Cloud Data Storage Security – A Review Issues & Challenges

International Journal of Computer Science (IJCS Journal) Published by SK Research Group of Companies (SKRGC) Scholarly Peer Reviewed Research Journals

Format: Volume 4, Issue 1, No 1, 2016.

Copyright: All Rights Reserved ©2016

Year of Publication: 2016

Author: Jayant Kumar,Asst.Prof.Nitin Agarwal

Reference:IJCS-110

View PDF Format

Abstract

Here in this paper a complete survey of all the techniques used for the security of cloud data storage is analyzed and discussed. Since various techniques are already implemented for the security and privacy of cloud data in terms of attacks, computational cost and privacy preservation. So here a complete set of survey and review is done on these techniques so that a new and efficient technique is implemented in future.

References

[1] Cloud Security Alliance, “Top Threats to Cloud Computing,” http://www.cloudsecurityalliance.org, 2010. [2] Kui Ren, Cong Wang and Qian Wang, “Toward Secure and Effective Data Utilization in Public Cloud”, IEEE Network, November/December 2012. [3] Cong Wang, Sherman S.M. Chow, Qian Wang, Kui Ren, and Wenjing Lou, ” Privacy-Preserving Public Auditing for Secure Cloud Storage”, IEEE Transactions on Computers, Vol. 62, No. 2, February 2013. [4] N. Cao, C. Wang, M. Li, K. Ren, and W. Lou, “Privacy-Preserving Multikeyword Ranked Search over Encrypted Cloud Data,” Proc.IEEE INFOCOM, 2011. [5] H. Hu, J. Xu, C. Ren, and B. Choi, “Processing Private Queries over Untrusted Data Cloud through Privacy Homomorphism,” Proc. IEEE 27th Int’l Conf. Data Eng. (ICDE), 2011. [6] L. M. Vaquero, L. Rodero-Merino, J. Caceres, and M. Lindner. A break in the clouds: towards a cloud definition. SIGCOMM Comput. Commun. Rev., 39:50{55, December 2008. [7] Everaldo Aguiar, Yihua Zhang, and Marina Blanton, “An Overview of Issues and Recent Developments in Cloud Computing and Storage Security” 2012. [8] Jiadi Yu, Peng Lu, Yanmin Zhu, Guangtao Xue and Minglu Li, “Toward Secure Multi-keyword Top-k Retrieval over Encrypted Cloud Data” IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, VOL. 10, NO. 4, JULY/AUGUST 2013. [9] Cong Wang, NingCao, JinLi, KuiRen, and Wenjing Lou, “Secure Ranked Keyword Search over Encrypted Cloud Data” 2011. [10] Cong Wang, Sherman S.M. Chow, Qian Wang, Kui Ren, and Wenjing Lou, “Privacy-Preserving Public Auditing for Secure Cloud Storage” IEEE TRANSACTIONS ON COMPUTERS, VOL. 62, NO. 2, FEBRUARY 2013. [11] Mukil Kesavan, Irfan Ahmad, Orran Krieger, Ravi Soundararajan, “Practical Compute Capacity Management for Virtualized Data Centers” IEEE TRANSACTIONS ON CLOUD COMPUTING, VOL. 1, NO. 1, JANUARY-JUNE 2013. [12] Ning Caoy, Cong Wangz, Ming Li, Kui Renz and Wenjing Lou, “Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data” 2010. [13] Hussain Abo Surrah, “Multi Keyword Retrieval On Secured Cloud” Asian Journal of Technology & Management Research ISSN: 2249 –0892 Vol. 04 – Issue: 01 Jan – Jun 2014. [14] Cloud Security Alliance. «Security Guidance for Critical Areas of Focus in Cloud Computing.» April 2009. http://www.cloudsecurityalliance.org/guidance/csaguide.pdf.


Keywords

Cloud Computing, Cloud Security, Data Storage, Multi Keywords.

This work is licensed under a Creative Commons Attribution 3.0 Unported License.   

TOP
Facebook IconYouTube IconTwitter IconVisit Our Blog