scholarly journals Secure Cloud Storage Techniques: A Review

2021 ◽  
Vol 23 (07) ◽  
pp. 1388-1395
Author(s):  
Ms.Srilakshmi U Sirurmath ◽  
◽  
Dr. Deepashree Devaraj ◽  

Cloud technology has exponentially seen a rise in its absorption for various applications. Cloud users with limited storage might transfer their information to remote systems. In return for monetary compensation, these servers provide access to their clients’ data. Cloud storage protocols verify the integrity of this data which is hosted on the cloud. Broadly there are two types of data – static and dynamic. While many efficient protocols are already present for static data, much research is being undertaken to build a secure cloud storage system for dynamic data. This paper analyzes these existing and proposed cloud storage protocols for both static and dynamic data. Important performance parameters are identified and a comparison is drawn between the chosen methods in order to draw a contrast between the efficiency of the techniques chosen.

2014 ◽  
Vol 668-669 ◽  
pp. 1257-1262
Author(s):  
Jun Zuo ◽  
Zhen Zhu ◽  
Jing Yan Wang

In order to meet growing demand of storage resources, improve the security and integrity of enterprise information resources, this paper analyzes storage resources status and existing problems of Foshan XY Elec-Mech Limited Corp in the first. Based on detailed analysis of cloud storage hierarchy and its advantages, the cloud storage framework is designed to meet enterprise’s demands, security control strategies and backup strategies are also discussed. After implementation, the integration of information resources in multi-systems and multi-platforms may realized for providing users with massive information storage and access services. Furthermore, when disaster coming, multiple backups may be used to recovery for ensuring the continuity of enterprise’s business processing.


2015 ◽  
Vol 20 (4) ◽  
pp. 1437-1448 ◽  
Author(s):  
Xuan Li ◽  
Jin Li ◽  
Faliang Huang

2013 ◽  
Vol 8 (12) ◽  
Author(s):  
Wenzhe Jiao ◽  
Guoqing Wang ◽  
Zhengjun Zhai ◽  
Xiaoxue Ye

Author(s):  
Syam Kumar Pasupuleti

Cloud storage allows users to store their data in the cloud to avoid local storage and management costs. Since the cloud is untrusted, the integrity of stored data in the cloud has become an issue. To address this problem, several public auditing schemes have been designed to verify integrity of the data in the cloud. However, these schemes have two drawbacks: public auditing may reveal sensitive data to verifier and does not address the data recovery problem efficiently. This article proposes a new privacy-preserving public auditing scheme with data dynamics to secure the data in the cloud based on an exact regenerated code. This scheme encodes the data for availability, then masks the encoded blocks with randomness for privacy of data and enables a public auditor to verify the integrity of the data. Further, this scheme also supports dynamic data updates. In addition, security and performance analysis proves that proposed scheme is provably secure and efficient.


2015 ◽  
Vol 118 (12) ◽  
pp. 46-52 ◽  
Author(s):  
Bokefode JayantD. ◽  
Ubale Swapnaja A. ◽  
Pingale Subhash V. ◽  
Karande Kailash J. ◽  
Apate Sulabha S.

Sign in / Sign up

Export Citation Format

Share Document