2017
DOI: 10.1002/cpe.4177
|View full text |Cite
|
Sign up to set email alerts
|

Towards a fast and secure design for enterprise‐oriented cloud storage systems

Abstract: Summary With the rapid development of information technology, enormous volumes of data are being generated by enterprises at all times. The management and storage of these large‐scale data have always been challenging enterprises. As these data are usually shared among users in a collaborative manner, secure data access and access performance are 2 key concerns for data storage of enterprises. However, current solutions fail to meet the requirements of enterprises since they suffer from the following drawbacks… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
13
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
4
3

Relationship

1
6

Authors

Journals

citations
Cited by 25 publications
(16 citation statements)
references
References 24 publications
(35 reference statements)
0
13
0
Order By: Relevance
“…Supply chain entities require significant trust for relying on one single organisation or broker for storing their sensitive and valuable information (Abeyratne and Monfared 2016). Single point failure is another disadvantage of centralised information systems which leaves the whole system vulnerable to error, hacking, corruption, or attack (Dong et al 2017).…”
Section: Introductionmentioning
confidence: 99%
“…Supply chain entities require significant trust for relying on one single organisation or broker for storing their sensitive and valuable information (Abeyratne and Monfared 2016). Single point failure is another disadvantage of centralised information systems which leaves the whole system vulnerable to error, hacking, corruption, or attack (Dong et al 2017).…”
Section: Introductionmentioning
confidence: 99%
“…Safety of the data is another issue: the majority of supply chains rely on centralised information systems such as enterprise resource planning. Centralised information systems like these leaves the entire system exposed to error, hacking or attack (Dong, Zhou, Liu, Shen, Xu and Luo, 2017 Blockchain -a distributed digital ledger technology -ensures traceability, transparency, and security; it is showing some potential promises in terms of easing some supply chain problems (Mendling, Weber, van der Aalst, Brocke, Cabanillas, Daniel and Dustdar, 2017).…”
Section: Introductionmentioning
confidence: 99%
“…Safety of the data is another issue: the majority of supply chains rely on centralised information systems such as enterprise resource planning. Centralised information systems like these leaves the entire system exposed to error, hacking or attack (Dong et al, 2017).…”
Section: Introductionmentioning
confidence: 99%
“…For simplicity, we create one manual and one automated training set. We obtain the training set automatically using the multi‐level counting bloom filter (MlCBF) algorithm discussed in a previous paper of ours. The multi‐level counting bloom filter (MlCBF) contains some vectors which can search data rapidly, similar as the design shown in Figure , while all the vectors just need not too much space to store.…”
Section: The Devices Grouping and Data Location Algorithmmentioning
confidence: 99%