Abstract

AbstractWith the development of cloud storage technology, more and more users choose to store data in the cloud. Cloud storage technology saves users’ local storage space, but users lose absolute control over data, which also leads to some cloud storage data security-related issues. Based on the cloud storage application architecture, this paper provides the complete solution for cloud storage data in three ways: first, access control, prevents the intrusion of illegal users or the damage caused by the careless operation of legitimate users; second, integrity audit, ensures that the data is truly and completely stored in the cloud; third, data encryption, protects the data in network transmission and cloud storage. In the actual application process, the three technologies need to be combined to achieve the ideal data security effect.KeywordsCloud storageData securityAccess controlIntegrity auditData encryption

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.