Analysis of Cloud Storage and its Data Security

Article Preview

Abstract:

In this day and age, there is a disruptive shift in technology concerning the powerful ability of cloud storage that back up and store large data in the cloud, as well as syncing it across multiple devices automatically, and its drawbacks in data security. This paper mainly presents an overview of cloud storage, highlights many of security issues and vulnerabilities in cloud storage, lists various solutions, and then gives a summary.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

260-265

Citation:

Online since:

September 2013

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Yuanfang He, A research of mass data processing technology, in China Academic Journal Electronic Publishing House, 1671-7597 (2009)0420059-02, (2009).

Google Scholar

[2] M. Mowbray and S. Pearson, A Client-Based Privacy Manager for Cloud Computing, ACM 978-1-60558-353-2/09/06, June 16-19, 2009, Dublin, Ireland.

Google Scholar

[3] H. Abu-Libdeh, L. Princehouse and H. Weatherspoon, RACS: A Case for Cloud Storage Diversity, ACM 978-1-4503-0036-0/10/06, June 10-11, 2010, Indianapolis, Indiana, USA.

DOI: 10.1145/1807128.1807165

Google Scholar

[4] B K. Samanthula, G. Howser, Y. Elmehdwi and S Madria, An Efficient and Secure Data Sharing Framework using Homomorphic Encryption in the Cloud, ACM 978-1-4503-1596-8/12/08, August 31 2012, Istanbul, Turkey.

DOI: 10.1145/2347673.2347681

Google Scholar

[5] http: /baike. baidu. com/view/2044736. htm.

Google Scholar

[6] Huiqun Yu and Guisheng Fan, A review of application and development trend in cloud computing, Micmcomputer Applications Vol 27, No. 10, (2011).

Google Scholar

[7] Wenying Zeng, Yuelong Zhao, Kairi Ou and Wei Song, Research on Cloud Storage Architecture and Key Technologies, ACM 978-1-60558-710-3/09/11, November 24-26, 2009 Seoul, Korea.

Google Scholar

[8] Qinlu He, Zhanhuai Li and Xiao Zhang, Analysis of the key technology on cloud storage, appears in Future Information Technology and Management Engineering (FITME), 2010 International Conference on, pp.426-429, 9-10 Oct, (2010).

DOI: 10.1109/fitme.2010.5656540

Google Scholar

[9] Weihui Zhang, Wanliang Wang and Zhaolin Fang, A research of campus network storage system, Journal Of ZheJang University Of Technology, Vol 33 No. 5, Oct, (2005).

Google Scholar

[10] Longli Zhang, Cloud Storage Technology, in China Academic Journal Electronic Publishing House, [Online] http: /www. cnki. net, Aug, (2010).

Google Scholar

[11] Qianlin Tan, The Development Trend of Library's data storage—Clould Storage, SCI-TECH INFORMATION DEVELOPMENT&ECONOMY, Aug, (2011).

Google Scholar

[12] Lingdi Ping, Xiaoping Ge, Ya Wang, etc, etc, Cloud Storage as the Infrastructure of Cloud Computing, Intelligent Computing and Cognitive Informatics (ICICCI), 2010 International Conference on.

DOI: 10.1109/icicci.2010.119

Google Scholar

[13] pp.380-383, 22-23 June (2010).

Google Scholar

[14] D J. Abadi, Data Management in the Cloud: Limitations and Opportunities, Bulletin of the IEEE Computer Society Technical Committee on Data Engineering.

Google Scholar

[15] HeQun Wang, The Applications of cloud storage, in China Academic Journal Electronic Publishing House, 2008, [Online] http: /www. cnki. net.

Google Scholar

[16] http: /tech. qq. com/a/20120910/000113. htm.

Google Scholar

[17] Yi Yang, Yingchun Lai, Analysis of security issues in the cloud computing environment, COMPUTER KNOWLEDGE AND TECHNOLOGY, V01. 5,No. 16, June 2009, PP. 4154-4156.

Google Scholar

[18] Prof. Dr. C. Weinhardt, Dr. B. Blau, Dipl. -Inform. N. Borissov, etc, etc, Cloud Computing–A Classification, Business Models and Research Directions, Business & Information Systems Engineering, Mar, (2009).

DOI: 10.1007/s12599-009-0071-2

Google Scholar

[19] Jian Tang, Research and Application of the Cloud Computation Storage System, Computer Knowledge and Technology, V01. 5, No. 20, July 2009, pp.5337-5338, 5340.

Google Scholar

[20] http: /www. ctocio. com. cn/cloud/118/12569118. shtml.

Google Scholar

[21] http: /www. techweb. com. cn/news/2012-03-06/1162453. shtml.

Google Scholar

[22] http: /www. enet. com. cn/article/2012/0809/A20120809148254. shtml.

Google Scholar

[23] http: /it. 21cn. com/itnews/a/2013/0105/18/20177676. shtml.

Google Scholar

[24] Kehuan Zhang, Xiaoyong Zhou, Yaoping Ruan, etc, Sedic: Privacy-Aware Data Intensive Computing on Hybrid Clouds, ACM 978-1-4503-0948-6/11/10, October 17-21, 2011, Chicago, Illinois, USA.

DOI: 10.1145/2046707.2046767

Google Scholar

[25] P A. Boampong and L A. Wahsheh, Different Facets of Security in the Cloud.

Google Scholar

[26] http: /soft. yesky. com/security/446/34424446. shtml.

Google Scholar

[27] http: /group. vsharing. com/News/Diary. aspx?id=31281.

Google Scholar

[28] Hai Zhong, Analysis of the advantages and limitations of the cloud storage applications, Science & Technology Information, 2011 [Online] http: /d. g. wanfangdata. com. cn/Periodical_kjxx201135488. aspx.

Google Scholar

[28] Xing San, Ali Cloud Storage OSS-Nine Tips, Porgrammer, I0024-I0027, (2012).

Google Scholar

[30] D. Song, D. Wagner and A. Perrig, Practical Techniques for Searches on Encrypted Data, in IEEE Symposium on Research in Security and Privacy, (2000).

DOI: 10.1109/secpri.2000.848445

Google Scholar

[31] R. Chow, P Golle, M Jakobsson, R Masuoka and etc, Controlling Data in the Cloud: Outsourcing Computation without Outsourcing Control, ACM 978-1-60558-784-4/09/11, November 13, 2009, Chicago, Illinois, USA.

DOI: 10.1145/1655008.1655020

Google Scholar

[32] Govinda. K and Perla Ravitheja, Identity Anonymization and Secure Data Storage using Group Signature in Private Cloud, ACM 978-1-4503-1196-0/12/08, August 03-05, 2012, CHENNAI, India.

DOI: 10.1145/2345396.2345418

Google Scholar

[33] P. S Kumar, R. Subramanian and D. T Selvam, Ensuring Data Storage Security in Cloud Computing using Sobol Sequence, proceedings of the 1st International Conference on Parallel, Distributed and Grid Computing (PDGC-2010) 978-1-4244-7674-9/10/ ©2010 IEEE.

DOI: 10.1109/pdgc.2010.5679900

Google Scholar

[34] Wee Keong Ng, Yonggang Wen, Huafei Zhu, Private Data Deduplication Protocols in Cloud Storage, ACM 978-1-4503-0857-1/12/03, March 25-29, 2012, Riva del Garda, Italy.

Google Scholar

[35] Lei Wan, Chunlu Wang and Chuanyi Liu, Secure Cloud Storage with Data De-duplication, [Online] http: /www. paper. edu. cn.

Google Scholar

[36] Paolo Gasti, Giuseppe Ateniese and Marina Blanton, Deniable Cloud Storage: Sharing Files via Public-key Deniability, ACM 978-1-4503-0096-4/10/10, October 4, 2010, Chicago, Illinois, USA.

DOI: 10.1145/1866919.1866925

Google Scholar

[37] Wang, C, Q. Wang, K. Ren, and W. Lou, Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing, In Proceedings of the IEEE INFOCOM, p.1–9, (2010).

DOI: 10.1109/infcom.2010.5462173

Google Scholar

[38] Qian Wang, Cong Wang, Kui Ren, Wenjing Lou and Jin Li, Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing, IEEECS Log Number TPDS-2010-03-0184, Digital Object Identifier no. 10. 1109/TPDS. 2010. 183, 20 Oct. (2010).

DOI: 10.1109/iwqos.2009.5201385

Google Scholar

[39] Puneet Jai Kaur and Sakshi Kaushal, Security Concerns in Cloud Computing, A. Mantri et al. (Eds. ): HPAGC 2011, CCIS 169, p.103–112, 2011, © Springer-Verlag Berlin Heidelberg (2011).

Google Scholar

[40] N. Santos, R. Rodrigues, K P. Gummadi, S. Saroiu, Policy-Sealed Data: A New Abstraction for Building Trusted Cloud Services", proceeding in Security, 12 Proceedings of the 21st USENIX conference on Security symposium, pp.10-10, USENIX Association Berkeley, CA, USA ©(2012).

Google Scholar

[41] J A. Nicholson, Plus Ultra: Third-Party Preservation in a Cloud Computing Paradigm, Winter, 2012, Hastings Business Law Journal 8 Hastings Bus. L.J. 191.

Google Scholar