CFP last date
20 December 2024
Reseach Article

Data Storage Security and Privacy in Cloud Computing: A Comprehensive Survey

by Jeevitha B. K., Thriveni J., Venugopal K. R.
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 156 - Number 12
Year of Publication: 2016
Authors: Jeevitha B. K., Thriveni J., Venugopal K. R.
10.5120/ijca2016912513

Jeevitha B. K., Thriveni J., Venugopal K. R. . Data Storage Security and Privacy in Cloud Computing: A Comprehensive Survey. International Journal of Computer Applications. 156, 12 ( Dec 2016), 16-27. DOI=10.5120/ijca2016912513

@article{ 10.5120/ijca2016912513,
author = { Jeevitha B. K., Thriveni J., Venugopal K. R. },
title = { Data Storage Security and Privacy in Cloud Computing: A Comprehensive Survey },
journal = { International Journal of Computer Applications },
issue_date = { Dec 2016 },
volume = { 156 },
number = { 12 },
month = { Dec },
year = { 2016 },
issn = { 0975-8887 },
pages = { 16-27 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume156/number12/26761-2016912513/ },
doi = { 10.5120/ijca2016912513 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:02:25.632597+05:30
%A Jeevitha B. K.
%A Thriveni J.
%A Venugopal K. R.
%T Data Storage Security and Privacy in Cloud Computing: A Comprehensive Survey
%J International Journal of Computer Applications
%@ 0975-8887
%V 156
%N 12
%P 16-27
%D 2016
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Cloud Computing is a form of distributed computing wherein resources and application platforms are distributed over the Internet through on demand and pay on utilization basis. Data Storage is main feature that cloud data centres are provided to the companies/organizations to preserve huge data. But still few organizations are not ready to use cloud technology due to lack of security. This paper describes the different techniques along with few security challenges, advantages and also disadvantages. It also provides the analysis of data security issues and privacy protection affairs related to cloud computing by preventing data access from unauthorized users, managing sensitive data, providing accuracy and consistency of data stored.

References
  1. P. Mell and T.Grance, “The NIST Definition of Cloud Computing”, Natinal Institute of Standards and Techology, vol. 53, no.6, pp. 1-3, 2009.
  2. Leonard Heilig and Stefan Vob, “A Scientometric Analysis of Cloud Computing Literature”, IEEE Transactions on Cloud Comouting, vol. 2, no. 3, pp. 266-278, July-September 2014.
  3. Cohen, Reuven, Rebello and Jagdish, “The State of Cloud Storage: A Benchmark Comparison of Speed, Availability and Scalability”, White paper, Nausni, 2015.
  4. J. J.Wylie, M. Bakkaloglu, V. Pandurangan, M.W. Bigrigg, S. Oguz, K. Tew, C. Williams, G. R. Ganger, and P. K. Khosla, “Selecting the Right Data Distribution Scheme for a Survivable Storage System”, Carnegie Mellon University, Technical Report, May 2001.
  5. Linlin Wu, Saurabh Kumar Garg, Steve Versteeg, and Rajkumar Buyya, “SLA-Based Resource Provisioning for Hosted Software-as-a-Service Applications in Cloud Computing Environments”, IEEE Transactions on Services Computing, vol. 7, no. 3, pp. 465-485, July-September 2014.
  6. K. Hashizume, D. G. Rosado, E. Fernndez-Medina and E. B. Fernandez, “An Analysis of Security Issues for Cloud Computing”, Journal of Internet Services and Applications, vol. 4, no. 1, pp. 1-13, 2013.
  7. G. Kappes, A. Hatzieleftheriou and S. V. Anastasiadis, “Dike: Virtualization-Aware Access Control for Multitenant Filesystems”, University of Ioannina, Greece, Technical Report No. DCS2013-1, 2013.
  8. Srinivasa Rao Chintada, ChandraSekhar Chinta, “Dynamic Massive Data Storage Security Challenges in Cloud Computing Environments”, International Journal of Innovative Research in Computer and Communication Engineering, vol. 2, no. 3, pp. 3609-3616, March 2014.
  9. Kevin D Bowers, Ari. Juels and Alina Oprea, “HAIL: A High Availability and Integrity Layer for Cloud Storage”, In the Proceedings of the 16th ACM Conference on Computer and Communications Security. ACM, pp. 187-198, 2009.
  10. Spillner J, Mller J and Schill A, “Creating Optimal Cloud Storage Systems”, IEEE Transactions on Utility and Cloud Computing, vol. 29, issue. 4, pp. 1062-1072, June 2013.
  11. Maneesha Sharma, Himani Bansal, Amit Kumar Sharma, “Cloud Computing: Different Approach and Security Challenge”, International Journal of Soft Computing and Engineering (IJSCE), vol. 2, no. 1, pp. 421-424, March 2012.
  12. Victor Chang, Muthu Ramachandran, “Towards Achieving Data Security with the Cloud Computing Adoption Framework”, IEEE Transaction on Service Computing, vol. 9, issue. 1, pp. 138-151, ISSN: 1939- 1374, January 2016.
  13. Kalpana Batra, Ch. Sunitha, Sushil Kumar, “An Effective Data Storage Security Scheme for Cloud Computing”, International Journal of Innovative Research in Computer and Communication Engineering, vol. 1, no. 4, pp. 808-815, June 2013.
  14. Hamdan M. Al-Sabri, Saleh M. Al-Saleem, “Building a Cloud Storage Encryption (CSE) Architecture for Enhancing Cloud Security”, IJCSI International Journal of Computer Science Issues, vol. 10, no. 1, pp. 259-266, March 2013.
  15. Keiko Hashizume, David G Rosado, Eduardo Fernndez-Medina and Eduardo B Fernandez, “An Analysis of Security Issues for Cloud Computing”, Journal of Internet Services and Applications, pp. 1-13, 2013.
  16. Dan Boneh, Xuhua Ding and Gene Tsudik, “Fine-grained Control of Security Capabilities”, ACM Transactions on Internet Technology (TOIT), vol. 1, no. 4, pp. 60-82. 2004.
  17. Raghavendra S, Girish S, Geeta C M, Rajkumar Buyya, Venugopal K R, S S Iyengar and L M Patnaik, “IGSK: Index Generation on Split Keyword for Search over cloud data”, In the Proceedings of International Conference on Computing and Network Communications (CoCoNet), pp. 374-380, 2015.
  18. Danwei Chen and Yanjun He, “A Study on Secure Data Storage Strategy in Cloud Computing”, Journal of Convergence Information Technology, vol. 5, no. 7, pp. 175-179, September 2010.
  19. Parakh A and Kak S, “Online Data Storage using Implicit Security”, International Journal of Information Sciences, vol. 179, no. 19, pp. 3323-3331, 2009.
  20. Mohamed Ali, Kashif Bilal, Sharifullah Khan, Bharadwaj Veeravalli, Kaicheng Li and Albert Zomaya, “DROPS: Division and Replication of Data in the Cloud for Optimal Performance and Security”, IEEE Transactions on Cloud Computing, ISSN: 2168-7161, 2015.
  21. K Badya Nayak, D Krishna, P Ravindra, “Data Integrity and Dynamic Storage Way in Cloud Computing”, International Journal of Innovative Technologies vol. 3, issue. 2, pp. 0268-0273, ISSN: 2321-8665, June 2015.
  22. Ananda S. Hiremath, Shivaputra S. Panchal, Shriharsha S. Veni, “Providing Security for Data Storage in Cloud through Third Party Auditor”, International Journal of Advanced Research in Computer Science and Software Engineering, vol. 4, no. 7, pp. 379-384, July 2014.
  23. Abhishek Patel, Prabhat Dansena, “TPM as a Middleware for Enterprise Data Security”, International Journal of Computer Science and Mobile Computing, vol. 2, no. 7, pp. 327-332, July 2013.
  24. Matthew Malensek, Sangmi Pallickara, and Shrideep Pallickara, “MINERVA : Proactive Disk Scheduling for Qos in Multi-tier, Multi-tenant Cloud Environments”, IEEE Transactions on Internet Computing, vol. 20, no. 3, pp. 19-27, ISSN: 1089-7801, May-June 2016.
  25. Xu, Lei and Wu, Xiaoxin and Zhang, Xinwen, “CL-PRE: A Certificateless Proxy Re-encryption Scheme for Secure Data Sharing with Public Cloud”, In the Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security, pp. 87-88, 2012.
  26. Kaitai Liang and Willy Susilo, “Searchable Attribute-Based Mechanism With Efficient Data Sharing for Secure Cloud Storage”, IEEE Transaction on Informations Forensics and Security, vol. 10, no. 9, pp.1981-1992, September 2015.
  27. R. Bala Chandar, M.S Kavitha, K seenivasan, “A Proficient Model for High end Security in Cloud Computing”, ICTACT Journal on Soft Computing, vol. 4, pp. 694-702. January 2014.
  28. Neha Tirthani, Ganesan R, “Data Security in Cloud Architecutre based on Diffie Hellmam and Elliptic Curve Cryptography, IACR Cryptology e-Print Archive, 2013.
  29. Chen Yang, Furong Wang and Xinmei Wang, “Efficient Mediated Certificates Public-Key Encryption Scheme without Pairings”, In the Proceedings of International Conference on Advanced Information Networking and Applications Workshops, AINAW, vol. 1, pp. 109-112, 2007.
  30. Mokhtarnameh, Razieh and Ho, Sin Ban and Muthuvelu, Nithiapidary, “An Enhanced Certificateless Authenticated Key Agreement Protocol”, In the Proceedings of 13th International Conference on Advanced Communication Technology (ICACT), pp. 802-806, 2011.
  31. Jianghong Wei, Wenfen Liu, Xuexian Hu, “Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based Encryption”, Transactions on Cloud Computing, ISSN: 2168-7161, August 2015.
  32. Peng Xu, Tengfei Jiao, Qianhong Wu, Wei Wang, and Hai Jin, “Conditional Identity-Based Broadcast Proxy Re-Encryption and Its Application to Cloud Email”, IEEE Transactions on Computers, vol. 65, no. 1, pp. 66-79, January 2016.
  33. Hou, Mengbo and Xu, Qiuliang, “Two-Party Authenticated Key Agreement Protocol from Certificateless Public Key Encryption Scheme”, In the Proceedings of International Conference on Management of e- Commerce and e-Government, ICMECG, pp. 440-444, 2009.
  34. Chase, Melissa, “Multiauthority Attribute based Encryption”, In the Proceedings of 4th Conference on Theory of Cryptography, pp. 515- 534, 2007.
  35. Sun, Yinxia and Zhang, Futai, “Secure Certificateless Public Key Encryption without Redundancy”, IACR Cryptology ePrint Archive, p. 487, 2008.
  36. Deepanchakaravarthi, Purushothaman and Sunitha Abburu, “An Approach for Data Storage Security in Cloud Computing”,International Journal of Computer Science Issues, vol. 9, no 1, pp. 100-105, March 2012.
  37. Zebin Wu, Yonglong Li, Antonio Plaza, Jun Li, Fu Xiao, and Zhihui Wei, “Parallel and Distributed Dimensionality Reduction of Hyperspectral Data on Cloud Computing Architectures”, IEEE Journal of SelectedTopics in Applied Earth Observations and Remote Sensing, 2016.
  38. Kan Yang, Xiaohua Jia, Kui Ren, Bo Zhang, and Ruitao Xie, “DACMACS: Effective Data Access Control for Multiauthority Cloud Storage Systems”, IEEE Transactions on Information and Forensics and Security, vol. 8, no. 11, pp. 1790-1801, November 2013.
  39. Lars Bremer and Kalam Graffi, “Symbiotic Coupling of P2P and Cloud Systems: The Wikipedia Case”, In the Proceedings of IEEE International Conference on Communication, pp. 3444-3449, 2013.
  40. Heng He, Ruixuan Li and Xinhua Dong and Zhao Zhang, “Secure, Efficient and Fine-Grained Data Access Control Mechanism for P2P Storage Cloud”, IEEE Transactions on Cloud Computing, vol. 2, no. 4, pp. 471-484, 2014.
  41. Garcia-Rodriguez, Gerardo, and Francisco de Asis Lopez-Fuentes, “A Storage Service based on P2P Cloud System”, Advances in Information and Technology, pp. 89-96, 2014.
  42. Kavalionak, Hanna and Montresor, Alberto, “P2P and Cloud: A Marriage of Convenience for Replica Management”, Self-Organizing Systems, pp. 60-71, 2012.
  43. Babaoglu, Ozalp Marzolla, Moreno Tamburini, Michele, “Design and Implementation of a P2P Cloud System”, In the Proceedings of 27th Annual ACM Symposium on Applied Computing, pp. 412-417, 2012.
  44. Jin Li, “Erasure Resilient Codes in Peer-to-Peer Storage Cloud”, In the Proceedings of IEEE International Conference on Acoustics, Speech and Signal Processing, vol. 4, pp. 4-6, 2006.
  45. Sanghamitra De, Mridul Sankar Barik, Indrajit Banerjee, “Goal based Threat Modelling for Peer-to-Peer Cloud” 2016.
  46. Rajiv Ranjan, Liang Zhao, Xiaomin Wu, Anna Liu, Andres Quiroz and Manish Parashar, ”Peer-to-peer Cloud Provisioning: Service Discovery and Load-Balancing”, Cloud Computing, pp. 195-217, 2010.
  47. Azad F Barsoum and Aftab Hasan, “Enabling Dynamic Data and Indirect Mutual Trust for Cloud Computing Storage Systems”,IEEE Transactions on Parallel and Distributed Systems, vol. 24, no. 12, pp. 2375-2385, 2013.
  48. Kaiping Xue and Peilin Hong, “A Dynamic Secure Group Sharing Framework in Public Cloud Computing”, IEEE Transactions on Cloud Computing, vol. 2, no. 4, pp. 459-470, 2014.
  49. N Jenefa and N Jayalaxmi, “A Cloud Storage System with Data Confidentiality and Data Forwarding”, International Journal of Soft Computing and Engineering, vol. 3, March-2013.
  50. Hsiao-Ying Lin and Wen-Guey Tzeng, “A Secure Erasure Code based Cloud Storage System with Secure Data Forwarding”, IEEE Transactions on Parallel and Distributed Systems, vol. 23, no. 6, pp. 995-1003, 2012.
  51. G. Ateniese, K. Fu, M. Green, and S. Hohenberger, “Improved Proxy Re-Encryption Schemes with Applications to Secure Distributed Storage”, In the Proceedings of Network Distributed System Security Symposium, 2005.
  52. Mazhar Ali, Saif Malik, and Samee Khan, “DaSCE: Data Security for Cloud Environment with Semi-Trusted Third Party”, IEEE Transactions on Cloud Computing, 2015.
  53. Jayant D Bokefade, Audhut S, Bhise Prajakta A, Satarkar Dattatray G.Modani, “ Developing A Secure Cloud Storage System for Storing IoT Data by Applying Role Based Encryption”, In the Proceedings of 12th International Multi-Conference on Information Processin, vol. 89, pp. 43-50 2016.
  54. Lihong Jiang, Li Da Xu, Hongming Cai, Zuhai Jiang, Fenglin Bu and Boyi Xu, “An IoT-oriented Data Storage Framework in Cloud Computing Platform”,IEEE Transactions on Industrial Informatics, vol. 10, no. 2, pp. 1443-1451, 2014.
  55. Yang Tang, Patrick PC Lee, John CS Lui and Radia Perlman, “FADE: Secure Overlay Cloud Storage with File Assured Deletion”, Security and Privacy in Communication Networks, pp. 380-397, 2010.
  56. Aditya Kaushal Rajan, Vijay Kumar and Muzzammil Hussain, “Security Analysis of Cloud Storage with Access Control and File Assured Deletion (FADE)”, Second International Conference on Advances in Computing and Communication Engineering (ICACCE), pp. 453-458, 2015.
  57. Ashfia Binte Habib, Tasnim Khanam and Rajesh Patil, “Simplified File Assured Deletion (SFADE)-A User Friendly Overlay Approach for Data Security in Cloud Storage System”, International Conference on Advances in Computing, Communications and Informatics (ICACCI), pp. 1640-1644, 2013.
  58. Hui Tian, Yuxiang Chen, Chin-Chen Chang, Hong Jiang, Yongfeng Huang, Yonghong Chen, Jin Liu, “Dynamic-Hash-Table Based Public Auditing for Secure Cloud Storage”, IEEE Transactions on Service Computing, 2015.
  59. Zhenyu Wen, Jacek Caa, Paul Watson, and Alexander Romanovsky, “Cost Effective, Reliable and Secure Workflow Deployment over Federated Clouds”, Transactions on Services Computing, vol. 13, no.9, pp. 604-612, September 2014.
  60. A. Mei, L. V. Mancini, and S. Jajodia, Secure Dynamic Fragment and Replica Allocation in Large-Scale Distributed File Systems, IEEE Transactions on Parallel and Distributed Systems, vol. 14, no. 9, pp. 885-896, 2003.
  61. Zhongyuan Zhao, Mugen Peng, Zhiguo Ding, Wenbo Wang, and H. Vincent Poor, “Cluster Content Caching: An Energy-Efficient Approach to Improve Quality of Service in Cloud Radio Access Networks”, IEEE Journal on Selected Areas in Communications, 2016.
  62. Qian Wang, Cong Wang, Jin Li, Kui Ren and Wenjing Lou, “Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing”, Computer Security–ESORICS, pp. 355-370, 2009.
  63. Amol S. Choure S. M. Bansode, “A Comprehensive Survey on Storage Techniques in Cloud Computing”, International Journal of Computer Applications, vol. 122, no. 18, pp. 3-25, July 2015.
  64. Cheng-Kang Chu, Sherman S.M. Chow, Wen-Guey Tzeng, Jianying Zhou, and Robert H. Deng, “Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage”, IEEE Transactions on Parallel And Distributed Systems, vol. 25, no. 2, pp. 468-477, Febraury 2014.
  65. Dong Yuan, Yun Yang, Xiao Liu and JinJun Chen, “A Cost-Effective Strategy for Intermediate Data Storage in Scientific Cloud Workflow Systems”, IEEE International Symposium on Parallel and Distributed Processing (IPDPS), pp. 1-7, 2010.
  66. Shubhashis Sengupta, Annervaz K M, Amitabh Saxena, Sanjoy Paul, “Data Vaporizer-Towards a Configurable Enterprise Data Storage Framework in Public Cloud”, IEEE 8th International Conference on Cloud Computing, pp. 73-80, 2015.
  67. Rajat Saxena, Somnath Dey, “Cloud Audit: A Novel Approach for Data Intergrity Verification in Cloud Computing”, In the Proceedings of International Conference on Secuirty in Computer Networks and Distributed Systems, pp. 1-15, 2016.
  68. Leena H.U, Premasudha B.G, Basavaraja P.K, “Sensible Approach for Soil Fertility Management using GIS Cloud”, 2016.
  69. Huaqun Wang, Debiao He, and Shaohua Tang, “Identity Based Proxy- Oriented Data Uploading and Remote Data Integrity Checking in Public Cloud”, IEEE Transaction on Information Forensics and Security, vol. 11, no. 6, pp. 1165-1176, June 2016.
  70. Li Mingqiang, Qin Chuan, Li Jingwei and Lee Patrick, “CDStore: Toward Reliable, Secure and Cost-Efficient Cloud Storage via Convergent Dispersal”, In the Proceedings of USENIX Annual Technical Conference (USENIX ATC, pp. 111-124, July 2015.
  71. Seungyeop Han, Haichen Shen, Taesoo Kim, Arvind Krishnamurthy, Thomas Anderson, and David Wetherall, “MetaSync: Coordinating Storage Across Multiple File Synchronization Services”, IEEE Internet Computing, 2016.
  72. Yang, Zhi and Zhao, Ben Y and Xing, Yuanjian and Ding, Song and Xiao, Feng and Dai, Yafei, “AmazingStore: Available, Low-cost Online Storage Service Using Cloudlets”, vol. 10, no. 6 pp. 1-5, 2010.
  73. Zhongyuan Zhao, Mugen Peng, Zhiguo Ding, Wenbo Wang, and H. Vincent Poor, “Cluster Content Caching: An Energy-Efficient Approach to Improve Quality of Service in Cloud Radio Access Networks”, IEEE Journal on Selected Areas in Communications, vol. 34, no. 5, pp. 1207-1221, ISSN: 0733-8716, 2016.
  74. Xu, Xiaolong and Tu, Qun, “Data Deduplication Mechanism for Cloud Storage Systems”, In the Proceedings of International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC), pp. 286-294, 2015.
  75. R. Curtmola, O. Khan, R. Burns, and G. Ateniese, “MR-PDP: Multiple- Replica Provable Data Possession”, International Conference on Distributed Computing Systems, pp. 411-420, 2008.
  76. Quanlu Zhang, Shenglong Li, Zhenhua Li, Yuanjian Xing, Zhi Yang, and Yafei Dai, “CHARM: A Cost-Efficient Multi-Cloud Data Hosting Scheme with High Availability”, IEEE Transactions on Cloud Computing, vol. 3, no. 3, pp. 372-386, July-September 2015.
  77. Haifeng Lu, Chuan Heng Foh, Yonggang Wen and Jianfei Cai, “Delay- Optimized File Retrieval under LT-Based Cloud Storage” IEEE Transactions on Cloud Computing, ISSN: 2168-7161, 2015.
  78. Ping Hu, Chi Wan Sung, Siu-Wai Ho, and Terence H. Chan, “Optimal Coding and Allocation for Perfect Secrecy in Multiple Clouds”, IEEE Transaction on Information Forensics and Secuirty, vol. 11, no. 2, pp. 388-399, February 2016.
  79. R K Banyal, V K Jain and Pragya Jain, “Data Management System to Improve Security and Availability in Cloud Storage”, 2015 International Conference on Computational Intelligence and Networks (CINE), pp. 124-129, 2015.
  80. Pallavi Srivastava and Navish Garg, “Secure and Optimized Data Storage for IoT through Cloud Framework”, International Conference on Computing, Communication and Automation (ICCCA), pp. 720-723, 2015.
  81. Zhenyu Wen, Jacek Caa, Paul Watson, and Alexander Romanovsky, “Cost Effective, Reliable and Secure Workflow Deployment over Federated Clouds”, IEEE Transactions on Services Computing, 2016.
  82. Abdul Sattar Raja and Dr. Shukor Abd Razak, “Analysis of Security and Privacy in Public Cloud Environment”, International Conference on Cloud Computing, pp. 1-6, April 2015.
  83. Baojiang Cui, Zheli Liu and Lingyu Wang,“Key-Aggregate Searchable Encryption (KASE) for Group Data Sharing via Cloud Storage”, IEEE Transactions on Computers, vol. 6, no. 1, Jnauary 2014.
  84. Chi, Po-Wen and Lei, Chin-Laung, “Audit-Free Cloud Storage via Deniable Attribute-based Encryption”, IEEE Transactions on Cloud Computing, ISSN: 2168-7161, April 2015.
  85. Yongge Wang, “Privacy-Preserving Data Storage in Cloud Using Array BP-XOR Codes”, IEEE Transactions on Cloud Computing, vol. 3, no. 4, pp. 425-435, October-December 2015.
  86. Kalyani, Hulawale and Rahul, Paikrao and Ambika, Pawar, “Achieve Fine Grained Data Access Control in Cloud Computing using KP-ABE along with Lazy and Proxy Re-encryption”, International Journal of Emerging Technology and Advanced Engineering, vol. 4, issue. 2, pp. 457-461, Febraury 2014.
  87. V. Goyal, O. Pandey, A. Sahai, and B. Waters,“Attribute-based Encryption for Fine-Grained Access Control of Encrypted Data”, In the Proceedings of 13th ACM Conference on Computer and Communications Security, pp. 89-98, 2006.
  88. Shulan Wang, Kaitai Liang, Joseph K. Liu, Member, IEEE, Jianyong Chen, Jianping Yu, Weixin Xie, “Attribute-Based Data Sharing Scheme Revisited in Cloud Computing”, IEEE Transactions on Information Forensics and Security, 2016.
  89. Jin Sun, Yupu Hu, and Leyou Zhang, “A Key-Policy Attribute-Based Broadcast Encryption”, The International Arab Journal of Information Technology, vol. 10, no. 5, pp. 444-453, September 2013.
  90. Shucheng Yu, Cong Wang, Kui Ren, and Wenjing Lou, “Achieving Secure, Scalable and Finegrained Data Access Control in Cloud Computing”, In the Proceedings of INFOCOM, pp. 1-9, ISSN: 0743-166X, 2010.
  91. Sun, Jin and Hu, Yupu and Zhang, Leyou, “A Key-Policy Attribute based Broadcast Encryption”, The International Arab Journal of Information Technology, vol. 10, no. 5, pp. 444-452, 2013.
  92. M. Blaze, G. Bleumer, and M. Strauss, ”Divertible Protocols and Atomic Proxy Cryptography”, Proceedings of EUROCRYPT, pp. 127-144, 1998.
  93. M. Kallahalla, E. Riedel, R. Swaminathan, Q. Wang, and K. Fu, “Scalable Secure File Sharing on Untrusted Storage”, In the Proceedings of FAST, vol. 3, pp. 29-42, 2003.
  94. Jiguo Li, Wei Yao, Yichen Zhang, Huiling Qian and Jinguang Han, “Flexible and Fine-Grained Attribute-Based Data Storage in Cloud Computing”, IEEE Transactions on Services Computing, ISSN: 1939- 1374, January 2016.
  95. Nabeel, Mohamed and Shang, Ning and Bertino, Elisa, “Privacy Preserving Policy-based Content Sharing in Public Clouds”, IEEE Transactions on Knowledge and Data Engineering, vol. 25, no. 11, pp. 2602–2614, 2013.
  96. Cong Wang, Sherman S.M.Chow, Qian Wang, Kui Ren, and Wenjing Lou, “Privacy Preserving Public Auditing for Secure Cloud Storage”, IEEE transaction on Computers, vol. 62, no. 2, pp. 362-375, February 2013.
  97. Arockia Ranjini A, Arun S, “ A Comparison Study of Various Virtual Machine Consolidation Algorithms in Cloud Datacenter”, vol. 78, pp.491-498, 2016.
  98. Li, Jie and Ma, Ronghua and Guan, Haiyan, “Tees: An Efficient Search Scheme over Encrypted Data on Mobile Cloud”, IEEE Transactions Cloud Computing, 2015.
  99. L. Vaquero, L. Rodero-Merino, J. Caceres, and M. Lindner, “A Break in the Clouds: Towards a Cloud Definition”, ACM SIGCOMM Computer Communication Review, vol. 39, no. 1, pp. 50-55, 2008.
  100. Neeraj Kumar, Rahat Iqbal, Sudip Misra, Joel J. P. C. Rodrigues, M.S. Obaidat, “Bayesian Cooperative Coalition Game as-a-Service for RFID-Based Secure QoS Management in Mobile Cloud”, IEEE Transactions on Emerging Topics in Computing, ISSN: 2168-6750, March 2016.
  101. A. N. Khan, M. L. M. Kiah, S. U. Khan, and S. A. Madani, “Towards Secure Mobile Cloud Computing: A Survey”, Future Generation Computer Systems, vol. 29, no. 5, 2013, pp. 1278-1299, 2012
  102. D. Sun, G. Chang, L. Sun, and X. Wang, “Surveying and Analysing Security, Privacy and Trust Issues in Cloud Computing Environments”, Procedia Engineering, vol. 15, pp. 2852-2856, 2011.
  103. Vishwa Kiran S, Ramesh Prasad, Thriveni J, Venugopal K R, L M Patnaik, ”Mobile Cloud Computing for Medical Applications”, pp. 1-6, ISBN: 978-1-4799-5364-6, 2015.
  104. Vishwa Kiran S, Raghuram S, Thriveni J, Venugopal K R, “Efficient Video Transfer using LAN Caching assisted by Cloud Computing”, TENCON 2015- 2015 IEEE Region 10 Conference, pp. 1-5, ISSN: 2159-3450, January 2016.
  105. Abir Awad , Adrian Matthews, Yuansong Qiao and Brain Lee,“Chaotic Searchable Encryption for Mobile Cloud Storage”, IEEE Transactions on Cloud Computing, ISSN: 2168-7161, 2015.
  106. Veerabathina Santi Priya, B Venkata Ramana and Smita Rani Shahu, “Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data”, International Journal of Scientific Engineering and Technology Research, vol. 04, issue. 11, pp. 2030-2032, May 2015.
  107. S Raghavendra, Nithyashree K, C M Geeta, Rajkumar Buyya, K R Venugopal, S S Iyengar and L M Patnaik, “ FRORSS: Fast Result Object Retrieval using Similarity on Cloud”, in the proceedings of International Conference on Distributed Computing, VLSI, Electrical Circuts and Robotics (DISCOVER), 2016.
  108. Bing Wang, Shucheng Yu, Wenjing Lou and Y Thomas Hou, ”Privacy-Preserving Multi-Keyword Fuzzy Search over Encrypted Data in the Cloud”, INFOCOM, 2014 Proceedings IEEE, pp. 2112-2120, 2014.
  109. X. Yu and Q. Wen, “Design of Security Solution to Mobile Cloud Storage”, in Knowledge Discovery and Data Mining. Springer pp. 255-263, 2012.
  110. D. Huang, “Mobile cloud computing”, IEEE COMSOC Multimedia Communications Technical Committee (MMTC) E-Letter, vol. 6, no.10, pp.27-31, 2011.
  111. William Zegers, Sang-yoon Chang, Younghee park and Jerry Gao, “A Light-Weight Encryption and Secure Protocol for Smartphone Cloud”, IEEE Symposium on Service-Oriented System Engineering (SOSE), pp. 259-266, 2015.
  112. S. Kamara and K. Lauter, “Cryptographic Cloud Storage”, Financial Cryptography and Data Security. Springer, pp. 136-149, 2010.
  113. M. Li, S. Yu, K. Ren, W. Lou, and Y. T. Hou, “Toward Privacy-Assured and Searchable Cloud Data Storage Services”, IEEE Transactions on Network, vol. 27, no. 4, pp. 56-62, 2013.
  114. S Raghavendra, C M Geeta, Rajkumar Buyya, Venugopal K R, S S Iyengar and L M Patnaik, “DRSMS: Domain and Range Specific Multi-Keyword Search over Encrypted CLoud Data”, in the International Journal of Computer Science and Information Security (IJCSIS), vol. 14, no. 5, ISSN: 1947-5500, May 2016.
  115. S Raghavendra, Doddabasappa P A, C M Geeta, Rajkumar Buyya, Venugopal K R, S S Iyengar and L M Patnaik, “Secure Multi-Keyword Search and Multi-User Access Control over an Encrypted Cloud Data”, International Journal of Information Processing (IJIP), vol. 10, no. 2, ISSN:0973-8215, 2016
  116. W. Sun, B. Wang, N. Cao, M. Li, W. Lou, Y. T. Hou, and H. Li, “Privacy-Preserving Multi-Keyword Text Search in the Cloud Supporting Similarity-based Ranking”, 8th ACM SIGSAC Symposium on Information, Computer and Communications Security Proceedings, pp. 71-82, 2013.
  117. Mehdi Bahrami and Mukesh Singhal, “A Light-Weight Permutation based Method for Data Privacy in Mobile Cloud Computing”, 3rd IEEE International Conference on Mobile Cloud Computing, Services and Engineering (MobileCloud), pp. 189-198, 2015.
  118. Piotr K Tysowski and M Anwarul Hasan, “Re-Encryption-Based Key Management Towards Secure and Scalable Mobile Applications in Clouds”, IACR Cryptology ePrint Archive, pp. 668-678, 2011.
Index Terms

Computer Science
Information Sciences

Keywords

Storage Area Network Trusted Computing Group CeritificateLess Proxy Re- Encryption Elliptic Curve Cryptography Dynamic Hash Table.