Call for Paper - January 2023 Edition
IJCA solicits original research papers for the January 2023 Edition. Last date of manuscript submission is December 20, 2022. Read More

A Comprehensive Survey on Storage Techniques in Cloud Computing

Print
PDF
International Journal of Computer Applications
© 2015 by IJCA Journal
Volume 122 - Number 18
Year of Publication: 2015
Authors:
Amol S. Choure
S. M. Bansode
10.5120/21801-5109

Amol S Choure and S M Bansode. Article: A Comprehensive Survey on Storage Techniques in Cloud Computing. International Journal of Computer Applications 122(18):23-25, July 2015. Full text available. BibTeX

@article{key:article,
	author = {Amol S. Choure and S. M. Bansode},
	title = {Article: A Comprehensive Survey on Storage Techniques in Cloud Computing},
	journal = {International Journal of Computer Applications},
	year = {2015},
	volume = {122},
	number = {18},
	pages = {23-25},
	month = {July},
	note = {Full text available}
}

Abstract

It has been great development in cloud computing since past few years. It offers different kinds of services for example Software as a Service (SaaS), Platform as a Service (PaaS), Infrastructure as Service (IaaS). Cloud computing enables the user and organizations to store their data remotely and enjoy good quality applications on the demand without having any burden associated with local hardware resources and software managements but it possesses a new security risk towards correctness of data stored at cloud. There has been different techniques which in turn provide correctness of data, for example Merkle Hash Tree (MHT), Distributed erasure-coded data & flexible distributed storage integrity auditing mechanism. This work is based on the survey of different techniques of cloud storage with their benefits, disadvantages and security challenges. This particular study allows you to discover long term research areas and techniques for bettering the current downsides.

References

  • Li H, Dai Y and H. Yang, "Identity-Based Authentication for Cloud Computing", M. G. Jaatun, G. Zhao, and C. Rong (Eds. ): Cloud Computing, Lecture Notes in Computer Science, 2009.
  • Parakh A, and Kak S, "Online data storage using implicit security", Information Sciences, 2009.
  • Wang Q, Wang C, Kui Ren and Wenjing Lou, "Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing", IEEE Transactions on Parallel and Distributed Systems, 2011.
  • Prasanthi, C. Balasubramanian, S. Kimsukha Selvi, K. Kala , "An Efficient Auditing Protocol for Secure Data Storage in Cloud Computing", Proceedings of the World Congress on Engineering 2014.
  • Subramanian R , Kumar S P, "An efficient and secure protocol for ensuring data storage security in Cloud Computing", International Journal of Computer Science Issues, 2011.
  • Dinesh C, "Data Integrity and Dynamic Storage Way in Cloud Computing", Distributed, Parallel, and Cluster Computing, 2011.
  • Sajithabanu S, Raj E G P, "Data Storage Security in Cloud", International Journal of Computer Science and Technology, 2011.
  • Wang C, Wang Q, Kui Ren, Ning Cao and Wenjing Lou, "Toward Secure and Dependable Storage Services in Cloud Computing", IEEE Transactions on Services Computing, 2012.
  • Spillner J, Müller J and Schill A, "Creating optimal cloud storage systems", Future Generation Computer Systems, 2012.
  • Zheng Q, Dong B et al. (2012), "An optimized approach for storing and accessing small files on cloud storage", Journal of Network and Computer Applications, 2012.
  • Deshmukh P M, Gughane A S et al, "Maintaining File Storage Security in Cloud Computing", International Journal of Emerging Technology and Advanced Engineering, 2012.
  • Cong Wang, Sherman S. M. Chow, Qian Wang, Kui Ren, and Wenjing Lou, "Privacy Preserving Public Auditing for Secure Cloud Storage", IEEE, February 2013.
  • Pradnya B. Godhankar, Deepak Gupta, "Review of Cloud Storage Security and Cloud Computing Challenges", International Journal of Computer Science and Information Technologies, 2014.
  • Kishan Lathkar, Ambulgekar H. P, "Public Auditability and Privacy preserving in Cloud Storage'', Journal of Information Security Research, 2015