Data security and privacy preservation in cloud storage environments based on cryptographic mechanisms

被引:114
作者
Kaaniche, Nesrine [1 ,2 ]
Laurent, Maryline [1 ,2 ]
机构
[1] Univ Paris Saclay, Telecom SudParis, CNRS, SAMOVAR, Paris, France
[2] Chair Values & Policies Personal Informat, Paris, France
关键词
Cloud data storage; Security requirements; Privacy; Data confidentiality; Data integrity; Proof of data possession; Proof of retrievability; Cryptographic cloud trends; ATTRIBUTE-BASED ENCRYPTION; FULLY HOMOMORPHIC ENCRYPTION; PROVABLE DATA POSSESSION; ACCESS-CONTROL; SHARED DATA; EFFICIENT; ISSUES; SCHEME; KEY;
D O I
10.1016/j.comcom.2017.07.006
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Recent technological advances have sparked the popularity and success of cloud. This new paradigm is gaining an expanding interest, since it provides cost efficient architectures that support the transmission, storage, and intensive computing of data. However, these promising storage services bring many challenging design issues, considerably due to both loss of data control and abstract nature of clouds. The objective of this survey is to provide a consistent view about both data security concerns and privacy issues that are faced by clients in cloud storage environments. This survey brings a critical comparative analysis of cryptographic defense mechanisms, and beyond this, it explores research directions and technology trends to address the protection of outsourced data in cloud infrastructures. (C) 2017 Elsevier B.V. All rights reserved.
引用
收藏
页码:120 / 141
页数:22
相关论文
共 193 条
[1]   A Review on the State-of-the-Art Privacy-Preserving Approaches in the e-Health Clouds [J].
Abbas, Assad ;
Khan, Samee U. .
IEEE JOURNAL OF BIOMEDICAL AND HEALTH INFORMATICS, 2014, 18 (04) :1431-1441
[2]   Cloud monitoring: A survey [J].
Aceto, Giuseppe ;
Botta, Alessio ;
de Donato, Walter ;
Pescape, Antonio .
COMPUTER NETWORKS, 2013, 57 (09) :2093-2115
[3]  
Agrawal S., 2014, INT J ADV RES COMPUT, V4, P679
[4]  
Aguiar E., OVERVIEW ISSUES RECE, P3
[5]   An overview of the commercial cloud monitoring tools: research dimensions, design issues, and state-of-the-art [J].
Alhamazani, Khalid ;
Ranjan, Rajiv ;
Mitra, Karan ;
Rabhi, Fethi ;
Jayaraman, Prem Prakash ;
Khan, Samee Ullah ;
Guabtni, Adnene ;
Bhatnagar, Vasudha .
COMPUTING, 2015, 97 (04) :357-377
[6]   Security in cloud computing: Opportunities and challenges [J].
Ali, Mazhar ;
Khan, Samee U. ;
Vasilakos, Athanasios V. .
INFORMATION SCIENCES, 2015, 305 :357-383
[7]  
[Anonymous], 2010, HotSec
[8]  
[Anonymous], AM SIMPL STOR SERV A
[9]  
[Anonymous], 1999, P 17 INT C THEOR APP
[10]  
[Anonymous], 2010, Proceedings of the 1st ACM symposium on Cloud computing