CFP last date
20 December 2024
Reseach Article

A Survey over the Various Techniques Which used for Security of the Data in Cloud Storage

by Avinash Shukla, Sanjay Silakari, Uday Chourasia
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 142 - Number 1
Year of Publication: 2016
Authors: Avinash Shukla, Sanjay Silakari, Uday Chourasia
10.5120/ijca2016909657

Avinash Shukla, Sanjay Silakari, Uday Chourasia . A Survey over the Various Techniques Which used for Security of the Data in Cloud Storage. International Journal of Computer Applications. 142, 1 ( May 2016), 4-7. DOI=10.5120/ijca2016909657

@article{ 10.5120/ijca2016909657,
author = { Avinash Shukla, Sanjay Silakari, Uday Chourasia },
title = { A Survey over the Various Techniques Which used for Security of the Data in Cloud Storage },
journal = { International Journal of Computer Applications },
issue_date = { May 2016 },
volume = { 142 },
number = { 1 },
month = { May },
year = { 2016 },
issn = { 0975-8887 },
pages = { 4-7 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume142/number1/24858-2016909657/ },
doi = { 10.5120/ijca2016909657 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:43:44.332956+05:30
%A Avinash Shukla
%A Sanjay Silakari
%A Uday Chourasia
%T A Survey over the Various Techniques Which used for Security of the Data in Cloud Storage
%J International Journal of Computer Applications
%@ 0975-8887
%V 142
%N 1
%P 4-7
%D 2016
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In recent time cloud computing provides an enhanced mechanism to access and share data which contain useful information, but that data stored in third party cloud server. Security of that data is the biggest issue in cloud computing. There are various techniques presented by the researchers to deal with such issues. There are techniques like privacy preserving techniques public auditing based techniques, batch auditing based techniques and some other techniques are used to provide authentication and provide security for the data in cloud storage. A review over the various techniques which used to provide security for the data over cloud storage is presented in this paper. For future work an enhanced technique for security can be proposed to deal with such problems.

References
  1. Tiantian LIU, Tongkai JI, Qiang YUE, Zhenchu TANG “G-Cloud: A Highly Reliable and Secure IaaS Platform” IEEE, 2015.
  2. KadamPrasad,JadhavPoonam,KhupaseGauri, N. C. Thoutam “Data Sharing Security and Privacy Preservation in Cloud Computing” IEEE, 2015.
  3. N. Shanmugakani, R. Chinna “An Explicit Integrity Verification Scheme for cloud Distributed systems” ICSO, IEEE, 2015.
  4. Mehmet SabirKiraz, Isa Sertkaya, OsmanbeyUzunkol “an Efficient Id based Message Recoverable Privacy Preserving Auditing scheme” PST, IEEE 2015.
  5. NiveditaSimbre, PriyaDeshpandey “Enhancing Distributed Data Storage security for cloud computing using TPA and AES algorithm” IEEE, 2015.
  6. Jian Liu, Kun Huang, Hong Rong, Huimei Wang, and Ming Xian “Privacy Preserving Public Auditing for Regenerating Code Based Cloud storage” IEEE, July 2015.
  7. Hong liu, Hua shengNing, QingXiong, Laurence T. yang “Shared Authority Based Privacy Preserving Authentication protocol in cloud” IEEE Transactions on Parallel and distributed system Vol. PP NO: 99, 2014.
  8. Kai Hwang, Deyi Li “Trusted cloud computing with secure resource and Data Coloring” IEEE 2010.
  9. L. A. Dunning and R. Kresman, “Privacy Preserving Data Sharing With Anonymous ID Assignment,” IEEE Transactions on Information Forensics and Security, vol. 8, no. 2, pp. 402-413, 2013.
  10. X. Liu, Y. Zhang, B. Wang, and J. Yan, “Mona: Secure Multi Owner Data Sharing for Dynamic group in the cloud” IEEE Transactions on parallel and distributed system, 2012.
  11. Slawomir Grzonkwoski, Peter M. Corcoran “Sharing cloud service: User Authentication for social Enhancement of Home networking” IEEE Transaction on consumer electronics, Vol. 57, No. 3, August 2011.
  12. Kan yang, XiaohuaJia “An efficient and secure dynamic auditing protocol for data storage in cloud computing” IEEE transactions on parallel and distributed system, Vol. 24 No. 9, September 2013.
  13. Quin Wang, Cong Wang, KuiRen, Wenjing Lou, Jin Li “Enabling public auditability and data dynamics for storage data in cloud computing” IEEE Transactions on Parallel and distributed system, Vol. 22 No. 5, May 2011.
  14. C. Wang, Q Wang, K. Ran, N. Cao and W.Lou “Towards Secure and dependable storage service in cloud computing” IEEE Transactions on service computing Vol. 5, No. 2, 2012.
  15. https://en.wikipedia.org/wiki/Cloud_computing.
  16. Hemlatha, P Nirupama, V.Balaji “Anonymous Authentication for decentralized Access Control of cloud data” IJARCSMS, November 2014.
  17. Madhumita S Patil, Santosh Kumar” Study for Enhancement in privacy preserving authentication protocol using third party in cloud” IJEEM, Vol 3 Issue 1, 2013.
  18. Martin Gilje Jaatun1, Gansen Zhao, Athanasios V Vasilakos, Asmund Ahlmann Nyre, Stian Alapnesand Yong Tang” The design of a redundant array of inde-pendent net storages for improved confidentiality in cloud computing” Journal of Cloud Computing: Advances, Systems and Applications 2012.
  19. M. Armbrust, A. Fox, R. Griffith, A.D. Joseph, R.H. Katz, A. Konwinski, G. Lee, D.A. Patterson, A. Rabkin, I. Stoica, and M. Zaharia, “Above the Clouds: A Berkeley View of Cloud Computing,” Technical Report UCB-EECS-2009-28, Univ. of California, Berkeley, Feb. 2009
Index Terms

Computer Science
Information Sciences

Keywords

Cloud Storage Cloud Security Encryption Decryption. Third Party Server (TPA) Redundant Array Homomorphic function.