Issues and Threats of Cloud Data Storage

被引:0
作者
Berrezzouq, Maryem [1 ]
El Ghazi, Abdellatif [2 ]
Abdelali, Zineelabidine [1 ]
机构
[1] Univ Mohammed V L3AD, FSR, Rabat, Morocco
[2] Univ Int Rabat, TicLab, ECINE, Sala El Jadida, Morocco
来源
CLOUD COMPUTING AND BIG DATA: TECHNOLOGIES, APPLICATIONS AND SECURITY | 2019年 / 49卷
关键词
Cloud storage; Security; Data cycle life; Data security threats; DATA POSSESSION CHECKING; SECURITY;
D O I
10.1007/978-3-319-97719-5_5
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Cloud Storage is a subset of Cloud Computing, a new technology that knows a hasty progress in the IT world. Indeed, many providers offer, as a service, plenty of Cloud Storage spaces, especially for mobile's use. Due to the massive use of this means of storage increase issues and threats. Thus, many efforts are dedicated by scientific and researches all over the word to avoid these risks and solve the various security problems that confront Cloud Storage. This Chapter is a modest contribution to the ongoing efforts. It will be focused on the Cloud Storage security. At first, we will try to describe the data life cycle and to giving meanwhile the security measures and methods for each cycle. Then, we will present some new approaches that protect data in Cloud. Finally, we will propose and discuss a new secure architecture based on three layers.
引用
收藏
页码:60 / 72
页数:13
相关论文
共 50 条
  • [1] Issues and Threats of Data stored in Cloud
    Berrezzouq, Maryem
    Elghazi, Abdellatif
    PROCEEDINGS OF 2017 3RD INTERNATIONAL CONFERENCE OF CLOUD COMPUTING TECHNOLOGIES AND APPLICATIONS (CLOUDTECH), 2017, : 306 - 311
  • [2] Legal Issues surrounding Data Storage on the Cloud
    Fitzpatrick, A.
    Mcgrath, M.
    Lennon, R. G.
    2012 5TH ROMANIA TIER 2 FEDERATION GRID, CLOUD & HIGH PERFORMANCE COMPUTING SCIENCE (RO-LCG), 2012, : 53 - 56
  • [3] Remote Data Checking With a Designated Verifier in Cloud Storage
    Yan, Hao
    Li, Jiguo
    Zhang, Yichen
    IEEE SYSTEMS JOURNAL, 2020, 14 (02): : 1788 - 1797
  • [4] A survey on cloud computing security: Issues, threats, and solutions
    Singh, Saurabh
    Jeong, Young-Sik
    Park, Jong Hyuk
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2016, 75 : 200 - 222
  • [5] Emerging Issues in Cloud Storage Security: Encryption, Key Management, Data Redundancy, Trust Mechanism
    Tse, Daniel W. K.
    Chen, Danqing
    Liu, Qingshu
    Wang, Fan
    Wei, Zhaoyi
    MULTIDISCIPLINARY SOCIAL NETWORKS RESEARCH, MISNC 2014, 2014, 473 : 297 - 310
  • [6] Emerging Ethical Threats to Client Privacy in Cloud Communication and Data Storage
    Lustgarten, Samuel D.
    PROFESSIONAL PSYCHOLOGY-RESEARCH AND PRACTICE, 2015, 46 (03) : 154 - 160
  • [7] Confidentiality and Storage of Data in Cloud Environment
    Mohit, Prerna
    Biswas, G. P.
    PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON FRONTIERS IN INTELLIGENT COMPUTING: THEORY AND APPLICATIONS, (FICTA 2016), VOL 2, 2017, 516 : 289 - 295
  • [8] An Overview of Data Storage in Cloud Computing
    Odun-Ayo, Isaac
    Ajayi, Olasupo
    Akanle, Boladele
    Ahuja, Ravin
    2017 INTERNATIONAL CONFERENCE ON NEXT GENERATION COMPUTING AND INFORMATION SYSTEMS (ICNGCIS), 2017, : 29 - 34
  • [9] Bidirectional data verification for cloud storage
    Husain, Mohammad Iftekhar
    Ko, Steven Y.
    Uurtamo, Steve
    Rudra, Atri
    Sridhar, Ramalingam
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2014, 45 : 96 - 107
  • [10] A survey on security challenges in cloud computing: issues, threats, and solutions
    Hamed Tabrizchi
    Marjan Kuchaki Rafsanjani
    The Journal of Supercomputing, 2020, 76 : 9493 - 9532