Study and Analysis of Various Cloud Security, Authentication, and Data Storage Models: A Challenging Overview

被引:1
作者
Pawar, Ankush Balaram [1 ]
Ghumbre, Shashikant U. [2 ]
Jogdand, Rashmi M. [3 ]
机构
[1] Konkan Gyanpeeth Coll Engn, Comp Engn, Ladiwali, India
[2] Govt Coll Engn, Comp Engn, Madras, Tamil Nadu, India
[3] KLS Gogte Inst Technol, Comp Sci & Engn, Belagavi, India
关键词
Authentication; Cloud Storage; Data Security; Data Storage; Privacy Preservation; SCHEME;
D O I
10.4018/IJDSST.315760
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In recent days, widespread acceptance of cloud data storage applications increases various privacy problems and security problems. Outsourced data security is considered the main confrontation for cloud clients because of data control loss. This review presents a detailed survey of 50 research papers presenting privacy preservation approaches, namely authentication-based, cloud security-based, data storage-based, data security-based, and encryption-based techniques. The analysis is considered based on the categorization of approaches, dataset employed, utilized software tools, published year, and the performance metrics are discussed. Furthermore, problems raised in existing privacy preservation techniques are elucidated in the research gaps and problems section. The future work of this study is based on the research gaps and problems recognized from present research schemes. Additionally, JAVA software language is widely utilized for implementing privacy preservation models, and the Amazon access sample database is a commonly employed dataset for the privacy preservation approach.
引用
收藏
页数:16
相关论文
共 52 条
  • [21] Khan I.A., 2019, Int J Comput Commun Netw, V1, P46
  • [22] A service recommendation algorithm with the transfer learning based matrix factorization to improve cloud security
    Lei, Chao
    Dai, Hongjun
    Yu, Zhilou
    Li, Rui
    [J]. INFORMATION SCIENCES, 2020, 513 : 98 - 111
  • [23] Lenka S. R., 2014, INT J COMPUT SCI TRE, V2, P60
  • [24] Intelligent cryptography approach for secure distributed big data storage in cloud computing
    Li, Yibin
    Gai, Keke
    Qiu, Longfei
    Qiu, Meikang
    Zhao, Hui
    [J]. INFORMATION SCIENCES, 2017, 387 : 103 - 115
  • [25] Shared Authority Based Privacy-Preserving Authentication Protocol in Cloud Computing
    Liu, Hong
    Ning, Huansheng
    Xiong, Qingxu
    Yang, Laurence T.
    [J]. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2015, 26 (01) : 241 - 251
  • [26] Ensuring user authentication and data integrity in multi-cloud environment
    Megouache, Leila
    Zitouni, Abdelhafid
    Djoudi, Mahieddine
    [J]. HUMAN-CENTRIC COMPUTING AND INFORMATION SCIENCES, 2020, 10 (01)
  • [27] Novel efficient techniques for real-time cloud security assessment
    Modic, Jolanda
    Trapero, Ruben
    Taha, Ahmed
    Luna, Jesus
    Stopar, Miha
    Suri, Neeraj
    [J]. COMPUTERS & SECURITY, 2016, 62 : 1 - 18
  • [28] Mohamed M.E., 2012, P 2012 8 INT C INF S, P12
  • [29] Towards DNA based data security in the cloud computing environment
    Namasudra, Suyel
    Devi, Debashree
    Kadry, Seifedine
    Sundarasekar, Revathi
    Shanthini, A.
    [J]. COMPUTER COMMUNICATIONS, 2020, 151 : 539 - 547
  • [30] An improved attribute-based encryption technique towards the data security in cloud computing
    Namasudra, Suyel
    [J]. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2019, 31 (03)