Book Details

Cloud Data Storage Security – A Review Issues & Challenges

International Journal of Computer Science (IJCS) Published by SK Research Group of Companies (SKRGC)

Download this PDF format

Abstract

Here in this paper a complete survey of all the techniques used for the security of cloud data storage is analyzed and discussed. Since various techniques are already implemented for the security and privacy of cloud data in terms of attacks, computational cost and privacy preservation. So here a complete set of survey and review is done on these techniques so that a new and efficient technique is implemented in future.

References

[1] Cloud Security Alliance, ?Top Threats to Cloud Computing,? https://www.cloudsecurityalliance.org, 2010.
[2] Kui Ren, Cong Wang and Qian Wang, ?Toward Secure and Effective Data Utilization in Public Cloud?, IEEE Network, November/December 2012.
[3] Cong Wang, Sherman S.M. Chow, Qian Wang, Kui Ren, and Wenjing Lou, ? Privacy-Preserving Public Auditing for Secure Cloud Storage?, IEEE Transactions on Computers, Vol. 62, No. 2, February 2013.
[4] N. Cao, C. Wang, M. Li, K. Ren, and W. Lou, ?PrivacyPreserving Multikeyword Ranked Search over Encrypted Cloud Data,? Proc.IEEE INFOCOM, 2011.
[5] H. Hu, J. Xu, C. Ren, and B. Choi, ?Processing Private Queries over Untrusted Data Cloud through Privacy Homomorphism,? Proc. IEEE 27th Int’l Conf. Data Eng. (ICDE), 2011.
[6] L. M. Vaquero, L. Rodero-Merino, J. Caceres, and M. Lindner. A break in the clouds: towards a cloud definition. SIGCOMM Comput. Commun. Rev., 39:50{55, December 2008.
[7] Everaldo Aguiar, Yihua Zhang, and Marina Blanton, ?An Overview of Issues and Recent Developments in Cloud Computing and Storage Security? 2012.
[8] Jiadi Yu, Peng Lu, Yanmin Zhu, Guangtao Xue and Minglu Li, ?Toward Secure Multi-keyword Top-k Retrieval over Encrypted Cloud Data? IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, VOL. 10, NO. 4, JULY/AUGUST 2013.
[9] Cong Wang, NingCao, JinLi, KuiRen, and Wenjing Lou, ?Secure Ranked Keyword Search over Encrypted Cloud Data? 2011.
[10] Cong Wang, Sherman S.M. Chow, Qian Wang, Kui Ren, and Wenjing Lou, ?Privacy-Preserving Public Auditing for Secure Cloud Storage? IEEE TRANSACTIONS ON COMPUTERS, VOL. 62, NO. 2, FEBRUARY 2013.
[11] Mukil Kesavan, Irfan Ahmad, Orran Krieger, Ravi Soundararajan, ?Practical Compute Capacity Management for Virtualized Data Centers? IEEE TRANSACTIONS ON CLOUD COMPUTING, VOL. 1, NO. 1, JANUARY-JUNE 2013.
[12] Ning Caoy, Cong Wangz, Ming Li, Kui Renz and Wenjing Lou, ?Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data? 2010.
[13] Hussain Abo Surrah, ?Multi Keyword Retrieval On Secured Cloud? Asian Journal of Technology & Management Research ISSN: 2249 –0892 Vol. 04 – Issue: 01 Jan - Jun 2014.
[14] Cloud Security Alliance. «Security Guidance for Critical Areas of Focus in Cloud Computing.» April 2009. https://www.cloudsecurityalliance.org/guidance/csaguide.pdf

Keywords

Cloud Computing, Cloud Security, Data Storage, Multi Keywords.

Image
  • Format Volume 4, Issue 1, No 1, 2016
  • Copyright All Rights Reserved ©2016
  • Year of Publication 2016
  • Author Jayant Kumar, Asst. Prof. Nitin Agarwal
  • Reference IJCS-110
  • Page No 636-641.

Copyright 2024 SK Research Group of Companies. All Rights Reserved.