Secure Data Storage and Sharing Techniques for Data Protection in Cloud Environments: A Systematic Review, Analysis, and Future Directions

被引:23
|
作者
Gupta, Ishu [1 ]
Singh, Ashutosh Kumar [2 ]
Lee, Chung-Nan [1 ]
Buyya, Rajkumar [3 ]
机构
[1] Natl Sun Yat Sen Univ, Cloud Comp Res Ctr, Dept Comp Sci & Engn, Kaohsiung 80424, Taiwan
[2] Natl Inst Technol Kurukshetra, Dept Comp Applicat, Kurukshetra 136119, Haryana, India
[3] Univ Melbourne, Sch Comp & Informat Syst, Cloud Comp & Distributed Syst CLOUDS Lab, Melbourne, Vic, Australia
关键词
Cloud computing; Data protection; Costs; Machine learning; Watermarking; Servers; Encryption; data privacy and security; data protection; data storage; data sharing; IoT; machine learning; cryptography; watermarking; access control; differential privacy; probabilistic approaches; ATTRIBUTE-BASED ENCRYPTION; DATA ACCESS-CONTROL; RELATIONAL DATABASES; WATERMARK DETECTOR; USER REVOCATION; KEY MANAGEMENT; RE-ENCRYPTION; ROBUST; ALGORITHMS; SCHEME;
D O I
10.1109/ACCESS.2022.3188110
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A large number of researchers, academia, government sectors, and business enterprises are adopting the cloud environment due to the least upfront capital investment, maximum scalability, and several other features of it. Despite the multiple features supported by the cloud environment, it also suffers several challenges. Data protection is the primary concern in the area of information security and cloud computing. Numerous solutions have been developed to address this challenge. However, there is a lack of comprehensive analysis among the existing solutions and a necessity emerges to explore, classify, and analyze the significant existing work for investigating the applicability of these solutions to meet the requirements. This article presents a comparative and systematic study, and in-depth analysis of leading techniques for secure sharing and protecting the data in the cloud environment. The discussion about each dedicated technique includes: functioning for protecting the data, potential and revolutionary solutions in the domain, the core and adequate information including workflow, achievements, scope, gaps, future directions, etc. about each solution. Furthermore, a comprehensive and comparative analysis of the discussed techniques is presented. Afterward, the applicability of the techniques is discussed as per the requirements and the research gaps along with future directions are reported in the field. The authors believe that this article's contribution will operate as a catalyst for the potential researchers to carry out the research work in the area.
引用
收藏
页码:71247 / 71277
页数:31
相关论文
共 50 条
  • [1] A Review of Scalable Data Sharing Techniques for Secure Cloud Storage
    Tripathi, Aditi
    Khare, Mayank Deep
    Singh, Pradeep Kumar
    2015 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTER ENGINEERING AND APPLICATIONS (ICACEA), 2015, : 899 - 901
  • [2] A comprehensive review of the data replication techniques in the cloud environments: Major trends and future directions
    Milani, Bahareh Alami
    Navimipour, Nima Jafari
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2016, 64 : 229 - 238
  • [3] Techniques of secure storage for cloud data
    Feng, Chao-Sheng
    Qin, Zhi-Guang
    Yuan, Ding
    Jisuanji Xuebao/Chinese Journal of Computers, 2015, 38 (01): : 150 - 163
  • [4] Data Storage Management in Cloud Environments: Taxonomy, Survey, and Future Directions
    Mansouri, Yaser
    Toosi, Adel Nadjaran
    Buyya, Rajkumar
    ACM COMPUTING SURVEYS, 2018, 50 (06)
  • [5] Addressing Techniques for Secure Data Sharing in Cloud
    Bhagat, Arti
    Rathee, Nisha
    PROCEEDINGS OF THE 2018 SECOND INTERNATIONAL CONFERENCE ON INVENTIVE COMMUNICATION AND COMPUTATIONAL TECHNOLOGIES (ICICCT), 2018, : 499 - 503
  • [6] Secure Data Storage in Distributed Cloud Environments
    Jordao, Renata
    Martins, Valerio Aymore
    Buiati, Fabio
    de Sousa Junior, Rafael Timoteo
    de Deus, Flavio Elias
    2014 IEEE INTERNATIONAL CONFERENCE ON BIG DATA (BIG DATA), 2014,
  • [7] Secure Data Storage Architecture on Cloud Environments
    Tran Thi Xuan Trang
    Maruyama, Katsuhisa
    ICSOFT-EA: PROCEEDINGS OF THE 11TH INTERNATIONAL JOINT CONFERENCE ON SOFTWARE TECHNOLOGIES - VOL. 1, 2016, : 39 - 47
  • [8] A Secure Architecture for Data Storage in the Cloud Environments
    Fu, Chuan
    Yang, Jun
    Liu, Zheli
    Jia, Chunfu
    2015 9TH INTERNATIONAL CONFERENCE ON INNOVATIVE MOBILE AND INTERNET SERVICES IN UBIQUITOUS COMPUTING IMIS 2015, 2015, : 289 - 291
  • [9] A Systematic Literature Review of the Data Replication Techniques in the Cloud Environments
    Milani, Bahareh Alami
    Navimipour, Nima Jafari
    BIG DATA RESEARCH, 2017, 10 : 1 - 7
  • [10] Secure Data Access and Sharing Scheme for Cloud Storage
    Li, Xiong
    Kumari, Saru
    Shen, Jian
    Wu, Fan
    Chen, Caisen
    Islam, S. K. Hafizul
    WIRELESS PERSONAL COMMUNICATIONS, 2017, 96 (04) : 5295 - 5314