A Survey on Security of Various Data Sharing Techniques in Cloud

International Journal of Computer Science (IJCS Journal) Published by SK Research Group of Companies (SKRGC) Scholarly Peer Reviewed Research Journals

Format: Volume 4, Issue 1, No 2, 2016.

Copyright: All Rights Reserved ©2016

Year of Publication: 2016

Author: Saurabh Singh,Prof.Shatendra Dubey


View PDF Format


Over the past few years, cloud computing has develop into more and more admired. It brings revolutionary innovation with regards to cost, resource management and utilization. Cloud computing offer nearly unlimited resources, highly reliable on-demand services with minimal infrastructure and operational cost and storage system. In the cloud storage system with data de-duplication, un-trusted entities including a cloud server and users may cause security threats to the storage system. These services offers to end-users rather than a product by sharing resources, software and other information, hence economic benefit and data de-duplication is the key for Cloud in terms of capital and operational expenditure.


[1] M. Armbrust, A. Fox, R. Griffith, A. Joseph, R. Katz, A. Konwinski, G. Lee, D. Patterson, A. Rabkin, I. Stoica, et al., ―Above the clouds: A berkeley view of cloud computing,” Technical Report UCB/EECS-2009-28, Dept. EECS, UC Berkerely, 2009. 2] B. Narasimhan and R. Nichols, ―State of cloud applications and platforms: The cloud adopters’ view,‖ Computer, vol. 44, no. 3, pp. 24–28, 2011. [3] S. Quinlan and S. Dorward, ―Venti: A new approach to archival storage,‖ in Proc. 1st USENIX Conf. File Storage Technol., Jan. 2002, p.7. [4] Pearson, S., & Benameur, A. Privacy, security and trust issues arising from cloud computing. In Cloud Computing Technology and Science (CloudCom), 2010 IEEE Second International Conference on (pp. 693-702). [5] Tweney, A., & Crane, S. (2007). Trustguide2: An exploration of privacy preferences in an online world. Expanding the Knowledge Economy: Issues, Applications, Case Studies. [6] Pearson, S., & Charlesworth, A. (2009). Accountability as a way forward for privacy protection in the cloud. Cloud Computing, 131-144. [7] S. Halevi, D. Harnik, B. Pinkas, and A. Shulman-Peleg. Proofs of ownership in remote storage systems. In Y. Chen, G. Danezis, and V. Shmatikov, editors, ACM Conference on Computer and Communications Security, pages 491–500. ACM, 2011. [8] Meyer, D. T., and Bolosky, W. J. A study of practical deduplication. ACM Transactions on Storage (TOS), 2012. [9] D. Harnik, B. Pinkas, and A. Shulman-Peleg, ―Side channels in cloud services: Deduplication in cloud storage,” IEEE Security and Privacy Magazine, vol. 8, pp. 40-47, 2010. [10] S. Halevi, D. Harnik, B. Pinkas, and A. Shulman-Peleg. Proofs of ownership in remote storage systems. In Y. Chen, G. Danezis, and V. Shmatikov, editors, ACM Conference on Computer and Communications Security, pages 491–500. ACM, 2011. [11] M. Mulazzani, S. Schrittwieser, M. Leithner, M. Huber, and E. Weippl, ―Dark clouds on the horizon: using cloudstorage as attack vector and online slack space,” in Proc. USENIX Security Symposium (SEC’11), 2011. [12] Everaldo Aguiar, Yihua Zhang, and Marina Blanton, ―An Overview of Issues and Recent Developments in Cloud Computing and Storage Security‖ 2012. [13] Cloud Security Alliance. «Security Guidance for Critical Areas of Focus in Cloud Computing. April 2009. [14] Jin Li, Yan Kit Li, Xiaofeng Chen, Patrick P. C. Lee, Wenjing Lou, ―A Hybrid Cloud Approach for Secure Authorized Deduplication‖, IEEE Transactions on Parallel and Distributed Systems, 2014. [15] N.B. Kadu, Mr. Amit Tickoo, Mr.Saurabh I. Patil, Mr. Nilesh B. Bhagat , Mr. Ganesh B. Divte, ―A Hybrid Cloud Approach for Secure Authorized Deduplication‖ International Journal of Scientific and Research Publications, Volume 5, Issue 4, April 2015. [16] Gade Swati,Prof.Prashant Kumbharkar, ―Cryptosystem For Secure Data Sharing In Cloud Storage‖ IJIRT Volume 1 Issue 6 2014. [17] Lukas Malina and Jan Hajny, ―Efficient Security Solution for Privacy-Preserving Cloud Services‖ 6th International Conference On Telecommunications Signal Processing Year 2013. [18] Pardeep Kumar, Vivek Kumar Sehgal, Durg Singh Chauhan, P. K. Gupta and Manoj Diwakar, ―Effective Ways of Secure, Private and Trusted Cloud Computing ―JCSI International Journal of Computer Science Issues, Vol. 8, Issue 3, No. 2, May 2011. [19] N.O.AGRAWAL1, S.S.KULKARNI, ―Secure Deduplication and Data Security with Efficient and Reliable CEKM‖ International Journal of Application or Innovation in Engineering & Management (IJAIEM), November 2014. [20] Bhushan Choudhary, Amit Dravid , ―A Study on Authorized Deduplication Techniques in Cloud Computing‖ International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) Volume 3, Issue 12, April 2014. [21] Wee Keong Ng, Yonggang Wen, Huafei Zhu, ―Private Data De-duplication Protocols in Cloud Storage‖ ACM 978-1-4503-0857-1/12/03, 2011. [22] Jorge Blasco, Agustin Orfila, ―A Tunable Proof of Ownership Scheme for Deduplication Using Bloom Filters‖ June 18, 2014. [23] Sharma Bharat, Mandre B.R. ―A Secured and Authorized Data Deduplication in Hybrid Cloud with Public Auditing‖ International Journal of Computer Applications (0975 – 8887) Volume 120 – No.16, June 2015. [24] John R. Douceur, Atul Adya, William J. Bolosky, Dan Simon, Marvin Theimer, ―Reclaiming Space from Duplicate Files in a Server less Distributed File System‖ July 2002. Wired. «Company Caught in Texas Data Center Raid Loses Suit Against FBI. » 8 April 2009.


Cloud Computing, Data De-Duplication, Cloud Service Provider.

This work is licensed under a Creative Commons Attribution 3.0 Unported License.   

Facebook IconYouTube IconTwitter IconVisit Our Blog