A Survey on Secure Storage Services in Cloud Computing

α
Ms. B.Tejaswi
Ms. B.Tejaswi
σ
Dr.L.V.Reddy
Dr.L.V.Reddy
ρ
Ms. M.Leelavathi
Ms. M.Leelavathi
α to σ Jawaharlal Nehru Technological University Anantapur Jawaharlal Nehru Technological University Anantapur

Send Message

To: Author

A Survey on Secure Storage Services in Cloud Computing

Article Fingerprint

ReserarchID

CSTBI4983

A Survey on Secure Storage Services in Cloud Computing Banner

AI TAKEAWAY

Connecting with the Eternal Ground
  • English
  • Afrikaans
  • Albanian
  • Amharic
  • Arabic
  • Armenian
  • Azerbaijani
  • Basque
  • Belarusian
  • Bengali
  • Bosnian
  • Bulgarian
  • Catalan
  • Cebuano
  • Chichewa
  • Chinese (Simplified)
  • Chinese (Traditional)
  • Corsican
  • Croatian
  • Czech
  • Danish
  • Dutch
  • Esperanto
  • Estonian
  • Filipino
  • Finnish
  • French
  • Frisian
  • Galician
  • Georgian
  • German
  • Greek
  • Gujarati
  • Haitian Creole
  • Hausa
  • Hawaiian
  • Hebrew
  • Hindi
  • Hmong
  • Hungarian
  • Icelandic
  • Igbo
  • Indonesian
  • Irish
  • Italian
  • Japanese
  • Javanese
  • Kannada
  • Kazakh
  • Khmer
  • Korean
  • Kurdish (Kurmanji)
  • Kyrgyz
  • Lao
  • Latin
  • Latvian
  • Lithuanian
  • Luxembourgish
  • Macedonian
  • Malagasy
  • Malay
  • Malayalam
  • Maltese
  • Maori
  • Marathi
  • Mongolian
  • Myanmar (Burmese)
  • Nepali
  • Norwegian
  • Pashto
  • Persian
  • Polish
  • Portuguese
  • Punjabi
  • Romanian
  • Russian
  • Samoan
  • Scots Gaelic
  • Serbian
  • Sesotho
  • Shona
  • Sindhi
  • Sinhala
  • Slovak
  • Slovenian
  • Somali
  • Spanish
  • Sundanese
  • Swahili
  • Swedish
  • Tajik
  • Tamil
  • Telugu
  • Thai
  • Turkish
  • Ukrainian
  • Urdu
  • Uzbek
  • Vietnamese
  • Welsh
  • Xhosa
  • Yiddish
  • Yoruba
  • Zulu

Abstract

Cloud computing is an emerging technology and it is purely based on internet and its environment. It provides different services to users such as Software-as-a-Service (SaaS), PaaS, IaaS, Storage-as-a-service (SaaS). Using Storage-as-a-Service, users and organizations can store their data remotely which poses new security risks towards the correctness of data in cloud. In order to achieve secure cloud storage, there exists different techniques such as flexible distributed storage integrity auditing mechanism, distributed erasure-coded data, Merkle Hash Tree(MHT) construction etc. These techniques support secure and efficient dynamic data storage in the cloud. This paper also deals with architectures for security and privacy management in the cloud storage environment.

References

11 Cites in Article
  1. Inc (2009). Building Customer Trust in Cloud Computing with Transparent Security.
  2. Kui Ren,Cong Wang,Qian Wang (2012). Security Challenges for the Public Cloud.
  3. A Juels,B Kaliski (2007). PORs: Proofs of Retrievability for Large Files.
  4. G Ateniese,R Burns,R Curtmola,J Herring,L Kissner,Z Peterson,D Song (2007). Provable Data Possession at Untrusted Stores.
  5. M Shah,M Baker,J Mogul,R Swaminathan (2007). Auditing to Keep Online Storage Services Honest.
  6. M Shah,R Swaminathan,M Baker (2008). Privacy-Preserving Audit and Extraction of Digital Contents.
  7. Qian Wang,Cong Wang,Jin Li,Kui Ren,Wenjing Lou (2009). Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing.
  8. Q Wang,K Ren,W Lou,Y Zhang (2009). Dependable and Secure Sensor Data Storage with Dynamic Integrity Assurance.
  9. Dan Boneh,Craig Gentry,Ben Lynn,Hovav Shacham (2003). Aggregate and Verifiably Encrypted Signatures from Bilinear Maps.
  10. Siani Pearson,Yun Shen,Miranda Mowbray (2009). A Privacy Manager for Cloud Computing.
  11. Anna Squicciarini,Smitha Sundareswaran,Dan Lin (2010). Preventing Information Leakage from Indexing in the Cloud.

Funding

No external funding was declared for this work.

Conflict of Interest

The authors declare no conflict of interest.

Ethical Approval

No ethics committee approval was required for this article type.

Data Availability

Not applicable for this article.

How to Cite This Article

Ms. B.Tejaswi. 2012. \u201cA Survey on Secure Storage Services in Cloud Computing\u201d. Global Journal of Computer Science and Technology - B: Cloud & Distributed GJCST-B Volume 12 (GJCST Volume 12 Issue B12): .

Download Citation

Issue Cover
GJCST Volume 12 Issue B12
Pg. 19- 23
Journal Specifications

Crossref Journal DOI 10.17406/gjcst

Print ISSN 0975-4350

e-ISSN 0975-4172

Version of record

v1.2

Issue date

December 28, 2012

Language
en
Experiance in AR

Explore published articles in an immersive Augmented Reality environment. Our platform converts research papers into interactive 3D books, allowing readers to view and interact with content using AR and VR compatible devices.

Read in 3D

Your published article is automatically converted into a realistic 3D book. Flip through pages and read research papers in a more engaging and interactive format.

Article Matrices
Total Views: 9930
Total Downloads: 2568
2026 Trends
Related Research

Published Article

Cloud computing is an emerging technology and it is purely based on internet and its environment. It provides different services to users such as Software-as-a-Service (SaaS), PaaS, IaaS, Storage-as-a-service (SaaS). Using Storage-as-a-Service, users and organizations can store their data remotely which poses new security risks towards the correctness of data in cloud. In order to achieve secure cloud storage, there exists different techniques such as flexible distributed storage integrity auditing mechanism, distributed erasure-coded data, Merkle Hash Tree(MHT) construction etc. These techniques support secure and efficient dynamic data storage in the cloud. This paper also deals with architectures for security and privacy management in the cloud storage environment.

Our website is actively being updated, and changes may occur frequently. Please clear your browser cache if needed. For feedback or error reporting, please email [email protected]

Request Access

Please fill out the form below to request access to this research paper. Your request will be reviewed by the editorial or author team.
X

Quote and Order Details

Contact Person

Invoice Address

Notes or Comments

This is the heading

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

High-quality academic research articles on global topics and journals.

A Survey on Secure Storage Services in Cloud Computing

Ms. B.Tejaswi
Ms. B.Tejaswi Jawaharlal Nehru Technological University Anantapur
Dr.L.V.Reddy
Dr.L.V.Reddy Jawaharlal Nehru Technological University Anantapur
Ms. M.Leelavathi
Ms. M.Leelavathi

Research Journals