CFP last date
20 January 2025
Reseach Article

A Survey on Storage Techniques in Cloud Computing

by Samson Akintoye, Antoine Bagula, Yacine Djemaiel, Noureddine Bouriga
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 163 - Number 2
Year of Publication: 2017
Authors: Samson Akintoye, Antoine Bagula, Yacine Djemaiel, Noureddine Bouriga
10.5120/ijca2017913472

Samson Akintoye, Antoine Bagula, Yacine Djemaiel, Noureddine Bouriga . A Survey on Storage Techniques in Cloud Computing. International Journal of Computer Applications. 163, 2 ( Apr 2017), 22-30. DOI=10.5120/ijca2017913472

@article{ 10.5120/ijca2017913472,
author = { Samson Akintoye, Antoine Bagula, Yacine Djemaiel, Noureddine Bouriga },
title = { A Survey on Storage Techniques in Cloud Computing },
journal = { International Journal of Computer Applications },
issue_date = { Apr 2017 },
volume = { 163 },
number = { 2 },
month = { Apr },
year = { 2017 },
issn = { 0975-8887 },
pages = { 22-30 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume163/number2/27369-2017913472/ },
doi = { 10.5120/ijca2017913472 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:09:05.442156+05:30
%A Samson Akintoye
%A Antoine Bagula
%A Yacine Djemaiel
%A Noureddine Bouriga
%T A Survey on Storage Techniques in Cloud Computing
%J International Journal of Computer Applications
%@ 0975-8887
%V 163
%N 2
%P 22-30
%D 2017
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In recent years, cloud computing is highly embraced and considered a must have in the IT world. Cloud computing is a computing paradigm, where a large pool of systems are connected in private, public or hybrid networks, to provide dynamically scalable infrastructure for computing resources. One of the services provided by cloud computing is cloud storage that enables the upload and the retrieval of different kinds of data. Accessing cloud storage service through Internet and pay as you used subscription have been the reasons for the emergence of methods and techniques to effectively store data and reduce storage security vulnerabilities in the cloud storage. This paper provides a survey of some proposed cloud storage methods and techniques, their advantages and drawbacks and makes stress on the current requirements for storage techniques in cloud computing.

References
  1. Vandana Bhatia and Ajay Jangra “SETiNS: Storage Efficiency Techniques in No-SQL database for Cloud Based Design” EEE International Conference on Advances in Engineering & Technology Research (ICAETR 2014),August 01-02, 2014, Dr. Virendra Swarup Group of Institutions, Unnao, India.
  2. D.Pratiba , Dr.G.Shobha and Vijaya Lakshmi.P.S “EFFICIENT DATA RETRIEVAL FROM CLOUD STORAGE USING DATA MINING TECHNIQUE” international Journal on Cybernetics & Informatics (IJCI) Vol. 4, No. 2, April 2015
  3. Tian Guo , Thanasis G. Papaioannou and Karl Aberer “Efficient Indexing and Query Processing of Model-View Sensor Data in the Cloud” Big Data Research, Published by Elsevier Inc http://dx.doi.org/10.1016/j.bdr.2014.07.005 2214-5796, 2014.
  4. Waraporn Leesakul, Paul Townend, Jie Xu “Dynamic Data Deduplication in Cloud Storage” 2014 IEEE 8th International Symposium on Service Oriented System Engineering, 2014
  5. [5 ] Xiao-Long Liu , Ruey-Kai Sheu , Shyan-Ming Yuan, Yu-Ning Wang “A file-deduplicated private cloud storage service with CDMI standard” Computer Standards & Interfaces, Published by Elsevier Inc http://dx.doi.org/10.1016/j.csi.2015.09.01044 (2016) 18–27
  6. Prabavathy B, Subha Devi M and Chitra Babu “Multi-Index Technique for Metadata Management in Private Cloud Storage” International Conference on Recent Trends in Information Technology (ICRTIT), IEEE, ISBN:978-1-4799-1024-3, 2013
  7. Ling-Yin Wei , Ya-Ting Hsu , Wen-Chih Peng and Wang-Chien Lee “Indexing spatial data in cloud data managements” Pervasive and Mobile Computing, Published by Elsevier Inc, http://dx.doi.org/10.1016/j.pmcj.2013.07.001, 1574-1192, 2013
  8. Cengiz Karakoyunlu and John A. Chandy “Exploiting user metadata for energy-aware node allocation in a cloud storage system” Journal of Computer and System Sciences, Published by Elsevier Inc, http://dx.doi.org/10.1016/j.jcss.2015.09.003, 2015
  9. Zhen Huang , Jinbang Chen , Yisong Lin , Pengfei You and Yuxing Peng “Minimizing data redundancy for high reliable cloud storage systems” journal of Computer Networks, Published by Elsevier Inc, http://dx.doi.org/10.1016/j.comnet.2015.02.013, 81 (2015) 164–177
  10. Li H, Dai Y and H. Yang, "Identity-BasedAuthentication for Cloud Computing", M. G. Jaatun, G.Zhao, and C. Rong (Eds.): Cloud Computing, Lecture Notes in Computer Science, 2009.
  11. Peter Mell, Tim Grance, The NIST Definition of Cloud Computing, Version 15, October 7, 2009
  12. M. Fallah, M. G. Arani and M. Maeen, "NASLA: Novel Auto Scaling Approach based on Learning Automata for Web Application in Cloud Computing Environment", International Journal of Computer Applications, vol. 113, no. 2, (2015), pp. 18-23.
  13. Bo Dong , Qinghua Zheng , Feng Tian , Kuo-Ming Chao , Rui Ma and Rachid Anane “An optimized approach for storing and accessing small files on cloud storage” Journal of Network and Computer Applications 35 (2012) 1847–1862
  14. K. D. Bowers, A. Juels, and A. Oprea. “Hail: Ahigh-availability and integrity layer for cloud storage.” In Proc. of the 16th ACM Conference on Computer and Communication Security (CCS), pages 187–198, November 2009.
  15. H. Abu-Libdeh, L. Princehouse, and H. Weatherspoon. Racs: A case for cloud storage diversity. Proc. of the 1st ACM Symposium on Cloud Computing, pages 1204–1216, June 2010.
  16. A. Bessani, M. Correia, B. Quaresma, F. Andre, , and P. Sousa. “Depsky: Dependable and secure storage in a cloud-of-clouds.” In Proc. of ACM EuroSys, 2011.
  17. H. C. H. Chen, Y. Hu, P. P. C. Lee, and Y. Tang. “Nccloud:a network coding based storage system in a cloud of clouds. January 2014.”
  18. L. Badger, T Grance, R. P. Comer and J. Voas, DRAFT cloud computing synopsis and recommendations, Recommendations of National Institute of Standards and Technology (NIST), May2012.
  19. L. Zhou, V. Varadharajan, and M. Hitchens "Achieving Secure Role-Based Access Control on Encrypted Data in Cloud Storage" Journal of IEEE Transactions on Information Forensics and Security archive Volume 8 Issue 12, December 2013 Page 1947-1960.
  20. L. Yang, X. Jia, K. Ren and B. Zhang “DAC-MACS: Effective Data Access Control for Multi-Authority Cloud Storage Systems” 2013 Proceedings IEEE INFOCOM
  21. Hadoop Archives. Hadoop archives guide; 2011. /http://hadoop.apache.org/common/docs/current/hadoop_archives.htmlS.
  22. S. B. Akintoye, and K. A. Akintoye “Data Security scheme for Cloud Computing using Signcryption Based on HyperElliptic curves" Journal of Research and Development,  Vol. 2, No. 7, Pg. 10–19, 2015.
Index Terms

Computer Science
Information Sciences

Keywords

Cloud computing Storage Technique Cloud Storage Cloud Security