Abstract
Cloud Storage is a subset of Cloud Computing, a new technology that knows a hasty progress in the IT world. Indeed, many providers offer, as a service, plenty of Cloud Storage spaces, especially for mobile’s use. Due to the massive use of this means of storage increase issues and threats. Thus, many efforts are dedicated by scientific and researches all over the word to avoid these risks and solve the various security problems that confront Cloud Storage. This Chapter is a modest contribution to the ongoing efforts. It will be focused on the Cloud Storage security. At first, we will try to describe the data life cycle and to giving meanwhile the security measures and methods for each cycle. Then, we will present some new approaches that protect data in Cloud. Finally, we will propose and discuss a new secure architecture based on three layers.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Choi, J., Choi, C., Ko, B., Choi, D., Kim, P.: Detecting web based DDoS attack using MapReduce operations in cloud computing environment. J. Internet Serv. Inf. Secur. 3, 28–37 (2013)
Jamil, D., Zaki, H.: Security issues in cloud computing and countermeasures. Int. J. Eng. Sci. Technol. 3, 2672–2676 (2011)
Moyo, T., Bhogal, J.: Investigating security issues in cloud computing. In: Proceedings of the 2014 8th International Conference on Complex, Intelligent and Software Intensive Systems, CISIS 2014 (2014)
Thakur, A.S.: Framework to improve data integrity in multi cloud environment. Int. J. Comput. Appl. 87(10), 28–32 (2014)
Cover, T.M., Thomas, J.A.: Elements of Information Theory (2005)
Kulkarni, G., Waghmare, R., Palwe, R., Waykule, V., Bankar, H., Koli, K.: Cloud storage architecture. In: 2012 7th International Conference on Telecommunication Systems, Services, and Applications, TSSA 2012, pp. 76–81 (2012)
Weil, S.A., Brandt, S.A., Miller, E.L.: CRUSH: controlled, scalable, decentralized placement of replicated data. In: Proceedings of the 2006 ACM/IEEE Conference on SC 2006, vol. 1, no. November, p. 31 (2006)
Top Threats Working Group: The notorious nine cloud computing top threats in 2013, no. February (2013)
Varadharajan, V., Tupakula, U.: Security as a service model for cloud environment. IEEE Trans. Netw. Serv. Manag. 11, 60–75 (2014)
Vu, Q., Sajjad, A., Dimitrakos, T., Colombo, M., Asal, R.: Secure cloud storage: a framework for data protection as a service in the multi-cloud environment. In: IEEE Conference on Communications and Network Security (CNS), 28–30 September 2015, Florence, Italy (2015)
Meenakshi, I.K., George, V.S.: Cloud server storage security using TPA. Int. J. Adv. Res. Comput. Sci. Technol. (2014). Issue Special
Ma, X.: Study on access control for cloud storage security. In: CSIC, pp. 333–336 (2015)
Yu, Y., Zhang, Y., Ni, J., Au, M.H., Chen, L., Liu, H.: Remote data possession checking with enhanced security for cloud storage. Futur. Gener. Comput. Syst. 52, 77–84 (2015)
Chen, L.: Using algebraic signatures to check data possession in cloud storage. Futur. Gener. Comput. Syst. 29(7), 1709–1715 (2013)
Yu, Y., Ni, J., Au, M.H., Liu, H., Wang, H., Xu, C.: Improved security of a dynamic remote data possession checking protocol for cloud storage. Expert Syst. Appl. (2014). https://doi.org/10.1016/j.eswa.2014.06.027
Elghazi, A., Berrezzouq, M., Abdelali, Z.: New version of iSCSI protocol to secure Cloud data storage. In: Proceedings of 2016 International Conference on Cloud Computing Technologies and Applications, CloudTech 2016 (2017)
Ahmad, N.: Cloud computing: technology, security issues and solutions. In: 2017 2nd International Conference on Anti-Cyber Crimes (ICACC) (2017)
Slamanig, D., Lorunser, T., Grob, T., Langer, T., des Noes, M., Pohls, H.C., Rozenberg, B.: Towards a new paradigm for privacy and security in cloud services. In: Communications in Computer and Information Science, vol. 530, pp. 14–25 (2015)
Chen, Y.J., Wang, L.C., Liao, C.H.: Eavesdropping prevention for network coding encrypted cloud storage systems. IEEE Trans. Parallel Distrib. Syst. 27(8), 2261–2273 (2016)
Singh, S., Jeong, Y.S., Park, J.H.: A survey on cloud computing security: issues, threats, and solutions. J. Netw. Comput. Appl. 75, 200–222 (2016)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this paper
Cite this paper
Berrezzouq, M., El Ghazi, A., Abdelali, Z. (2019). Issues and Threats of Cloud Data Storage. In: Zbakh, M., Essaaidi, M., Manneback, P., Rong, C. (eds) Cloud Computing and Big Data: Technologies, Applications and Security. CloudTech 2017. Lecture Notes in Networks and Systems, vol 49. Springer, Cham. https://doi.org/10.1007/978-3-319-97719-5_5
Download citation
DOI: https://doi.org/10.1007/978-3-319-97719-5_5
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-97718-8
Online ISBN: 978-3-319-97719-5
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)