Issues and Threats of Cloud Data Storage

被引:0
作者
Berrezzouq, Maryem [1 ]
El Ghazi, Abdellatif [2 ]
Abdelali, Zineelabidine [1 ]
机构
[1] Univ Mohammed V L3AD, FSR, Rabat, Morocco
[2] Univ Int Rabat, TicLab, ECINE, Sala El Jadida, Morocco
来源
CLOUD COMPUTING AND BIG DATA: TECHNOLOGIES, APPLICATIONS AND SECURITY | 2019年 / 49卷
关键词
Cloud storage; Security; Data cycle life; Data security threats; DATA POSSESSION CHECKING; SECURITY;
D O I
10.1007/978-3-319-97719-5_5
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Cloud Storage is a subset of Cloud Computing, a new technology that knows a hasty progress in the IT world. Indeed, many providers offer, as a service, plenty of Cloud Storage spaces, especially for mobile's use. Due to the massive use of this means of storage increase issues and threats. Thus, many efforts are dedicated by scientific and researches all over the word to avoid these risks and solve the various security problems that confront Cloud Storage. This Chapter is a modest contribution to the ongoing efforts. It will be focused on the Cloud Storage security. At first, we will try to describe the data life cycle and to giving meanwhile the security measures and methods for each cycle. Then, we will present some new approaches that protect data in Cloud. Finally, we will propose and discuss a new secure architecture based on three layers.
引用
收藏
页码:60 / 72
页数:13
相关论文
共 50 条
  • [41] SIOCEN: Secure Integrity Verification of Outsourced Data in Cloud Storage using Blockchain
    Korlapati, Ajay Chandra
    Nayak, Sanjeet Kumar
    Chakraborty, Partha Sarathi
    Tripathy, Somanath
    INFORMATION SECURITY PRACTICE AND EXPERIENCE, ISPEC 2023, 2023, 14341 : 595 - 613
  • [42] Efficient Privacy Preserving Integrity Checking Model for Cloud Data Storage Security
    Subha, T.
    Jayashri, S.
    2016 EIGHTH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING (ICOAC), 2017, : 55 - 60
  • [43] Efficient ID-based public auditing for the outsourced data in cloud storage
    Zhang, Jianhong
    Dong, Qiaocui
    INFORMATION SCIENCES, 2016, 343 : 1 - 14
  • [44] A Lightweight Identity-Based Remote Data Auditing Scheme for Cloud Storage
    Deng, Lunzhi
    Yang, Benjuan
    Wang, Xiangbin
    IEEE ACCESS, 2020, 8 : 206396 - 206405
  • [45] Fine-Grained and Controllably Editable Data Sharing With Accountability in Cloud Storage
    Hou, Huiying
    Ning, Jianting
    Zhao, Yunlei
    Deng, Robert
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 19 (05) : 3448 - 3463
  • [46] Two-Factor Data Security Protection Mechanism for Cloud Storage System
    Liu, Joseph K.
    Liang, Kaitai
    Susilo, Willy
    Liu, Jianghua
    Xiang, Yang
    IEEE TRANSACTIONS ON COMPUTERS, 2016, 65 (06) : 1992 - 2004
  • [47] A Lightweight and Efficient Remote Data Authentication Protocol Over Cloud Storage Environment
    Ghaffar, Zahid
    Shamshad, Salman
    Mahmood, Khalid
    Obaidat, Mohammad S.
    Kumari, Saru
    Khan, Muhammad Khurram
    IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2023, 10 (01): : 103 - 112
  • [48] Secure Cloud Storage of Data
    Dongre, Kirti A.
    Thakur, Roshan Singh
    Abraham, Allan
    2014 INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND INFORMATICS (ICCCI), 2014,
  • [49] Secure Data Deduplication System with Tag Consistency in Cloud Data Storage
    Patil, Pramod Gorakh
    Dixit, Aditya Rajesh
    Sharma, Aman
    Mahale, Prashant Rajendra
    Jadhav, Mayur Pundlik
    INTERNATIONAL CONFERENCE ON COMPUTER NETWORKS AND COMMUNICATION TECHNOLOGIES (ICCNCT 2018), 2019, 15 : 119 - 124
  • [50] Secured data storage with users validation in cloud environment
    Gangadharaiah N.K.C.
    Chinnasamy C.
    Gangadharaiah, Naveen Kumar Chunganahalli (cgnaveenkumar11@gmail.com), 2018, Lavoisier (23): : 61 - 72