanism
for Cloud Storage process. The researcher proposed a system permits a source to direct an
encoded communication to a receiver over a cloud storing network.
According to this research article Liu et al., (2015), the report writer can states that the
information kept in the cloud can be retrieved at any moment from several location as extended
as there is system admittance. As cloud computing develops a more established technique and
there will be more use and storing facilities delivered by the system, it is stress-free to predict
that the safety for data safety in the cloud must be additional improvement. In this research
paper, Liu et al., (2015) based on the one machine, and this mechanism is “Identity based
encryption.” This paper state that for this mechanism, the operator wants to take their secret
indications, which is kept on the processor. For this system, the operator wants to take an
exceptional individual safety method that will be applied to link to the processor.
This research article Liu et al., (2015) deliver a valuation of the running period of the
human model to display its practicality, applying specific standard outcomes. This article also
develops some basic entities which can be related to the cloud device storage mechanism. The
researcher’s discussed entities are cloud server, sender, receiver, etc. The researcher provides a
picture to demonstrate the data sharing process between two people. According to the article, the
report writer can say that the security device and primary key are essential for recovering a piece
Document Page
2CLOUD STORAGE DEVICE MECHANISMS
of information from its encoded design. In the threat model section of this research paper, Liu et
al., (2015) develop some mathematical calculations and equations. This mathematical evaluation
is the most significant positive point of this paper.
The researcher of this article Liu et al., (2015), leverage two several encryption skills
such as IBE and PKE. In this scenario, the researcher first permits an operator to create a first-
level cryptographic program in a receiver’s characteristics. The cryptographic text will be more
distorted into a next step cryptographic text equivalent to a safety device. In this article, the
researcher presented an innovative two-factor information security safety tool for the cloud
loading method, in which an information transmitter is permissible to encode the information
with an uniqueness of a receiver understandings.
However, it is mandatory to apply both their secretive key and safety method to increase
contact to the information. Finally, this research Liu et al., (2015) explanation not only increases
the information privacy but also proposes the tools revocability so that after the method is
retracted. The consistent cipher text must be reorganized mechanically by the network, deprived
of several notification of the information possessor. In conclusion, the researcher can realize that
their proposed structure reaches two factors safety and security device revocability without
demanding an excessive quantity of additional difficulty.
Document Page
3CLOUD STORAGE DEVICE MECHANISMS
References:-
Liu, J. K., Liang, K., Susilo, W., Liu, J., & Xiang, Y. (2015). Two-factor data security protection
mechanism for cloud storage system. IEEE Transactions on Computers, 65(6), 1992-
2004.
chevron_up_icon
1 out of 4
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]