Skip to main content

Issues and Threats of Cloud Data Storage

  • Conference paper
  • First Online:
Cloud Computing and Big Data: Technologies, Applications and Security (CloudTech 2017)

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 49))

  • 1129 Accesses

Abstract

Cloud Storage is a subset of Cloud Computing, a new technology that knows a hasty progress in the IT world. Indeed, many providers offer, as a service, plenty of Cloud Storage spaces, especially for mobile’s use. Due to the massive use of this means of storage increase issues and threats. Thus, many efforts are dedicated by scientific and researches all over the word to avoid these risks and solve the various security problems that confront Cloud Storage. This Chapter is a modest contribution to the ongoing efforts. It will be focused on the Cloud Storage security. At first, we will try to describe the data life cycle and to giving meanwhile the security measures and methods for each cycle. Then, we will present some new approaches that protect data in Cloud. Finally, we will propose and discuss a new secure architecture based on three layers.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 189.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 249.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Choi, J., Choi, C., Ko, B., Choi, D., Kim, P.: Detecting web based DDoS attack using MapReduce operations in cloud computing environment. J. Internet Serv. Inf. Secur. 3, 28–37 (2013)

    Google Scholar 

  2. Jamil, D., Zaki, H.: Security issues in cloud computing and countermeasures. Int. J. Eng. Sci. Technol. 3, 2672–2676 (2011)

    Google Scholar 

  3. Moyo, T., Bhogal, J.: Investigating security issues in cloud computing. In: Proceedings of the 2014 8th International Conference on Complex, Intelligent and Software Intensive Systems, CISIS 2014 (2014)

    Google Scholar 

  4. Thakur, A.S.: Framework to improve data integrity in multi cloud environment. Int. J. Comput. Appl. 87(10), 28–32 (2014)

    Google Scholar 

  5. Cover, T.M., Thomas, J.A.: Elements of Information Theory (2005)

    Book  Google Scholar 

  6. Kulkarni, G., Waghmare, R., Palwe, R., Waykule, V., Bankar, H., Koli, K.: Cloud storage architecture. In: 2012 7th International Conference on Telecommunication Systems, Services, and Applications, TSSA 2012, pp. 76–81 (2012)

    Google Scholar 

  7. Weil, S.A., Brandt, S.A., Miller, E.L.: CRUSH: controlled, scalable, decentralized placement of replicated data. In: Proceedings of the 2006 ACM/IEEE Conference on SC 2006, vol. 1, no. November, p. 31 (2006)

    Google Scholar 

  8. Top Threats Working Group: The notorious nine cloud computing top threats in 2013, no. February (2013)

    Google Scholar 

  9. Varadharajan, V., Tupakula, U.: Security as a service model for cloud environment. IEEE Trans. Netw. Serv. Manag. 11, 60–75 (2014)

    Article  Google Scholar 

  10. Vu, Q., Sajjad, A., Dimitrakos, T., Colombo, M., Asal, R.: Secure cloud storage: a framework for data protection as a service in the multi-cloud environment. In: IEEE Conference on Communications and Network Security (CNS), 28–30 September 2015, Florence, Italy (2015)

    Google Scholar 

  11. Meenakshi, I.K., George, V.S.: Cloud server storage security using TPA. Int. J. Adv. Res. Comput. Sci. Technol. (2014). Issue Special

    Google Scholar 

  12. Ma, X.: Study on access control for cloud storage security. In: CSIC, pp. 333–336 (2015)

    Google Scholar 

  13. Yu, Y., Zhang, Y., Ni, J., Au, M.H., Chen, L., Liu, H.: Remote data possession checking with enhanced security for cloud storage. Futur. Gener. Comput. Syst. 52, 77–84 (2015)

    Article  Google Scholar 

  14. Chen, L.: Using algebraic signatures to check data possession in cloud storage. Futur. Gener. Comput. Syst. 29(7), 1709–1715 (2013)

    Article  Google Scholar 

  15. Yu, Y., Ni, J., Au, M.H., Liu, H., Wang, H., Xu, C.: Improved security of a dynamic remote data possession checking protocol for cloud storage. Expert Syst. Appl. (2014). https://doi.org/10.1016/j.eswa.2014.06.027

  16. Elghazi, A., Berrezzouq, M., Abdelali, Z.: New version of iSCSI protocol to secure Cloud data storage. In: Proceedings of 2016 International Conference on Cloud Computing Technologies and Applications, CloudTech 2016 (2017)

    Google Scholar 

  17. Ahmad, N.: Cloud computing: technology, security issues and solutions. In: 2017 2nd International Conference on Anti-Cyber Crimes (ICACC) (2017)

    Google Scholar 

  18. Slamanig, D., Lorunser, T., Grob, T., Langer, T., des Noes, M., Pohls, H.C., Rozenberg, B.: Towards a new paradigm for privacy and security in cloud services. In: Communications in Computer and Information Science, vol. 530, pp. 14–25 (2015)

    Google Scholar 

  19. Chen, Y.J., Wang, L.C., Liao, C.H.: Eavesdropping prevention for network coding encrypted cloud storage systems. IEEE Trans. Parallel Distrib. Syst. 27(8), 2261–2273 (2016)

    Article  Google Scholar 

  20. Singh, S., Jeong, Y.S., Park, J.H.: A survey on cloud computing security: issues, threats, and solutions. J. Netw. Comput. Appl. 75, 200–222 (2016)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Maryem Berrezzouq .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Berrezzouq, M., El Ghazi, A., Abdelali, Z. (2019). Issues and Threats of Cloud Data Storage. In: Zbakh, M., Essaaidi, M., Manneback, P., Rong, C. (eds) Cloud Computing and Big Data: Technologies, Applications and Security. CloudTech 2017. Lecture Notes in Networks and Systems, vol 49. Springer, Cham. https://doi.org/10.1007/978-3-319-97719-5_5

Download citation

Publish with us

Policies and ethics