A Review on Secure Storage Using Bidirectional Verification Techniques in Cloud Computing

  • Abstract
  • Keywords
  • References
  • PDF
  • Abstract

    Cloud computing increases the capacity or capabilities vigorously without devoting new infrastructure, training new personnel, or licensing the new software . In the past few years, cloud computing has grown from being a promising business concept to one of the fast-growing sectors of IT industry. As the more sensitive information and data are moved into the cloud data centers, they run on virtual computing resources in the form of virtual machines. Security has become one of the major issue in cloud computing which reduces the growth of cloud environment with complications in data privacy and data protection continue to outbreak the market. A new model created for the advancement should not result as a threat to the existing model. The architecture of cloud poses such a threat to the security of existing models when deployed in a cloud environment. The different cloud service users need to be attentive in considerate,about the risk of data breaks in the new environment. In this paper, advanced survey of the various secured storage in cloud computing using bidirectional protocols is presented.



  • Keywords

    bidirectional protocols, security, virtual computing resources, virtual machine

  • References

      [1] Sravanthi, M., &Bhaskar, N. (2016). Shared Authority Based Privacy-Preserving Authentication Protocol in Cloud Computing.

      [2] Tamrakar, S., Hoang, L. N., Pendyala, P. K., Paverd, A., Asokan, N., & Sadeghi, A. R. (2015). OmniShare: Securely accessing encrypted cloud storage from multiple authorized devices. CoRR, abs/1511.02119.

      [3] Gupta, S., & Xaxa, M. D. K. (2016). Cloud Security based on ECC-Diffie-hellman Protocol and Storage Optimization using compression.

      [4] Sookhak, M., Yu, F. R., Khan, M. K., Xiang, Y., & Buyya, R. (2017). Attribute-based data access control in mobile cloud computing: Taxonomy and open issues. Future Generation Computer Systems, 72, 273-287.

      [5] Almorsy, M., Grundy, J., & Müller, I. (2016). An analysis of the cloud computing security problem. arXiv preprint arXiv:1609.01107.

      [6] Ren, Y. J., Shen, J., Wang, J., Han, J., & Lee, S. Y. (2015). Mutual verifiable provable data auditing in public cloud storage. 16(2), 317-323.

      [7] Joshi, B., Joshi, B., & Rani, K. (2017). Mitigating Data Segregation and Privacy Issues in Cloud Computing. In Proceedings of International Conference on Communication and Networks (pp. 175-182). Springer, Singapore.

      [8] Sookhak, M., Gani, A., Khan, M. K., & Buyya, R. (2017). Dynamic remote data auditing for securing big data storage in cloud computing. Information Sciences, 380, 101-116.

      [9] Mohit, P., Amin, R., Karati, A., Biswas, G. P., & Khan, M. K. (2017). A standard mutual authentication protocol for cloud computing based health care system. Journal of medical systems, 41(4), 50.

      [10] Fang, K., Li, X., Hao, J., & Feng, Z. (2016, August). Formal Modeling and Verification of Security Protocols on Cloud Computing Systems Based on UML 2.3. In Trustcom/BigDataSE/I SPA, 2016 IEEE (pp. 852-859). IEEE.

      [11] Yang, K., & Jia, X. (2013). An efficient and secure dynamic auditing protocol for data storage in cloud computing. IEEE transactions on parallel and distributed systems, 24(9), 1717-1726.

      [12] Boopathy, D., & Sundaresan, M. (2016). Secured Cloud Data Storage––Prototype Trust Model for Public Cloud Storage. In Proceedings of International Conference on ICT for Sustainable Development (pp. 329-337). Springer Singapore.

      [13] Vurukonda, N., Rao, B. T., & Reddy, B. T. (2016). A secured cloud data storage with access privileges. International Journal of Electrical and Computer Engineering, 6(5), 2338.

      [14] Hsien, W. F., Yang, C. C., & Hwang, M. S. (2016). A Survey of Public Auditing for Secure Data Storage in Cloud Computing. IJ Network Security, 18(1), 133-142.

      [15] Shin, Y., Koo, D., & Hur, J. (2017). A Survey of Secure Data Deduplication Schemes for Cloud Storage Systems. ACM Computing Surveys (CSUR), 49(4), 74.

      [16] Yu, Y., Au, M. H., Ateniese, G., Huang, X., Susilo, W., Dai, Y., & Min, G. (2017). Identity-based remote data integrity checking with perfect data privacy preserving for cloud storage. IEEE Transactions on Information Forensics and Security, 12(4), 767-778.

      [17] Yadav, D. S., & Doke, K. (2016). Mobile Cloud Computing Issues and Solution Framework.

      [18] Modi, C., Patel, D., Borisaniya, B., Patel, A., & Rajarajan, M. (2013). A survey on security issues and solutions at different layers of Cloud computing. The Journal of Supercomputing, 63(2), 561-592.


      Meenakshi, K., & George, V. S. (2014). Cloud server storage security using TPA. International Journal of Advanced Research in Computer Science and Technology.




Article ID: 24128
DOI: 10.14419/ijet.v7i4.36.24128

Copyright © 2012-2015 Science Publishing Corporation Inc. All rights reserved.