Abstract

Cloud Computing has become a well-known primitive nowadays; many researchers and companies are embracing this fascinating technology with feverish haste. In the meantime, security and privacy challenges are brought forward while the number of cloud storage user increases expeditiously. In this work, we conduct an in-depth survey on recent research activities of cloud storage security in association with cloud computing. After an overview of the cloud storage system and its security problem, we focus on the key security requirement triad, i.e., data integrity, data confidentiality, and availability. For each of the three security objectives, we discuss the new unique challenges faced by the cloud storage services, summarize key issues discussed in the current literature, examine, and compare the existing and emerging approaches proposed to meet those new challenges, and point out possible extensions and futuristic research opportunities. The goal of our paper is to provide a state-of-the-art knowledge to new researchers who would like to join this exciting new field.

Highlights

  • Rapid advances in broadband communication and highspeed packet switching networks have made large file sharing much more effective during the past two decades

  • In order to support provable updates on the stored data, this new model utilized authenticated directories based on rank information, and it defined the update as block insertion, modification, or deletion to achieve dynamic Provable Data Possession (PDP) scheme

  • With the trend of rapid deployment of cloud storage and computing nowadays, it is essential for the cloud storage systems to be equipped with security solutions proven to be reliable and trustworthy

Read more

Summary

INTRODUCTION

Rapid advances in broadband communication and highspeed packet switching networks have made large file sharing much more effective during the past two decades. Instead of investing in new hardware and software, as well as maintaining those resources, users can use applications, infrastructures, servers, storage, network, and other computing resources that are available in the ‘cloud’, which is a shared pool of computing resources that can be accessed through. As one of the most influential and demanding computing resources in current digital era, is among the first being moved into the cloud This type of cloud computing services, known as cloud storage, represents a business model in which the service provider rent spaces in their large-scale storage infrastructure to organizations and individuals. The security requirements for cloud storage vary with different applications and users, they share the same three basic objectives as any computer information systems [2]: integrity, confidentiality and availability.

OVERVIEW OF SECURITY IN CLOUD STORAGE
DATA INTEGRITY
DATA CONFIDENTIALITY
AVAILABILITY
CONCLUSION AND FUTURE WORK
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call