Secure Storage of Network Data Information Based on Cloud Computing Data Encryption Techniques


Qiaoling Long, Journal of Information Processing Systems Vol. 21, No. 4, pp. 392-400, Aug. 2025  

https://doi.org/10.3745/JIPS.03.0207
Keywords: Cloud computing, Data encryption, Data storage, Dual Encryption
Fulltext:

Abstract

In a cloud computing environment, frequent data interactions require high information security. This paper briefly overviews encrypted data storage in the cloud computing environment. A dual encryption scheme that combined identity attributes and security devices was proposed. The scheme was evaluated through simulation experiments conducted on a laboratory server. The results indicated that an increase in the size of the storage file led to an increase in the time overhead of the encryption scheme. Furthermore, the dual encryption scheme exhibited slightly higher time overhead than a single security device encryption scheme, but was similar to a single identity attribute-based encryption scheme. For cloud storage data, the successful queries of encrypted data and effective resistance against third-party attacks were only achieved when the number of overlapping identity attributes was 5, which was the same as the storage user.


Statistics
Show / Hide Statistics

Statistics (Cumulative Counts from November 1st, 2017)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.




Cite this article
[APA Style]
Long, Q. (2025). Secure Storage of Network Data Information Based on Cloud Computing Data Encryption Techniques. Journal of Information Processing Systems, 21(4), 392-400. DOI: 10.3745/JIPS.03.0207.

[IEEE Style]
Q. Long, "Secure Storage of Network Data Information Based on Cloud Computing Data Encryption Techniques," Journal of Information Processing Systems, vol. 21, no. 4, pp. 392-400, 2025. DOI: 10.3745/JIPS.03.0207.

[ACM Style]
Qiaoling Long. 2025. Secure Storage of Network Data Information Based on Cloud Computing Data Encryption Techniques. Journal of Information Processing Systems, 21, 4, (2025), 392-400. DOI: 10.3745/JIPS.03.0207.