• Corpus ID: 14245648

A Survey on the Architectures of Data Security in Cloud Storage Infrastructure

@inproceedings{Brindha2013ASO,
  title={A Survey on the Architectures of Data Security in Cloud Storage Infrastructure},
  author={Thomas Brindha and Ramaswamy Swarnammal Shaji and G. Rajesh},
  year={2013}
}
Cloud computing is a most alluring technology that facilitates conducive, on-demand network access based on the requirement of users with nominal effort on management and interaction among cloud providers. The cloud storage serves as a dependable platform for long term storage needs which enables the users to move the data to the cloud in a rapid and secure manner. It assists activities and government agencies considerably decrease their economic overhead of data organization, as they can store… 

Figures from this paper

Secure and Efficient Cloud Computing Framework
TLDR
A cloud computing framework that classifies the data based on their importance so that more important data will be encrypted with more secure encryption algorithm and larger key sizes, while less important data might even not be encrypted.
Secure Cloud Simulation Using Hybrid Algorithm
TLDR
The whole prototype of the proposed solution would benefit by enabling a proper access mechanism to avoid unauthorized access to the information system and secure storage to allow access of data.
A Systematic Framework for Providing Secured Transaction of Data in Cloud Computing Environment
TLDR
Experiments are conducted and the performance analysis shows that the transactional security rate on data layer and the true positive rate are improved.
A review of cloud security based on cryptographic mechanisms
TLDR
This paper presents a review of basic security challenges consisting of traditional security issues and the additional challenges that take place as a result of using cloud computing model by providers and users of cloud systems.
Software-defined systems support for secure cloud computing based on data classification
TLDR
This paper introduces a Software-Defined System-based solution for deploying efficient data classification framework and shows the superiority of the proposed model.
KEYWORD BASED AUTOCLASSIFICATION OF DATA IN CLOUD COMPUTING
TLDR
An introduction to cloud computational schema which differentiates information reckoning on significant properties and helps debasing the process charges and complicatedness of information storage since there is no compulsion for applying the similar refined encryption procedure for all user records.
Protective and efficacious cloud evaluating schema
  • B. S. Gautham, N. Lal, N. Murthy
  • Computer Science
    2017 International Conference on Energy, Communication, Data Analytics and Soft Computing (ICECDS)
  • 2017
TLDR
An introduction to cloud computational schema which differentiates information reckoning on significant properties and helps debasing the process charges and complicatedness of information storage.

References

SHOWING 1-10 OF 28 REFERENCES
Toward Secure and Dependable Storage Services in Cloud Computing
TLDR
This paper proposes a flexible distributed storage integrity auditing mechanism, utilizing the homomorphic token and distributed erasure-coded data, which is highly efficient and resilient against Byzantine failure, malicious data modification attack, and even server colluding attacks.
Toward publicly auditable secure cloud data storage services
TLDR
This article proposes that publicly auditable cloud data storage is able to help this nascent cloud economy become fully established and describes approaches and system requirements that should be brought into consideration, and outlines challenges that need to be resolved.
Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing
TLDR
This paper utilize and uniquely combine the public key based homomorphic authenticator with random masking to achieve the privacy-preserving public cloud data auditing system, which meets all above requirements.
PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD COMPUTING
TLDR
This paper uniquely defines the fundamental properties of threshold-multisignature schemes and shows that the proposed scheme satisfies these properties and eliminates the latest attacks to which other similar schemes are subject.
Privacy-Preserving Public Auditing for Secure Cloud Storage
TLDR
A secure cloud storage system supporting privacy-preserving public auditing and the result is extended to enable the TPA to perform audits for multiple users simultaneously and efficiently.
A Proposed Model for Enhancing Data Storage Security in Cloud Computing Systems
TLDR
The main focus is given to highlight the security aspects of data storage from perspectives of threats and attacks from one side and approaches for solutions from the other side and an effective and flexible distributed scheme with two salient features, opposing to its predecessors is proposed.
Ensuring Data Storage Security in Cloud Computing
TLDR
A new data encoding scheme called layered interleaving is proposed, designed for time-sensitive packet recovery in the presence of bursty loss, which is highly efficient in recovering the singleton losses almost immediately and from bursty data losses.
Data Security Mechanism for Cloud
TLDR
This paper emphasizes on improving existing authentication mechanism & implementing data security schemes to secure data from the Data Flow.
Efficient and secure data storage operations for mobile cloud computing
  • Z. Zhou, Dijiang Huang
  • Computer Science
    2012 8th international conference on network and service management (cnsm) and 2012 workshop on systems virtualiztion management (svm)
  • 2012
TLDR
This work presents a novel Privacy Preserving Cipher Policy Attribute-Based Encryption (PP-CP-ABE) to protect sensing data and proposes an Attribute Based Data Storage (ABDS) system as a cryptographic group-based access control mechanism.
Secure Overlay Cloud Storage with Access Control and Assured Deletion
TLDR
This work design and implement FADE, a secure overlay cloud storage system that achieves fine-grained, policy-based access control and file assured deletion, and associates outsourced files with file access policies, and assuredly deletes files to make them unrecoverable to anyone upon revocations of fileAccess policies.
...
...