Open Access   Article Go Back

A Survey on Cloud Data Security

S. Renuka1 , N. Suresh Kumar2

Section:Survey Paper, Product Type: Journal Paper
Volume-7 , Issue-4 , Page no. 88-95, Apr-2019

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v7i4.8895

Online published on Apr 30, 2019

Copyright © S. Renuka, N. Suresh Kumar . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: S. Renuka, N. Suresh Kumar, “A Survey on Cloud Data Security,” International Journal of Computer Sciences and Engineering, Vol.7, Issue.4, pp.88-95, 2019.

MLA Style Citation: S. Renuka, N. Suresh Kumar "A Survey on Cloud Data Security." International Journal of Computer Sciences and Engineering 7.4 (2019): 88-95.

APA Style Citation: S. Renuka, N. Suresh Kumar, (2019). A Survey on Cloud Data Security. International Journal of Computer Sciences and Engineering, 7(4), 88-95.

BibTex Style Citation:
@article{Renuka_2019,
author = {S. Renuka, N. Suresh Kumar},
title = {A Survey on Cloud Data Security},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {4 2019},
volume = {7},
Issue = {4},
month = {4},
year = {2019},
issn = {2347-2693},
pages = {88-95},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=3999},
doi = {https://doi.org/10.26438/ijcse/v7i4.8895}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v7i4.8895}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=3999
TI - A Survey on Cloud Data Security
T2 - International Journal of Computer Sciences and Engineering
AU - S. Renuka, N. Suresh Kumar
PY - 2019
DA - 2019/04/30
PB - IJCSE, Indore, INDIA
SP - 88-95
IS - 4
VL - 7
SN - 2347-2693
ER -

VIEWS PDF XML
938 346 downloads 266 downloads
  
  
           

Abstract

Dispersed processing is pool of organizations that are provided for customer. Conveyed stockpiling data may be gotten to from wherever at whatever point due to cloud works in remote zone. It manhandles the organizations given by the cloud supplier. There are shifting sorts of cloud benefits particularly, PC code as a Service, Platform as an organization, Infrastructure as an organization, Network as a Service, Identity as an organization. Getting ready models of cloud encapsulate Intra cloud, lay cloud, arrange Cloud and lay cross cloud. By virtue of the organizations of disseminated registering, there`s a gigantic measure of learning hold tight cloud .Hence it`s required to supply the acceptable security to the information in Clouds. Consequently the conveyed stockpiling has expanded additional thought from each the teachers and mechanical shared attributes. It likewise gets new troubles keeping up learning genuineness and unwavering quality in data accumulating .Deviating the cloud from single to multi-cloud is imperative to accomplish the information security. Multi cloud is very proposed appreciation to the soundness that fragile data shouldn`t be dispatched to one cloud, to avoid oppression on only one cloud supplier. Data to be held tight is part into varied squares and scattered among absolutely extraordinary disseminated stockpiling suppliers. To deal with all the outline we will when all is said in done gift an audit paper. This diagram paper relies upon the propelled examination related with single and multi-cloud esteem, security and handiness based generally describe. This work mean to drive crafted by multi spread over single cloud to decrease the vulnerability demanding inside the cloud

Key-Words / Index Term

Cloud Computing, Data Privacy, Multi-Clouds, Security, Confidential Data, Cloud Service Provider

References

[1] Emir Erdem and Mehmet Tahir Sandıkkaya , Member, IEEE,” OTPaaS—One Time Password as a Service”, IEEE Transactions On Information Forensics And Security, Vol. 14, No. 3, March 2019.
[2] Yucai Zhou ; Kejun Long ; Peng Xu ; Wang Liu, ,” Design of a Cloud Platform for Digital Highway”, International Conference on Intelligent Transportation, Big Data & Smart City (ICITBS), March,2019.
[3] Himel Dey , Rifat Islam ,Hossain Arif,” An Integrated Model To Make Cloud Authentication And Multi-Tenancy More Secure”, 2019 International Conference on Robotics,Electrical and Signal Processing Techniques (ICREST), February,2019.
[4] Yucai Zhou, Kejun Long ,Peng Xu , Wang Liu, ,” Authorized Equality Test on Identity-Based Ciphertexts for Secret Data Sharing via Cloud Storage”, IEEE Journals & Magazines, volume 7, Page s: 25409 – 25421, February,2019.
[5] Andrei Tchernykh ,Mikhail Babenko , Vanessa Miranda-López, Alexander Yu. Drozdov , Arutyun Avetisyan,” WA-RRNS: Reliable Data Storage System Based on Multi-cloud 2018 IEEE International Parallel and Distributed Processing Symposium Workshops (IPDPSW),August,2019.
[6] Prof. Amit R. Gadekar, Dr. M V. Sarode, Dr. V M. Thakare,” Cloud Security and Storage Space Management using DCACrypt”, International Conference on Information, Communication, Engineering and Technology (ICICET),August,2018
[7] Jayachander Surbiryala, Bikash Agrawaly, Chunming Rong,” Improve Security over Multiple Cloud Service Providers for Resource Allocation”, 1st International Conference on Data Intelligence and Security,2018
[8] Talal Halabi, Martine Bellaiche, and Adel Abusitta,” Online Allocation of Cloud Resources based onSecurity Satisfaction, 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering”,2018
[9] D. N. WU, Q. Q. GAN, AND X. M. WANG,” Verifiable Public Key Encryption With Keyword Search Based on Homomorphic Encryption in Multi-User Setting,IEEE Translations,Vol.6,August,2018.
[10] Jianyi Zhang, Chenggen Song, Zhiqiang Wang, Tao Yang And Wenming Ma, “Efficient And Provable Security Searchable Asymmetric Encryption In The Cloud”,IEEE Translations,vol.6,December,2018
[11] Mohd. Aman Kalyankar, CRS Kumar, “Aadhaar Enabled Secure Private Cloud with Digital Signature as a Service”, 2nd International conference on Electronics, Communication and Aerospace Technology (ICECA 2018) IEEE Conference Record # 42487,2018.
[12] Mu Yang, Andrea Margheri, Runshan Hu, and Vladimiro Sassone, “Differentially Private Data Sharing in a Cloud Federation with Blockchain”, Copublished by the IEEE CS and IEEE ComSoc,November/December 2018.
[13] Mohamad Reza Khayyambashi,Sayed Mohammad Hossein, Mirshahjafari, EhsanShahrokhi, , “Design And Implement A New Cloud Security Method Based On MultiClouds On Open Stack Platform” ,David C. Wyld et al. (Eds) : CCSEA, CLOUD, DKMP, SEA, SIPRO – 2016.
[14] C. Divya Shaly, R. Anbuselvi, ” Multi-Cloud Data Hosting for Protection Optimization and Security”-International Journal of Computer Science and Mobile Computing. April 2016.
[15] A. Manimaran and K. Somasundaram.”An efficient Data Security Mechanismin Cloud Computing Using Anonymous ID algorithm. 2016.
[16] Ms Vrushali K Gaikwadl, Prof. Ramesh Kagalkar. “Data Security & Availability in Multi-clouds Storage with Cooperative Provable Data Posession”.–IJES February 2015.
[17] Yun Tian, Xiao Qin, Yafei Jia.” Secure Replica Allocation in Cloud Storage with Heterogeneous Vulnerabilities”,IEEE
[18] Tara Salman. “On Securing Multi-Clouds: Survey on Advances and Current Challenges”, Nov 2015.
[19] Ms Vrushali K Gaikwadl, Prof. Ramesh Kagalkar. “Data Security & Availability in Multi-clouds Storage with Cooperative Provable Data Posession”.–IJES February 2015.
[20] Maha Tebaa, Said El Hajji, ” From Single to Multi-Clouds Computing Privacy and Fault Tolerance”. Elsevier 2014.
[21] P. Raja Kaushik1 , G. Praveen Bab,” Data Security Issues in Distributed Cloud System”, International Journal of Computer Science and Mobile Computing, Vol.3 Issue.9, September- 2014, pg. 357-360.
[22] Farrukh Shahzad, ” State–Of–the–art Survey on Cloud Computing Security Challenges, Approaches and Solutions”. Elsevier 2014.International Journal of Pure and Applied Mathematics Special Issue.
[23] He Kai, Huang Chuanhe, Wang Jinhai, Zhou Hao, Chen Xi, LuYilong ZhangLianzhen, Wang Bin, Computer School, Wuhan University, Wuhan, China “AnEfficient Public Batch Auditing Protocol for Data Security in Multi-CloudStorage”-IEEE/978–0-7695–5058-9/13 2013
[24]Cong Wang,student member,ieee,Qian Wang,student member,ieee, Kui Ren,member,ieee,Ning Cao,student member,ieee and Wenjing Lou,senior member,ieee,”Towared secure and dependable storage in cloud computing” 2012.
[25]Maha Tebaa ; Said El Hajji ; Abdellatif El Ghazi,” Homomorphic encryption method applied to Cloud Computing, National Days of Network Security and Systems,2012.
[26] Yashaswi Singh,Farah Kandah,Weiyi Zhang,” secure cost effective multi cloud storage in cloud computing”2011.
[27] A.Bessani, M. Correia, B.Quaresma, F.Andre and P.Soura “Depsky:dependable and secure storage in cloud computing.”2011.
[28] E.Grosse, J.Howie, J.Ransome, J Reavis and S.Schmidt, “ Cloud computing roundtable”, IEEE Security & Privacy,8(6),2010.
[29]W.Itani, A.Kayssi, A.Chehab, “Privacy as a Service: Privacy-Aware Data Storage and Processing in Cloud Computing Architectures” Eight IEEE International Conference on Dependable, Autonomic ans Secure Computing,Dec 2009.
[30] R.Gellman, “Privacy in the cloud: Risks to privacy and confidentiality from cloud computing”,Prepared for theWorld Privacy Forum Feb 2009.
[31] B.R.Kandukuri, R.V.Paturi and A.Rakshit, “Cloud Security Issues,” 2009 IEEE International Conference on Service Computing, 2009.
[32] Scalable Security Solutions, Check Point Open Performance Architecture, Quad-Core Intel Xeon Processors,”Delivering Application-Levels Security at Data Centre Performance Levels,”Intel Corporation, 2008.