Refine your search
Collections
Co-Authors
Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Rajathi, A.
- A Survey on Secure Storage in Cloud Computing
Abstract Views :1002 |
PDF Views:243
Authors
A. Rajathi
1,
N. Saravanan
1
Affiliations
1 School of Computing , SASTRA University, 613401, Thanjavur, Tamilnadu, IN
1 School of Computing , SASTRA University, 613401, Thanjavur, Tamilnadu, IN
Source
Indian Journal of Science and Technology, Vol 6, No 4 (2013), Pagination: 4396-4401Abstract
Cloud Computing is an environment for providing information and resources that are delivered as a service to end-users over the Internet on demand. Thus cloud enables users to access their data from any geographical locations at any time and also has brought benefits in the form of online storage services. Cloud storage service avoids the cost expensive on software, personnel maintenance and provides better performance, less storage cost and scalability. But the maintenance of stored data in a secure manner is not an easy task in cloud environment and especially that stored data may not be completely trustworthy. Cloud delivers services through internet which increases their exposure to storage security vulnerabilities. However security is one of the major drawbacks that preventing several large organizations to enter into cloud computing environment. This work surveyed on several existing cloud storage frameworks, techniques and their advantages, drawbacks and also discusses the challenges that are required to implement secure cloud data storage. This survey results help to identify the future research areas and methods for improving the existing drawbacks.Keywords
Cloud Computing, Data, Security, Storage Techniques and SurveyReferences
- Parakh A, and Kak S (2009). Online data storage using implicit security, Information Sciences, vol 179(19), 3323-3331.
- Li H, Dai Y et al. (2009), Identity-Based Authentication for Cloud Computing, M. G. Jaatun, G. Zhao, and C. Rong (Eds.): Cloud Computing, Lecture Notes in Computer Science, vol 5931, 157-166.
- Wang Q, Wang C et al. (2011). Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing, IEEE Transactions on Parallel and Distributed Systems, vol 22(5), 847-859.
- Balakrishnan S, Saranya G, et al. (2011). Introducing Effective Third Party Auditing (TPA) for Data Storage Security in Cloud, International Journal of Computer Science and Technology, vol 2(2), 397-400.
- Dinesh C (2011). Data Integrity and Dynamic Storage Way in Cloud Computing, Distributed, Parallel, and Cluster Computing.
- Kumar S P, Subramanian R (2011). An efficient and secure protocol for ensuring data storage security in Cloud Computing, International Journal of Computer Science Issues, vol 8(6), No 1, 261-274.
- Sajithabanu S, Raj E G P (2011). Data Storage Security in Cloud, International Journal of Computer Science and Technology, vol 2(4), 436-440
- Wang C, Wang Q et al. (2012), Toward Secure and Dependable Storage Services in Cloud Computing, IEEE Transactions on Services Computing, vol 5(2), 220-232.
- Spillner J, Müller J et al. (2012), Creating optimal cloud storage systems, Future Generation Computer Systems, vol 29(4), 1062-1072.
- Dong B, Zheng Q et al. (2012). An optimized approach for storing and accessing small files on cloud storage, Journal of Network and Computer Applications, 35 (6), 1847-1862.
- Deshmukh P M, Gughane A S et al. (2012). Maintaining File Storage Security in Cloud Computing, International Journal of Emerging Technology and Advanced Engineering, vol 2(10), 2250-2459.
- Tang Y, Lee P P C et al (2010). FADE: a secure overlay cloud storage system with File Assured Deletion, 6th International ICST Conference, Secure Comm.
- Wang W, Li Z et al. (2009). Secure and Efficient Access to Outsourced Data, CCSW ‘09 Proceedings of the 2009 ACM workshop on Cloud computing security, 55-66.