Survey on securing data storage in the cloud

Chun Ting Huang, Lei Huang*, Zhongyuan Qin, Hang Yuan, Lan Zhou, Vijay Varadharajan, C. C Jay Kuo

*Corresponding author for this work

Research output: Contribution to journalReview articlepeer-review

53 Citations (Scopus)
2 Downloads (Pure)

Abstract

Cloud Computing has become a well-known primitive nowadays; many researchers and companies are embracing this fascinating technology with feverish haste. In the meantime, security and privacy challenges are brought forward while the number of cloud storage user increases expeditiously. In this work, we conduct an in-depth survey on recent research activities of cloud storage security in association with cloud computing. After an overview of the cloud storage system and its security problem, we focus on the key security requirement triad, i.e., data integrity, data confidentiality, and availability. For each of the three security objectives, we discuss the new unique challenges faced by the cloud storage services, summarize key issues discussed in the current literature, examine, and compare the existing and emerging approaches proposed to meet those new challenges, and point out possible extensions and futuristic research opportunities. The goal of our paper is to provide a state-of-the-art knowledge to new researchers who would like to join this exciting new field.

Original languageEnglish
Article numbere7
Pages (from-to)1-17
Number of pages17
JournalAPSIPA Transactions on Signal and Information Processing
Volume3
DOIs
Publication statusPublished - 2014

Bibliographical note

Copyright the Author(s) 2014. Version archived for private and non-commercial use with the permission of the author/s and according to publisher conditions. For further rights please contact the publisher.

Keywords

  • cloud computing
  • data security
  • data integrity
  • confidentiality
  • access control
  • searchable encryptions
  • data availability
  • Access control
  • Cloud computing
  • Data security
  • Searchable encryptions
  • Data integrity
  • Confidentiality
  • Data availability

Fingerprint Dive into the research topics of 'Survey on securing data storage in the cloud'. Together they form a unique fingerprint.

Cite this