![]() |
10.5120/ijca2017913472 |
Samson Akintoye, Antoine Bagula, Yacine Djemaiel and Noureddine Bouriga. A Survey on Storage Techniques in Cloud Computing. International Journal of Computer Applications 163(2):22-30, April 2017. BibTeX
@article{10.5120/ijca2017913472, author = {Samson Akintoye and Antoine Bagula and Yacine Djemaiel and Noureddine Bouriga}, title = {A Survey on Storage Techniques in Cloud Computing}, journal = {International Journal of Computer Applications}, issue_date = {April 2017}, volume = {163}, number = {2}, month = {Apr}, year = {2017}, issn = {0975-8887}, pages = {22-30}, numpages = {9}, url = {http://www.ijcaonline.org/archives/volume163/number2/27369-2017913472}, doi = {10.5120/ijca2017913472}, publisher = {Foundation of Computer Science (FCS), NY, USA}, address = {New York, USA} }
Abstract
In recent years, cloud computing is highly embraced and considered a must have in the IT world. Cloud computing is a computing paradigm, where a large pool of systems are connected in private, public or hybrid networks, to provide dynamically scalable infrastructure for computing resources. One of the services provided by cloud computing is cloud storage that enables the upload and the retrieval of different kinds of data. Accessing cloud storage service through Internet and pay as you used subscription have been the reasons for the emergence of methods and techniques to effectively store data and reduce storage security vulnerabilities in the cloud storage. This paper provides a survey of some proposed cloud storage methods and techniques, their advantages and drawbacks and makes stress on the current requirements for storage techniques in cloud computing.
References
- Vandana Bhatia and Ajay Jangra “SETiNS: Storage Efficiency Techniques in No-SQL database for Cloud Based Design” EEE International Conference on Advances in Engineering & Technology Research (ICAETR 2014),August 01-02, 2014, Dr. Virendra Swarup Group of Institutions, Unnao, India.
- D.Pratiba , Dr.G.Shobha and Vijaya Lakshmi.P.S “EFFICIENT DATA RETRIEVAL FROM CLOUD STORAGE USING DATA MINING TECHNIQUE” international Journal on Cybernetics & Informatics (IJCI) Vol. 4, No. 2, April 2015
- Tian Guo , Thanasis G. Papaioannou and Karl Aberer “Efficient Indexing and Query Processing of Model-View Sensor Data in the Cloud” Big Data Research, Published by Elsevier Inc http://dx.doi.org/10.1016/j.bdr.2014.07.005 2214-5796, 2014.
- Waraporn Leesakul, Paul Townend, Jie Xu “Dynamic Data Deduplication in Cloud Storage” 2014 IEEE 8th International Symposium on Service Oriented System Engineering, 2014
- [5 ] Xiao-Long Liu , Ruey-Kai Sheu , Shyan-Ming Yuan, Yu-Ning Wang “A file-deduplicated private cloud storage service with CDMI standard” Computer Standards & Interfaces, Published by Elsevier Inc http://dx.doi.org/10.1016/j.csi.2015.09.01044 (2016) 18–27
- Prabavathy B, Subha Devi M and Chitra Babu “Multi-Index Technique for Metadata Management in Private Cloud Storage” International Conference on Recent Trends in Information Technology (ICRTIT), IEEE, ISBN:978-1-4799-1024-3, 2013
- Ling-Yin Wei , Ya-Ting Hsu , Wen-Chih Peng and Wang-Chien Lee “Indexing spatial data in cloud data managements” Pervasive and Mobile Computing, Published by Elsevier Inc, http://dx.doi.org/10.1016/j.pmcj.2013.07.001, 1574-1192, 2013
- Cengiz Karakoyunlu and John A. Chandy “Exploiting user metadata for energy-aware node allocation in a cloud storage system” Journal of Computer and System Sciences, Published by Elsevier Inc, http://dx.doi.org/10.1016/j.jcss.2015.09.003, 2015
- Zhen Huang , Jinbang Chen , Yisong Lin , Pengfei You and Yuxing Peng “Minimizing data redundancy for high reliable cloud storage systems” journal of Computer Networks, Published by Elsevier Inc, http://dx.doi.org/10.1016/j.comnet.2015.02.013, 81 (2015) 164–177
- Li H, Dai Y and H. Yang, "Identity-BasedAuthentication for Cloud Computing", M. G. Jaatun, G.Zhao, and C. Rong (Eds.): Cloud Computing, Lecture Notes in Computer Science, 2009.
- Peter Mell, Tim Grance, The NIST Definition of Cloud Computing, Version 15, October 7, 2009
- M. Fallah, M. G. Arani and M. Maeen, "NASLA: Novel Auto Scaling Approach based on Learning Automata for Web Application in Cloud Computing Environment", International Journal of Computer Applications, vol. 113, no. 2, (2015), pp. 18-23.
- Bo Dong , Qinghua Zheng , Feng Tian , Kuo-Ming Chao , Rui Ma and Rachid Anane “An optimized approach for storing and accessing small files on cloud storage” Journal of Network and Computer Applications 35 (2012) 1847–1862
- K. D. Bowers, A. Juels, and A. Oprea. “Hail: Ahigh-availability and integrity layer for cloud storage.” In Proc. of the 16th ACM Conference on Computer and Communication Security (CCS), pages 187–198, November 2009.
- H. Abu-Libdeh, L. Princehouse, and H. Weatherspoon. Racs: A case for cloud storage diversity. Proc. of the 1st ACM Symposium on Cloud Computing, pages 1204–1216, June 2010.
- A. Bessani, M. Correia, B. Quaresma, F. Andre, , and P. Sousa. “Depsky: Dependable and secure storage in a cloud-of-clouds.” In Proc. of ACM EuroSys, 2011.
- H. C. H. Chen, Y. Hu, P. P. C. Lee, and Y. Tang. “Nccloud:a network coding based storage system in a cloud of clouds. January 2014.”
- L. Badger, T Grance, R. P. Comer and J. Voas, DRAFT cloud computing synopsis and recommendations, Recommendations of National Institute of Standards and Technology (NIST), May2012.
- L. Zhou, V. Varadharajan, and M. Hitchens "Achieving Secure Role-Based Access Control on Encrypted Data in Cloud Storage" Journal of IEEE Transactions on Information Forensics and Security archive Volume 8 Issue 12, December 2013 Page 1947-1960.
- L. Yang, X. Jia, K. Ren and B. Zhang “DAC-MACS: Effective Data Access Control for Multi-Authority Cloud Storage Systems” 2013 Proceedings IEEE INFOCOM
- Hadoop Archives. Hadoop archives guide; 2011. /http://hadoop.apache.org/common/docs/current/hadoop_archives.htmlS.
- S. B. Akintoye, and K. A. Akintoye “Data Security scheme for Cloud Computing using Signcryption Based on HyperElliptic curves" Journal of Research and Development, Vol. 2, No. 7, Pg. 10–19, 2015.
Keywords
Cloud computing, Storage Technique, Cloud Storage, Cloud Security