A Survey on Secure Storage Services in Cloud Computing

1
Ms. B.Tejaswi
Ms. B.Tejaswi
2
Dr.L.V.Reddy
Dr.L.V.Reddy
3
Ms. M.Leelavathi
Ms. M.Leelavathi
1 Sree Vidyanikethan Engg College
2 Department of. CSE, SVEC,A.Rangampeta

Send Message

To: Author

GJCST Volume 12 Issue B12

Article Fingerprint

ReserarchID

CSTBI4983

A Survey on Secure Storage Services in Cloud Computing Banner
  • English
  • Afrikaans
  • Albanian
  • Amharic
  • Arabic
  • Armenian
  • Azerbaijani
  • Basque
  • Belarusian
  • Bengali
  • Bosnian
  • Bulgarian
  • Catalan
  • Cebuano
  • Chichewa
  • Chinese (Simplified)
  • Chinese (Traditional)
  • Corsican
  • Croatian
  • Czech
  • Danish
  • Dutch
  • Esperanto
  • Estonian
  • Filipino
  • Finnish
  • French
  • Frisian
  • Galician
  • Georgian
  • German
  • Greek
  • Gujarati
  • Haitian Creole
  • Hausa
  • Hawaiian
  • Hebrew
  • Hindi
  • Hmong
  • Hungarian
  • Icelandic
  • Igbo
  • Indonesian
  • Irish
  • Italian
  • Japanese
  • Javanese
  • Kannada
  • Kazakh
  • Khmer
  • Korean
  • Kurdish (Kurmanji)
  • Kyrgyz
  • Lao
  • Latin
  • Latvian
  • Lithuanian
  • Luxembourgish
  • Macedonian
  • Malagasy
  • Malay
  • Malayalam
  • Maltese
  • Maori
  • Marathi
  • Mongolian
  • Myanmar (Burmese)
  • Nepali
  • Norwegian
  • Pashto
  • Persian
  • Polish
  • Portuguese
  • Punjabi
  • Romanian
  • Russian
  • Samoan
  • Scots Gaelic
  • Serbian
  • Sesotho
  • Shona
  • Sindhi
  • Sinhala
  • Slovak
  • Slovenian
  • Somali
  • Spanish
  • Sundanese
  • Swahili
  • Swedish
  • Tajik
  • Tamil
  • Telugu
  • Thai
  • Turkish
  • Ukrainian
  • Urdu
  • Uzbek
  • Vietnamese
  • Welsh
  • Xhosa
  • Yiddish
  • Yoruba
  • Zulu

Cloud computing is an emerging technology and it is purely based on internet and its environment. It provides different services to users such as Software-as-a-Service (SaaS), PaaS, IaaS, Storage-as-a-service (SaaS). Using Storage-as-a-Service, users and organizations can store their data remotely which poses new security risks towards the correctness of data in cloud. In order to achieve secure cloud storage, there exists different techniques such as flexible distributed storage integrity auditing mechanism, distributed erasure-coded data, Merkle Hash Tree(MHT) construction etc. These techniques support secure and efficient dynamic data storage in the cloud. This paper also deals with architectures for security and privacy management in the cloud storage environment.

11 Cites in Articles

References

  1. Inc (2009). Building Customer Trust in Cloud Computing with Transparent Security.
  2. Kui Ren,Cong Wang,Qian Wang (2012). Security Challenges for the Public Cloud.
  3. A Juels,B Kaliski (2007). PORs: Proofs of Retrievability for Large Files.
  4. G Ateniese,R Burns,R Curtmola,J Herring,L Kissner,Z Peterson,D Song (2007). Provable Data Possession at Untrusted Stores.
  5. M Shah,M Baker,J Mogul,R Swaminathan (2007). Auditing to Keep Online Storage Services Honest.
  6. M Shah,R Swaminathan,M Baker (2008). Privacy-Preserving Audit and Extraction of Digital Contents.
  7. Qian Wang,Cong Wang,Jin Li,Kui Ren,Wenjing Lou (2009). Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing.
  8. Q Wang,K Ren,W Lou,Y Zhang (2009). Dependable and Secure Sensor Data Storage with Dynamic Integrity Assurance.
  9. Dan Boneh,Craig Gentry,Ben Lynn,Hovav Shacham (2003). Aggregate and Verifiably Encrypted Signatures from Bilinear Maps.
  10. Siani Pearson,Yun Shen,Miranda Mowbray (2009). A Privacy Manager for Cloud Computing.
  11. Anna Squicciarini,Smitha Sundareswaran,Dan Lin (2010). Preventing Information Leakage from Indexing in the Cloud.

Funding

No external funding was declared for this work.

Conflict of Interest

The authors declare no conflict of interest.

Ethical Approval

No ethics committee approval was required for this article type.

Data Availability

Not applicable for this article.

Ms. B.Tejaswi. 2012. \u201cA Survey on Secure Storage Services in Cloud Computing\u201d. Global Journal of Computer Science and Technology - B: Cloud & Distributed GJCST-B Volume 12 (GJCST Volume 12 Issue B12): .

Download Citation

Issue Cover
GJCST Volume 12 Issue B12
Pg. 19- 23
Journal Specifications

Crossref Journal DOI 10.17406/gjcst

Print ISSN 0975-4350

e-ISSN 0975-4172

Classification
Not Found
Version of record

v1.2

Issue date

December 28, 2012

Language

English

Experiance in AR

The methods for personal identification and authentication are no exception.

Read in 3D

The methods for personal identification and authentication are no exception.

Article Matrices
Total Views: 9883
Total Downloads: 2536
2026 Trends
Research Identity (RIN)
Related Research

Published Article

Cloud computing is an emerging technology and it is purely based on internet and its environment. It provides different services to users such as Software-as-a-Service (SaaS), PaaS, IaaS, Storage-as-a-service (SaaS). Using Storage-as-a-Service, users and organizations can store their data remotely which poses new security risks towards the correctness of data in cloud. In order to achieve secure cloud storage, there exists different techniques such as flexible distributed storage integrity auditing mechanism, distributed erasure-coded data, Merkle Hash Tree(MHT) construction etc. These techniques support secure and efficient dynamic data storage in the cloud. This paper also deals with architectures for security and privacy management in the cloud storage environment.

Our website is actively being updated, and changes may occur frequently. Please clear your browser cache if needed. For feedback or error reporting, please email [email protected]
×

This Page is Under Development

We are currently updating this article page for a better experience.

Request Access

Please fill out the form below to request access to this research paper. Your request will be reviewed by the editorial or author team.
X

Quote and Order Details

Contact Person

Invoice Address

Notes or Comments

This is the heading

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

High-quality academic research articles on global topics and journals.

A Survey on Secure Storage Services in Cloud Computing

Ms. B.Tejaswi
Ms. B.Tejaswi Sree Vidyanikethan Engg College
Dr.L.V.Reddy
Dr.L.V.Reddy Department of. CSE, SVEC,A.Rangampeta
Ms. M.Leelavathi
Ms. M.Leelavathi

Research Journals