Abstract
Cloud computing allow users to store information in data centers, it also enables on-demand computation of resources. Remote servers can access the information inside the cloud. Cloud computing serves as an internet-accessible resource allocation business model and offers pay-per-use computing infrastructure. This paper primarily discusses about the main data storage security issues- in cloud computing and certain solutions which could be adopted as a remedy to such issues. It also includes an analysis review which helps in picking out the best fitting solution.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Subashini, S., Kavitha, V.: A survey on security issues in service delivery models of cloud computing. J. Netw. Comput. Appl. 34(1), 1–11 (2011)
Group, T.T.W., et al.: The Notorious Nine: Cloud Computing Top Threats in 2013. Cloud Security Alliance (2013)
Hubbard, D., Sutton, M.: Top Threats to Cloud Computing. Cloud Security Alliance (2010)
Aldossary, S., Allen, W.: Data security, privacy, availability and ıntegrity in cloud computing: ıssues and current solutions. (IJACSA) Int. J. Adv. Comput. Sci. Appl. 7(4), 485–498 (2016)
Chatterjee, R., Roy, S.: Cryptography in cloud computing: a basic approach to ensure security in cloud. IJESC (2017)
Jayant, B., Swapnaja, U., Subhash, P., Kailash, K., Sulabha, A.: Developing secure cloud storage system by applying AES and RSA cryptography algorithms with role bases access control model. Int. J. Comput. Appl. (2015)
Mohanaprakash, T.A., Vinod, A.I., Raja, S., Kalyan, A.P., Babu, C.B., Vivek, G.: A study of securing cloud data using encryption algorithms. IJSRCSEIT (2018)
Thakur, N., Sharma, A.K.: Data ıntegrity techniques in cloud computing: an analysis. Int. J. Adv. Res. Comput. Sci. Softw. Eng. (2017)
Ateniese, G., Burns, R., Curtmola, R., Herring, J., Kissner, L., Peterson, Z., Song, D.: Provable data possession at untrusted stores. In: Proceedings of 14th ACM Conference on Computer and Communication Security (2007)
Kumar, R.S., Saxena, A.: Data integrity proofs in cloud storage. In: Third International Conference on Communication Systems and Networks (COMSNETS) (2011)
Chandran, S., Angepat, M.: Cloud computing: analyzing the risks involved in cloud computing environments. In: Proceedings of Natural Sciences and Engineering (2010)
Bowers, K.D., Juels, A., Oprea, A.: Proofs of retrievability: theory and implementation. Proc. J. Syst. Softw. (2012)
Curtmola, R., Khan, O., Burns, R., Ateniese, G.: MR- PDP: multiple-replica provable data possession. In: Proceedings of 28th IEEE ICDCS (2008)
Bowers, K.D., Juels, A., Oprea, A.: HAIL: a high availability and integrity layer for cloud storage. In: Proceedings of 16th ACM conference on Computer and Communications Security (2009)
Aguiar, E., Zhang, Y., Blanton, M.: An overview of issues and recent developments in cloud computing and storage security in high performance cloud auditing and applications. Springer (2014)
Gul, I., Islam, M.: Cloud computing security auditing. In: International Conference on Next Generation Information Technology (2011)
Shah, M.A., Baker, M., Mogul, J.C., Swaminathan, R.: Auditing to keep online storage services honest. In: Proceedings of the 11th USENIX Workshop on Hot Topics in Operating Systems (2007)
Neelaveni, R.: Performance enhancement and securıty assıstance for vanet usıng cloud computıng. J. Trends Comput. Sci. Smart Technol. (TCSST) 1(01), 39–50 (2019)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this paper
Cite this paper
Paul, V., Mathew, R. (2020). Data Storage Security Issues in Cloud Computing. In: Pandian, A., Palanisamy, R., Ntalianis, K. (eds) Proceeding of the International Conference on Computer Networks, Big Data and IoT (ICCBI - 2019). ICCBI 2019. Lecture Notes on Data Engineering and Communications Technologies, vol 49. Springer, Cham. https://doi.org/10.1007/978-3-030-43192-1_20
Download citation
DOI: https://doi.org/10.1007/978-3-030-43192-1_20
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-43191-4
Online ISBN: 978-3-030-43192-1
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)