ZTE Communications ›› 2013, Vol. 11 ›› Issue (4): 27-31.doi: DOI:10.3969/j.issn.1673-5188.2013.04.004

• Special Topic • Previous Articles     Next Articles

Preventing Data Leakage in a Cloud Environment

Fuzhi Cang, Mingxing Zhang, Yongwei Wu, and Weimin Zheng   

  1. Department of Computer Science and Technology, Tsinghua National Laboratory for Information Science and Technology Tsinghua University, Beijing 100084, China
  • Received:2013-10-10 Online:2013-12-25 Published:2013-12-25
  • About author:Fuzhi Cang (cfz05@mails.tsinghua.edu.cn) received his BE degree in computer science and technology from Tsinghua University in 2009. He is currently a MS candidate in Department of Computer Science and Technology, Tsinghua University, China. His research interests include distributed systems and cloud security.

    Mingxing Zhang (zhangmx12@mails.tsinghua.edu.cn) received his BS degree in computer science and technology from Beijing University of Posts and Telecommunications in 2012. He is currently a PhD student in computer science at Tsinghua University, China. His research interests include distributed and parallel systems.

    Yongwei Wu (wuyw@tsinghua.edu.cn) received his PhD degree in applied mathematics from the Chinese Academy of Sciences in 2002. He is currently a professor in computer science and technology at Tsinghua University, China. His research interests include parallel and distributed processing, and cloud storage. Dr. Wu has published more than 80 research papers and has received two Best Paper Awards. He is currently on the editorial board of the International Journal of Networked and Distributed Computing and Communication of China Computer Federation. He is an IEEE member.

    Weimin Zheng (zwm-dcs@tsinghua.edu.cn) is a professor of computer science and technology at Tsinghua University, China. He received his BS degree and MS degree from Tsinghua University in 1970 and 1982. He is currently the director of the Chinese Computer Society. His research interests include computer architecture, operating systems, storage networks, and distributed computing. He is a senior member of the IEEE.

Abstract: Despite the multifaceted advantages of cloud computing, concerns about data leakage or abuse impedes its adoption for security-sensitive tasks. Recent investigations have revealed that the risk of unauthorized data access is one of the biggest concerns of users of cloud-based services. Transparency and accountability for data managed in the cloud is necessary. Specifically, when using a cloudhost service, a user typically has to trust both the cloud service provider and cloud infrastructure provider to properly handling private data. This is a multi-party system. Three particular trust models can be used according to the credibility of these providers. This paper describes techniques for preventing data leakage that can be used with these different models.

Key words: cloud computing, data leakage, data tracking, data provenance, homomorphic encryption