CFP last date
22 April 2024
Reseach Article

A Comprehensive Survey on Storage Techniques in Cloud Computing

by Amol S. Choure, S. M. Bansode
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 122 - Number 18
Year of Publication: 2015
Authors: Amol S. Choure, S. M. Bansode
10.5120/21801-5109

Amol S. Choure, S. M. Bansode . A Comprehensive Survey on Storage Techniques in Cloud Computing. International Journal of Computer Applications. 122, 18 ( July 2015), 23-25. DOI=10.5120/21801-5109

@article{ 10.5120/21801-5109,
author = { Amol S. Choure, S. M. Bansode },
title = { A Comprehensive Survey on Storage Techniques in Cloud Computing },
journal = { International Journal of Computer Applications },
issue_date = { July 2015 },
volume = { 122 },
number = { 18 },
month = { July },
year = { 2015 },
issn = { 0975-8887 },
pages = { 23-25 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume122/number18/21801-5109/ },
doi = { 10.5120/21801-5109 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:10:54.462866+05:30
%A Amol S. Choure
%A S. M. Bansode
%T A Comprehensive Survey on Storage Techniques in Cloud Computing
%J International Journal of Computer Applications
%@ 0975-8887
%V 122
%N 18
%P 23-25
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

It has been great development in cloud computing since past few years. It offers different kinds of services for example Software as a Service (SaaS), Platform as a Service (PaaS), Infrastructure as Service (IaaS). Cloud computing enables the user and organizations to store their data remotely and enjoy good quality applications on the demand without having any burden associated with local hardware resources and software managements but it possesses a new security risk towards correctness of data stored at cloud. There has been different techniques which in turn provide correctness of data, for example Merkle Hash Tree (MHT), Distributed erasure-coded data & flexible distributed storage integrity auditing mechanism. This work is based on the survey of different techniques of cloud storage with their benefits, disadvantages and security challenges. This particular study allows you to discover long term research areas and techniques for bettering the current downsides.

References
  1. Li H, Dai Y and H. Yang, "Identity-Based Authentication for Cloud Computing", M. G. Jaatun, G. Zhao, and C. Rong (Eds. ): Cloud Computing, Lecture Notes in Computer Science, 2009.
  2. Parakh A, and Kak S, "Online data storage using implicit security", Information Sciences, 2009.
  3. Wang Q, Wang C, Kui Ren and Wenjing Lou, "Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing", IEEE Transactions on Parallel and Distributed Systems, 2011.
  4. Prasanthi, C. Balasubramanian, S. Kimsukha Selvi, K. Kala , "An Efficient Auditing Protocol for Secure Data Storage in Cloud Computing", Proceedings of the World Congress on Engineering 2014.
  5. Subramanian R , Kumar S P, "An efficient and secure protocol for ensuring data storage security in Cloud Computing", International Journal of Computer Science Issues, 2011.
  6. Dinesh C, "Data Integrity and Dynamic Storage Way in Cloud Computing", Distributed, Parallel, and Cluster Computing, 2011.
  7. Sajithabanu S, Raj E G P, "Data Storage Security in Cloud", International Journal of Computer Science and Technology, 2011.
  8. Wang C, Wang Q, Kui Ren, Ning Cao and Wenjing Lou, "Toward Secure and Dependable Storage Services in Cloud Computing", IEEE Transactions on Services Computing, 2012.
  9. Spillner J, Müller J and Schill A, "Creating optimal cloud storage systems", Future Generation Computer Systems, 2012.
  10. Zheng Q, Dong B et al. (2012), "An optimized approach for storing and accessing small files on cloud storage", Journal of Network and Computer Applications, 2012.
  11. Deshmukh P M, Gughane A S et al, "Maintaining File Storage Security in Cloud Computing", International Journal of Emerging Technology and Advanced Engineering, 2012.
  12. Cong Wang, Sherman S. M. Chow, Qian Wang, Kui Ren, and Wenjing Lou, "Privacy Preserving Public Auditing for Secure Cloud Storage", IEEE, February 2013.
  13. Pradnya B. Godhankar, Deepak Gupta, "Review of Cloud Storage Security and Cloud Computing Challenges", International Journal of Computer Science and Information Technologies, 2014.
  14. Kishan Lathkar, Ambulgekar H. P, "Public Auditability and Privacy preserving in Cloud Storage'', Journal of Information Security Research, 2015
Index Terms

Computer Science
Information Sciences

Keywords

Cloud Computing Data Security Storage Techniques Integrity Survey Authentication.