The author states that in cloud storage, various properties of data security like data integrity, availability as well as confidentiality is considered as significant applications in the commercial field. It is identified that different types of provable data possession schemes are quite helpful in protecting the data integrity. However, it is analyzed that in some cases the remote data possession helps in checking task for some proxy (Ren et al., 2015). The author elaborates that the PDP schemes are generally secured as the various types of proxy helps in storing information in various servers of elaborates cloud storage. The paper proposed a verifiable data possession scheme that generally utilizes different types of shared key that helps in constructing the authenticator. It is found that the verifier that is mainly utilized in the scheme is stateless as well as independent service that is provided by the cloud storage.
The article elaborates that data access control is one of the significant way that helps in ensuring data security within the cloud. However, it is identified that due to untrusted servers of cloud as well as data outsourcing, the access control in data is considered as one of the challenging issue within the storage system of cloud (Yang &Jia, 2014). The author elaborates that the present schemes of access control is not properly applicable to clouds storage system as number of encrypted copies of data needs fully trusted server of the cloud. In this article, the author illustrates data access control for different type of multiauthority cloud storage, effective as well as secured scheme of access control with proper revocation as well as decryption is needed. It is identified that proper CP-ABE scheme with proper decryption for designing proper attribute for revocation methodology helps in achieving both backward as well as forward security. Proper as well as extensive scheme of access control is secured under proper security assumptions.
The author elaborates that data sharing is functionality in cloud storage. This article illustrates the flexibility as well as efficiency of sharing data with other due to the help of cloud storage. It is identified that public key cryptosystems helps in producing constant size for receiving proper delegation of encryption of rights for various set of cipher texts are needed. It is found that the novelty is one that helps in aggregating various set of secret keys for making them much more compact as single key (Chu et al., 2014). However, it helps in encompassing the owner of various keys that are being aggregated. The author discusses that the secret key holder generally helps in releasing proper size of aggregate for different type of flexible choices of cipher text that generally set in different cloud storage. On the other hand, it is found that the encrypted files outside helps in keeping information confidential. This main aggregate key can be generally transferred to other for storing smart card for securing storage.
The article illustrates that data owners generally host various data on users as well as on cloud servers for accessing various types of data from the servers of cloud. Due to outsourcing of data, it is identified that paradigm related with the service of data hosting assists in introducing various types of security related challenges that further needed an independent service of auditing in order to check the integrity of various data and information within the cloud (Yang & Jia, 2013). It is found that different types of remote integrity checking procedures that presently utilized helps in serving the various types of archive data, which cannot be used properly within the service of auditing the data as it is analyzed that the cloud is updated dynamically. Therefore, it is identified that both secure as well as efficient protocol of auditing framework that is associated with cloud storage is considered as one of the efficient as well as privacy preserving protocol of auditing.
The article elaborates that selecting proper system of cloud storage as well as specific operation of writing as well as reading data generally requires the developers to make appropriate decisions that generally trade of various consistency for performance as well as availability (Terry et al., 2013). It is found that application can be a choice that is not found to be ideal for various changing conditions as well as clients. It is analyzed that pileus one of the replicated key value that generally helps in storing various It is identified that it dynamically assists in selecting appropriate servers for accessing for providing proper service to the system condition as well as current configuration. It is analyzed that in application based SLAs developers can generally helps in requesting strong as well as consistent guarantees.
The paper illustrates that with proper development in cloud computing it is identified that there has been proper growing of cloud for various large-scale storage of data. This generally creates number of security related issues that helps in controlling as well as preventing various types of unauthorized access for storing the data in cloud. It is analyzed by the author that role based access control is helpful in providing proper flexibility controls by two mappings (Zhou, Varadharajan & Hitchens, 2013). It is identified that proper RBE scheme helps in integrating various types of cryptographic technique in context to RBAC. The RBE scheme generally helps in allowing proper policies that must be enforced for the encrypted data that is mainly stored within the public cloud. Depending on the scheme, it is presented that RBE based hybrid related cloud architecture helps in allowing the organization to store various types of data in a quite secured way for securing different types of sensitive information.
The paper mainly focuses on data integrity protection in order to regenerate coding that is dependent on cloud storage. It is identified that for protecting various types of data that are outsourced through cloud storage against different type of corruptions that generally helps in incorporating fault tolerance to the cloud storage in order to recover various types of procedures. The author elaborates that regeneration of code helps in providing tolerance for stripping data across different servers while utilizing repair traffic during the failure recovery (Chen & Lee, 2014). It is found that protecting as well as designing data integrity protection helps in regenerating code and preserving various types of intrinsic properties of repair traffic as well as fault tolerance. The author describes that the scheme of DIP is mainly designed for undertaking mobile adversarial that assists in enabling client feasibility for verifying integrity of random subsets that are generally outsourced against various types of malicious corruptions.
The article illustrates that the cloud platform generally helps in encompassing various number of storage services that can be utilized for managing various requirements as well as needs of the customers. It is identified that each of the different services, which are provided, are generally characterized with the help of specific features, prices as well as limitations (Esposito et al., 2016). In presence of various types of option, it is very much needed to select the proper solution in context to cost as well as service quality. It is found that in most of the cases that various types of approaches that are generally available are nota appropriate for handling uncertainty in context to subjective preferences from customers. Additionally it is identified that multi-objective nature of various selection procedure is quite difficult to manage in a quite distributed way for different scalability reasons.
The author elaborates that cloud storage services like Dropbox, Microsoft OneDrive, Google Drive, and furnish clients with proper way for storing as well as offering various types of information from different places on any gadget at any time. It is found that the foundation of the administrations is mainly dependent on information synchronization operation, which mainly helps in adjusting the clients in the nearby file systems to the cloud by means of a proper progression of system that interchanges in an opportune way. If not composed legitimately, in any case, the huge measure of information adjust movement can conceivably cause (financial) torments to both specialist organizations and clients (Li et al., 2016). The author also analyzes that the outcomes show that a significant bit of the information synchronize activity is it might be said inefficient, and can be viably maintained a strategic distance from or fundamentally diminished by means of precisely outlined information match up components.orage for coding interestingly. Secure cloud storage was proposed as one of the secure systems coding that is mainly contemplated for ten years. It is identified that in spite of the fact that the two ranges are very extraordinary in their temperament and are considered freely, we demonstrate to develop a protected cloud storage convention given any protected system coding convention (Chen et al., 2016). These offers ascend to a deliberate approach to develop secure distributed storage conventions. Our development is secure under a definition, which catches this present reality use of the distributed storage. Thus, it is analyzed that two particular secure distributed storage conventions in light of two late secure system-coding conventions are discussed. Specifically, we acquire the principal freely unquestionable secure cloud storage convention within the standard model.
The article mainly focuses on a network coding that is mainly dependent on storage system of cloud. It is identified that in order to provide proper fault tolerances within the cloud storage various stripe of data across different cloud vendors are proposed. However, it is analyzed that cloud generally suffers from various failure that losses all its data for repairing the lost data with the help of other that generally survive on cloud for preserving various types of data redundancy (Chen et al., 2014). A proxy based storage system is generally presented for tolerating multiple type of cloud storage, which is known as NCCCloud. It is analyzed that NCCCloud is mainly built on network-based storage scheme that is known as functional minimum storage regenerating codes. NCCloud is based over a system coding-based capacity conspire called the practical least stockpiling recovering codes, which keep up a similar adaptation to non-critical failure and information excess as in conventional eradication codes however utilize less repair movement and thus acquire less financial cost because of information exchange. It is also found that FMSR codes helps in encoding prerequisite of capacity hubs amid repair, while saving the advantages of system coding in repair.
The paper elaborates that cloud storage auditing is quite significant service as it generally helps in verifying the integrity of the data in cloud. It is identified that the current protocols generally depends on various assumptions that are considered as the secret key for auditing securely. However, it is found that such types of assumptions are not held possibly due to weak sense of security. If the secret auditing is exposed then it is analyzed that most of the protocols that is associated with auditing is inevitably unable to work. In addition to this, it is found that minimizing the damage of the client in cloud storage auditing proper practical solution must be provided for new problem setting.
Chen, F., Xiang, T., Yang, Y., & Chow, S. S. (2016). Secure cloud storage meets with secure network coding. IEEE Transactions on Computers, 65(6), 1936-1948.
Chen, H. C., & Lee, P. P. (2014). Enabling data integrity protection in regenerating-coding-based cloud storage: Theory and implementation. IEEE transactions on parallel and distributed systems, 25(2), 407-416.
Chen, H. C., Hu, Y., Lee, P. P., & Tang, Y. (2014). NCCloud: A network-coding-based storage system in a cloud-of-clouds. IEEE Transactions on computers, 63(1), 31-44.
Chu, C. K., Chow, S. S., Tzeng, W. G., Zhou, J., & Deng, R. H. (2014). Key-aggregate cryptosystem for scalable data sharing in cloud storage. IEEE transactions on parallel and distributed systems, 25(2), 468-477.
Esposito, C., Ficco, M., Palmieri, F., & Castiglione, A. (2016). Smart cloud storage service selection based on fuzzy logic, theory of evidence and game theory. IEEE Transactions on computers, 65(8), 2348-2362.
Li, Z., Dai, Y., Chen, G., & Liu, Y. (2016). Toward network-level efficiency for cloud storage services. In Content Distribution for Mobile Internet: A Cloud-based Approach (pp. 167-196). Springer Singapore.
Ren, Y. J., Shen, J., Wang, J., Han, J., & Lee, S. Y. (2015). Mutual verifiable provable data auditing in public cloud storage 16(2), 317-323.
Terry, D. B., Prabhakaran, V., Kotla, R., Balakrishnan, M., Aguilera, M. K., & Abu-Libdeh, H. (2013, November). Consistency-based service level agreements for cloud storage. In Proceedings of the Twenty-Fourth ACM Symposium on Operating Systems Principles (pp. 309-324). ACM.
Yang, K., & Jia, X. (2013). An efficient and secure dynamic auditing protocol for data storage in cloud computing. IEEE transactions on parallel and distributed systems, 24(9), 1717-1726.
Yang, K., & Jia, X. (2014). DAC-MACS: Effective data access control for multi-authority cloud storage systems. In Security for Cloud Storage Systems(pp. 59-83). Springer New York.
Yu, J., Ren, K., Wang, C., & Varadharajan, V. (2015). Enabling cloud storage auditing with key-exposure resistance. IEEE Transactions on Information forensics and security, 10(6), 1167-1179.
Zhou, L., Varadharajan, V., & Hitchens, M. (2013). Achieving secure role-based access control on encrypted data in cloud storage. IEEE transactions on information forensics and security, 8(12), 1947-1960.