CFP last date
20 January 2025
Reseach Article

A Review: A Survey on Privacy Preserving for Secure Cloud Storage

by Areeba Kazim, Ritika Varshney
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 177 - Number 13
Year of Publication: 2019
Authors: Areeba Kazim, Ritika Varshney
10.5120/ijca2019919515

Areeba Kazim, Ritika Varshney . A Review: A Survey on Privacy Preserving for Secure Cloud Storage. International Journal of Computer Applications. 177, 13 ( Oct 2019), 9-11. DOI=10.5120/ijca2019919515

@article{ 10.5120/ijca2019919515,
author = { Areeba Kazim, Ritika Varshney },
title = { A Review: A Survey on Privacy Preserving for Secure Cloud Storage },
journal = { International Journal of Computer Applications },
issue_date = { Oct 2019 },
volume = { 177 },
number = { 13 },
month = { Oct },
year = { 2019 },
issn = { 0975-8887 },
pages = { 9-11 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume177/number13/30955-2019919515/ },
doi = { 10.5120/ijca2019919515 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:45:44.932225+05:30
%A Areeba Kazim
%A Ritika Varshney
%T A Review: A Survey on Privacy Preserving for Secure Cloud Storage
%J International Journal of Computer Applications
%@ 0975-8887
%V 177
%N 13
%P 9-11
%D 2019
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Cloud computing technology provides millions of on demand services to its users on internet ranging from infrastructure, software to storage as a service on cloud. Storage service allows its users to outsource large amount of data without directly controlling it and cloud running on the principle of virtually shared servers do not provide users with the storage location. Therefore, various measures can be adopted for maintaining data integrity, security while entering data in cloud. So here, we are having open audit-ability for distributed storage that shoppers will rely on an outsider examiner (TPA) to test the trait of knowledge. This paper offers the problems known with security whereas golf shot away the client's data to the distributed storage amid the examining. During this paper we'll examine totally different systems to fathom these problems to present protection and security of cloud data. There’s lots of analysis being created to identify problems associated CSPs and security.

References
  1. Mohammed, A., AlSudiari, T., &Vasista, T. G. K. 2012. Cloud Computing And Privacy Regulations: An Exploratory Study On Issues And Implications.AdvancedComputing:AnInternationalJournal (ACIJ), 3 (2), 159-169.
  2. Ateniese, G., Burns, R., Curtmola, R., Herring, J., Kissner, L., Peterson, Z., & Song, D. 2007, October. Provabledata possession at untreated stores. In Proceedings of the 14th ACM conference on Computer and communications security (pp. 598-609). ACM.
  3. Ruj, S., Stojmenovic, M., & Nayak, A. 2012, May. Privacy Preserving Access Control with Authentication for Securing Data in Clouds. In Cluster, Cloud and Grid Computing (CCGrid), 12th IEEE/ACM International Symposium on(pp. 556-563),IEEE
  4. P. Mel and T. Grace, “Draft NIST Working Definition of cloud computing,”http://csrc.nist.gov/groups/SNS/cloudcomputing/index.html, June 2009
  5. M. Armrest, A. Fox, R. Griffith, A.D. Joseph, R.H. Katz, A. Kaminski, G. Lee, D.A. Patterson, A. Rabin, Stoical, and M. v nZaharias, “Above the Clouds: A Berkeley View of Cloud Compute- in,” Technical Report UCB-EECS-2009-28, Univ. of California, Berkeley, Feb. 2009.
  6. Pearson, S. 2012. Privacy, Security and Trust in Cloud Computing. Privacy and Security for Cloud Computing,pp.3-42.
  7. Cloud Security Alliance, “Top Threats to Cloud Computing,” http://www.cloudsecurityalliance.org, 2010
  8. A. Juels and J. Burton, S. Kaliski, “PORs: Proofs of Retrievability for Large Files,” Proc. ACM Conf. Computer and Comm.Security (CCS ’07), pp. 584-597, Oct. 2007.
  9. H. Shacham and B. Waters, “Compact Proofs of retrievability,”Proc. Int’l Conf. Theory and Application of Cryptology and Information Security: Advances in Cryptology (Asiacrypt), vol. 5350, pp. 90-107, Dec. 2008
  10. M.A. Shah, M. Baker, J.C. Mogul, and R. Swaminathan, “Auditing to Keep Online Storage Services Honest,” Proc. 11th USENIX Workshop Hot Topics in Operating Systems (HotOS ’07), pp. 1-6, 2007.
  11. Huang, Z., Li, Q., Zheng, D., Chen, K., & Li, X. 2011, December. YI Cloud: Improving user privacy with secret key recovery in cloud storage. In Service Oriented System engineering (SOSE), 2011 IEEE 6th International Symposium on (pp. 268-272),IEEE.
  12. Huang, R., Gui, X., Yu, S., & Zhuang, W. 2011. Research on privacy-preserving cloud storage framework supporting ciphertext retrieval. In Network Computing and Information Security (NCIS), 2011 International Conference on (Vol. 1, pp. 93-97),IEEE
  13. .Fan, C. I., & Huang, S. Y. 2012. Controllable privacy preserving search based on symmetric predicate encryption in cloud storage. Future Generation Computer Systems.
  14. Wang, C., Chow, S., Wang, Q., Ren, K., & Lou, W. 2010. Privacy-preserving public auditing for secure cloud storage.
  15. Ruj, S., Stojmenovic, M., & Nayak, A. 2012, May. Privacy Preserving Access Control with Authentication for Securing Data in Clouds. In Cluster, Cloud and Grid Computing (CCGrid),12th IEEE/ACM International Symposium on(pp. 556-563),IEEE.
  16. Yang, K., & Jia, X. 2012. Data storage auditing service in cloud computing: challenges, methods and opportunities. World Wide Web, 15(4), 409-428
  17. Wang, Q., Wang, C., Ren, K., Lou, W., & Li, J. 2011. Enabling public auditability and data dynamics for storage security in cloud computing. Parallel and Distributed Systems, IEEE Trans. on, 22(5), 847-859.
Index Terms

Computer Science
Information Sciences

Keywords

Access Control Data Architecture Outsourcing Privacy Security Integrity