Study and Analysis of Various Cloud Security, Authentication, and Data Storage Models: A Challenging Overview

被引:1
作者
Pawar, Ankush Balaram [1 ]
Ghumbre, Shashikant U. [2 ]
Jogdand, Rashmi M. [3 ]
机构
[1] Konkan Gyanpeeth Coll Engn, Comp Engn, Ladiwali, India
[2] Govt Coll Engn, Comp Engn, Madras, Tamil Nadu, India
[3] KLS Gogte Inst Technol, Comp Sci & Engn, Belagavi, India
关键词
Authentication; Cloud Storage; Data Security; Data Storage; Privacy Preservation; SCHEME;
D O I
10.4018/IJDSST.315760
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In recent days, widespread acceptance of cloud data storage applications increases various privacy problems and security problems. Outsourced data security is considered the main confrontation for cloud clients because of data control loss. This review presents a detailed survey of 50 research papers presenting privacy preservation approaches, namely authentication-based, cloud security-based, data storage-based, data security-based, and encryption-based techniques. The analysis is considered based on the categorization of approaches, dataset employed, utilized software tools, published year, and the performance metrics are discussed. Furthermore, problems raised in existing privacy preservation techniques are elucidated in the research gaps and problems section. The future work of this study is based on the research gaps and problems recognized from present research schemes. Additionally, JAVA software language is widely utilized for implementing privacy preservation models, and the Amazon access sample database is a commonly employed dataset for the privacy preservation approach.
引用
收藏
页数:16
相关论文
共 52 条
  • [1] Privacy-preserving techniques of genomic data-a survey
    Al Aziz, Md Momin
    Sadat, Md Nazmus
    Alhadidi, Dima
    Wang, Shuang
    Jiang, Xiaoqian
    Brown, Cheryl L.
    Mohammed, Noman
    [J]. BRIEFINGS IN BIOINFORMATICS, 2019, 20 (03) : 887 - 895
  • [2] Almorsy M., 2011, Proceedings of the 2011 IEEE 4th International Conference on Cloud Computing (CLOUD 2011), P364, DOI 10.1109/CLOUD.2011.9
  • [3] Arora R., 2013, INT J ENG RES AFR, V3, P1922
  • [4] Banerjee C, 2013, 2013 15TH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING TECHNOLOGIES (ICACT)
  • [5] Banyal Rohitash Kumar, 2013, 2013 Fifth International Conference on Computational Intelligence, Modelling and Simulation (CIMSim), P105, DOI 10.1109/CIMSim.2013.25
  • [6] Accountable privacy preserving attribute based framework for authenticated encrypted access in clouds
    Belguith, Sana
    Kaaniche, Nesrine
    Laurent, Maryline
    Jemai, Abderrazak
    Attia, Rabah
    [J]. JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2020, 135 : 1 - 20
  • [7] A cloud-edge based data security architecture for sharing and analysing cyber threat information
    Chadwick, David W.
    Fan, Wenjun
    Costantino, Gianpiero
    de Lemos, Rogerio
    Di Cerbo, Francesco
    Herwono, Ian
    Manea, Mirko
    Mori, Paolo
    Sajjad, Ali
    Wang, Xiao-Si
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2020, 102 : 710 - 722
  • [8] Chang V, 2016, IEEE T SERV COMPUT, V9, P138, DOI [10.1109/TSC.2015.2491281, 10.1109/ISSNIP.2015.7106910]
  • [9] Ontology-Based Security Context Reasoning for Power IoT-Cloud Security Service
    Choi, Chang
    Choi, Junho
    [J]. IEEE ACCESS, 2019, 7 : 110510 - 110517
  • [10] Privacy-preserving cloud computing on sensitive data: A survey of methods, products and challenges
    Domingo-Ferrer, Josep
    Farras, Oriol
    Ribes-Gonzalez, Jordi
    Sanchez, David
    [J]. COMPUTER COMMUNICATIONS, 2019, 140 : 38 - 60