A Survey on Various Cloud Storage Schemes for Preserving Privacy and Preventing Data Loss

Cloud storage is provided as a service where data is managed, maintained and also made globally available to the service requesters. The data uploaded by requesters is managed by Cloud Service Provider (CSP). This leads to separation of ownership and management of data. CSP has free access to such data which is also vulnerable to attack from outsiders. Data stored in cloud is also susceptible to cloud server failure. These circumstances lead to risk of information leakage and data loss. In this paper we review the various methods which address privacy issues and data loss in Cloud computing. Keywords— Privacy, encryption, cloud service provider, partitioning, cloud sever, fog server

[1]  Yulin Wang,et al.  Homomorphic cloud computing scheme based on hybrid homomorphic encryption , 2017, 2017 3rd IEEE International Conference on Computer and Communications (ICCC).

[2]  Ajey Singh,et al.  Evaluating a cryptographic Overview of Attacks on Cloud Computing , 2012 .

[3]  Xu Tao,et al.  Data privacy protection using multiple cloud storages , 2013, Proceedings 2013 International Conference on Mechatronic Sciences, Electric Engineering and Computer (MEC).

[4]  Atulay Mahajan,et al.  The Malicious Insiders Threat in the Cloud , 2015 .

[5]  Yau-Hwang Kuo,et al.  An effective privacy protection scheme for cloud computing , 2011, 13th International Conference on Advanced Communication Technology (ICACT2011).

[6]  Xiao Liu,et al.  Time-Series Pattern Based Effective Noise Generation for Privacy Protection on Cloud , 2015, IEEE Transactions on Computers.

[7]  Khandakar Ahmed,et al.  Identity and Access Management in Cloud Computing , 2011 .

[8]  Peidong Sha,et al.  The modification of RSA algorithm to adapt fully homomorphic encryption algorithm in cloud computing , 2016, 2016 4th International Conference on Cloud Computing and Intelligence Systems (CCIS).

[9]  James A. Thom,et al.  Cloud Computing Security: From Single to Multi-clouds , 2012, 2012 45th Hawaii International Conference on System Sciences.

[10]  Deepak H. Sharma,et al.  Managed data loss prevention security service in cloud , 2016 .

[11]  Junsheng Zhang,et al.  Data Security and Privacy in Cloud Computing , 2014 .

[12]  M. Somasundaram,et al.  Data loss protection and data security using agents for cloud environment , 2016, 2016 International Conference on Computing Technologies and Intelligent Data Engineering (ICCTIDE'16).

[13]  Yue Wang,et al.  Privacy protection based access control scheme in cloud-based services , 2016, 2016 IEEE/CIC International Conference on Communications in China (ICCC).

[14]  Neha Thakur,et al.  Data Integrity Techniques in Cloud Computing: An Analysis , 2017 .

[15]  Dr.Richa Purohit Comparative Analysis of few Cloud Service Providers Considering Their Distinctive Properties , 2017 .

[16]  Anfeng Liu,et al.  A Three-Layer Privacy Preserving Cloud Storage Scheme Based on Computational Intelligence in Fog Computing , 2018, IEEE Transactions on Emerging Topics in Computational Intelligence.

[17]  Manas Ranjan Patra,et al.  Cloud Computing: Security Issues and Research Challenges , 2011 .

[18]  . K.V.KMaheshKumar,et al.  SOFTWARE AS A SERVICE FOR EFFICIENT CLOUD COMPUTING , 2014 .

[19]  Jae-Woo Chang,et al.  A Privacy-Preserving kNN Classification Algorithm Using Yao's Garbled Circuit on Cloud Computing , 2017, 2017 IEEE 10th International Conference on Cloud Computing (CLOUD).

[20]  Hong Zhao,et al.  Data Security and Privacy Protection Issues in Cloud Computing , 2012, 2012 International Conference on Computer Science and Electronics Engineering.

[21]  Nitin Pandey,et al.  Information Leakage Prevention In Cloud Computing , 2014 .

[22]  Khalid Alshafee Encryption Techniques in the Cloud , 2016 .