A Survey over the Various Techniques Which used for Security of the Data in Cloud Storage

In recent time cloud computing provides an enhanced mechanism to access and share data which contain useful information, but that data stored in third party cloud server. Security of that data is the biggest issue in cloud computing. There are various techniques presented by the researchers to deal with such issues. There are techniques like privacy preserving techniques public auditing based techniques, batch auditing based techniques and some other techniques are used to provide authentication and provide security for the data in cloud storage. A review over the various techniques which used to provide security for the data over cloud storage is presented in this paper. For future work an enhanced technique for security can be proposed to deal with such problems.

[1]  Aarthi,et al.  Towards Secure and Dependable Storage Services in Cloud Computing , 2014 .

[2]  Laurence T. Yang,et al.  Shared Authority Based Privacy-Preserving Authentication Protocol in Cloud Computing , 2015, IEEE Transactions on Parallel and Distributed Systems.

[3]  Jian Liu,et al.  Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage , 2015, IEEE Transactions on Information Forensics and Security.

[4]  Xiaohua Jia,et al.  An Efficient and Secure Dynamic Auditing Protocol for Data Storage in Cloud Computing , 2013, IEEE Transactions on Parallel and Distributed Systems.

[5]  Priya Deshpande,et al.  Enhancing Distributed Data Storage Security for Cloud Computing Using TPA and AES Algorithm , 2015, 2015 International Conference on Computing Communication Control and Automation.

[6]  Larry A. Dunning,et al.  Privacy Preserving Data Sharing With Anonymous ID Assignment , 2013, IEEE Transactions on Information Forensics and Security.

[7]  Dr Tirumala Rao,et al.  Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud , 2017 .

[8]  Qiang Yue,et al.  G-Cloud: A Highly Reliable and Secure IaaS Platform , 2015, 2015 International Conference on Network and Information Systems for Computers.

[9]  Slawomir Grzonkowski,et al.  Sharing cloud services: user authentication for social enhancement of home networking , 2011, IEEE Transactions on Consumer Electronics.

[10]  Jadhav Poonam,et al.  Data sharing security and privacy preservation in cloud computing , 2015, 2015 International Conference on Green Computing and Internet of Things (ICGCIoT).

[11]  W. Marsden I and J , 2012 .

[12]  Osmanbey Uzunkol,et al.  An efficient ID-based message recoverable privacy-preserving auditing scheme , 2015, 2015 13th Annual Conference on Privacy, Security and Trust (PST).

[13]  Randy H. Katz,et al.  Above the Clouds: A Berkeley View of Cloud Computing , 2009 .

[14]  Athanasios V. Vasilakos,et al.  The design of a redundant array of independent net-storages for improved confidentiality in cloud computing , 2012, Journal of Cloud Computing: Advances, Systems and Applications.

[15]  D. Kumar,et al.  Anonymous Authentication for Decentralized Access Control of Cloud Data , 2015 .

[16]  N. Shanmugakani,et al.  An explicit integrity verification scheme for cloud distributed systems , 2015, 2015 IEEE 9th International Conference on Intelligent Systems and Control (ISCO).

[17]  Kai Hwang,et al.  Trusted Cloud Computing with Secure Resources and Data Coloring , 2010, IEEE Internet Computing.