9

Click here to load reader

Data Storage Security and Privacy in Cloud Computing: A ... Scheme for Secure Data Sharing with Public Cloud”, In the Proceedings of the 7th ACM Symposium on Information, Computer

Embed Size (px)

Citation preview

Page 1: Data Storage Security and Privacy in Cloud Computing: A ... Scheme for Secure Data Sharing with Public Cloud”, In the Proceedings of the 7th ACM Symposium on Information, Computer

Data Storage Security and Privacy in Cloud Computing: A Comprehensive Survey

{tag} {/tag} International Journal of Computer Applications Foundation of Computer Science (FCS), NY, USA Volume 156- Number 12 Year of Publication: 2016 Authors: Jeevitha B. K., Thriveni J., Venugopal K. R. 10.5120/ijca2016912513 {bibtex}2016912513.bib{/bibtex} Abstract

Cloud Computing is a form of distributed computing wherein resources and applicationplatforms are distributed over the Internet through on demand and pay on utilization basis. DataStorage is main feature that cloud data centres are provided to the companies/organizations topreserve huge data. But still few organizations are not ready to use cloud technology due tolack of security. This paper describes the different techniques along with few securitychallenges, advantages and also disadvantages. It also provides the analysis of data securityissues and privacy protection affairs related to cloud computing by preventing data access fromunauthorized users, managing sensitive data, providing accuracy and consistency of datastored.

References 1. P. Mell and T.Grance, “The NIST Definition of Cloud Computing”, Natinal Institute ofStandards and Techology, vol. 53, no.6, pp. 1-3, 2009.

1 / 9

Page 2: Data Storage Security and Privacy in Cloud Computing: A ... Scheme for Secure Data Sharing with Public Cloud”, In the Proceedings of the 7th ACM Symposium on Information, Computer

Data Storage Security and Privacy in Cloud Computing: A Comprehensive Survey

2. Leonard Heilig and Stefan Vob, “A Scientometric Analysis of Cloud Computing Literature”,IEEE Transactions on Cloud Comouting, vol. 2, no. 3, pp. 266-278, July-September 2014. 3. Cohen, Reuven, Rebello and Jagdish, “The State of Cloud Storage: A BenchmarkComparison of Speed, Availability and Scalability”, White paper, Nausni, 2015. 4. J. J.Wylie, M. Bakkaloglu, V. Pandurangan, M.W. Bigrigg, S. Oguz, K. Tew, C. Williams,G. R. Ganger, and P. K. Khosla, “Selecting the Right Data Distribution Scheme for a SurvivableStorage System”, Carnegie Mellon University, Technical Report, May 2001. 5. Linlin Wu, Saurabh Kumar Garg, Steve Versteeg, and Rajkumar Buyya, “SLA-BasedResource Provisioning for Hosted Software-as-a-Service Applications in Cloud ComputingEnvironments”, IEEE Transactions on Services Computing, vol. 7, no. 3, pp. 465-485,July-September 2014. 6. K. Hashizume, D. G. Rosado, E. Fernndez-Medina and E. B. Fernandez, “An Analysis ofSecurity Issues for Cloud Computing”, Journal of Internet Services and Applications, vol. 4, no.1, pp. 1-13, 2013. 7. G. Kappes, A. Hatzieleftheriou and S. V. Anastasiadis, “Dike: Virtualization-Aware AccessControl for Multitenant Filesystems”, University of Ioannina, Greece, Technical Report No.DCS2013-1, 2013. 8. Srinivasa Rao Chintada, ChandraSekhar Chinta, “Dynamic Massive Data StorageSecurity Challenges in Cloud Computing Environments”, International Journal of InnovativeResearch in Computer and Communication Engineering, vol. 2, no. 3, pp. 3609-3616, March2014. 9. Kevin D Bowers, Ari. Juels and Alina Oprea, “HAIL: A High Availability and Integrity Layerfor Cloud Storage”, In the Proceedings of the 16th ACM Conference on Computer andCommunications Security. ACM, pp. 187-198, 2009. 10. Spillner J, Mller J and Schill A, “Creating Optimal Cloud Storage Systems”, IEEETransactions on Utility and Cloud Computing, vol. 29, issue. 4, pp. 1062-1072, June 2013. 11. Maneesha Sharma, Himani Bansal, Amit Kumar Sharma, “Cloud Computing: DifferentApproach and Security Challenge”, International Journal of Soft Computing and Engineering(IJSCE), vol. 2, no. 1, pp. 421-424, March 2012. 12. Victor Chang, Muthu Ramachandran, “Towards Achieving Data Security with the CloudComputing Adoption Framework”, IEEE Transaction on Service Computing, vol. 9, issue. 1, pp.138-151, ISSN: 1939- 1374, January 2016. 13. Kalpana Batra, Ch. Sunitha, Sushil Kumar, “An Effective Data Storage Security Schemefor Cloud Computing”, International Journal of Innovative Research in Computer andCommunication Engineering, vol. 1, no. 4, pp. 808-815, June 2013. 14. Hamdan M. Al-Sabri, Saleh M. Al-Saleem, “Building a Cloud Storage Encryption (CSE)Architecture for Enhancing Cloud Security”, IJCSI International Journal of Computer ScienceIssues, vol. 10, no. 1, pp. 259-266, March 2013. 15. Keiko Hashizume, David G Rosado, Eduardo Fernndez-Medina and Eduardo BFernandez, “An Analysis of Security Issues for Cloud Computing”, Journal of Internet Servicesand Applications, pp. 1-13, 2013. 16. Dan Boneh, Xuhua Ding and Gene Tsudik, “Fine-grained Control of SecurityCapabilities”, ACM Transactions on Internet Technology (TOIT), vol. 1, no. 4, pp. 60-82. 2004. 17. Raghavendra S, Girish S, Geeta C M, Rajkumar Buyya, Venugopal K R, S S Iyengarand L M Patnaik, “IGSK: Index Generation on Split Keyword for Search over cloud data”, In theProceedings of International Conference on Computing and Network Communications

2 / 9

Page 3: Data Storage Security and Privacy in Cloud Computing: A ... Scheme for Secure Data Sharing with Public Cloud”, In the Proceedings of the 7th ACM Symposium on Information, Computer

Data Storage Security and Privacy in Cloud Computing: A Comprehensive Survey

(CoCoNet), pp. 374-380, 2015. 18. Danwei Chen and Yanjun He, “A Study on Secure Data Storage Strategy in CloudComputing”, Journal of Convergence Information Technology, vol. 5, no. 7, pp. 175-179,September 2010. 19. Parakh A and Kak S, “Online Data Storage using Implicit Security”, International Journalof Information Sciences, vol. 179, no. 19, pp. 3323-3331, 2009. 20. Mohamed Ali, Kashif Bilal, Sharifullah Khan, Bharadwaj Veeravalli, Kaicheng Li andAlbert Zomaya, “DROPS: Division and Replication of Data in the Cloud for Optimal Performanceand Security”, IEEE Transactions on Cloud Computing, ISSN: 2168-7161, 2015. 21. K Badya Nayak, D Krishna, P Ravindra, “Data Integrity and Dynamic Storage Way inCloud Computing”, International Journal of Innovative Technologies vol. 3, issue. 2, pp.0268-0273, ISSN: 2321-8665, June 2015. 22. Ananda S. Hiremath, Shivaputra S. Panchal, Shriharsha S. Veni, “Providing Security forData Storage in Cloud through Third Party Auditor”, International Journal of Advanced Researchin Computer Science and Software Engineering, vol. 4, no. 7, pp. 379-384, July 2014. 23. Abhishek Patel, Prabhat Dansena, “TPM as a Middleware for Enterprise Data Security”,International Journal of Computer Science and Mobile Computing, vol. 2, no. 7, pp. 327-332,July 2013. 24. Matthew Malensek, Sangmi Pallickara, and Shrideep Pallickara, “MINERVA : ProactiveDisk Scheduling for Qos in Multi-tier, Multi-tenant Cloud Environments”, IEEE Transactions onInternet Computing, vol. 20, no. 3, pp. 19-27, ISSN: 1089-7801, May-June 2016. 25. Xu, Lei and Wu, Xiaoxin and Zhang, Xinwen, “CL-PRE: A Certificateless ProxyRe-encryption Scheme for Secure Data Sharing with Public Cloud”, In the Proceedings of the7th ACM Symposium on Information, Computer and Communications Security, pp. 87-88, 2012.

26. Kaitai Liang and Willy Susilo, “Searchable Attribute-Based Mechanism With EfficientData Sharing for Secure Cloud Storage”, IEEE Transaction on Informations Forensics andSecurity, vol. 10, no. 9, pp.1981-1992, September 2015. 27. R. Bala Chandar, M.S Kavitha, K seenivasan, “A Proficient Model for High end Securityin Cloud Computing”, ICTACT Journal on Soft Computing, vol. 4, pp. 694-702. January 2014. 28. Neha Tirthani, Ganesan R, “Data Security in Cloud Architecutre based on DiffieHellmam and Elliptic Curve Cryptography, IACR Cryptology e-Print Archive, 2013. 29. Chen Yang, Furong Wang and Xinmei Wang, “Efficient Mediated Certificates Public-KeyEncryption Scheme without Pairings”, In the Proceedings of International Conference onAdvanced Information Networking and Applications Workshops, AINAW, vol. 1, pp. 109-112,2007. 30. Mokhtarnameh, Razieh and Ho, Sin Ban and Muthuvelu, Nithiapidary, “An EnhancedCertificateless Authenticated Key Agreement Protocol”, In the Proceedings of 13th InternationalConference on Advanced Communication Technology (ICACT), pp. 802-806, 2011. 31. Jianghong Wei, Wenfen Liu, Xuexian Hu, “Secure Data Sharing in Cloud ComputingUsing Revocable-Storage Identity-Based Encryption”, Transactions on Cloud Computing, ISSN:2168-7161, August 2015. 32. Peng Xu, Tengfei Jiao, Qianhong Wu, Wei Wang, and Hai Jin, “ConditionalIdentity-Based Broadcast Proxy Re-Encryption and Its Application to Cloud Email”, IEEETransactions on Computers, vol. 65, no. 1, pp. 66-79, January 2016. 33. Hou, Mengbo and Xu, Qiuliang, “Two-Party Authenticated Key Agreement Protocol from

3 / 9

Page 4: Data Storage Security and Privacy in Cloud Computing: A ... Scheme for Secure Data Sharing with Public Cloud”, In the Proceedings of the 7th ACM Symposium on Information, Computer

Data Storage Security and Privacy in Cloud Computing: A Comprehensive Survey

Certificateless Public Key Encryption Scheme”, In the Proceedings of International Conferenceon Management of e- Commerce and e-Government, ICMECG, pp. 440-444, 2009. 34. Chase, Melissa, “Multiauthority Attribute based Encryption”, In the Proceedings of 4thConference on Theory of Cryptography, pp. 515- 534, 2007. 35. Sun, Yinxia and Zhang, Futai, “Secure Certificateless Public Key Encryption withoutRedundancy”, IACR Cryptology ePrint Archive, p. 487, 2008. 36. Deepanchakaravarthi, Purushothaman and Sunitha Abburu, “An Approach for DataStorage Security in Cloud Computing”,International Journal of Computer Science Issues, vol. 9,no 1, pp. 100-105, March 2012. 37. Zebin Wu, Yonglong Li, Antonio Plaza, Jun Li, Fu Xiao, and Zhihui Wei, “Parallel andDistributed Dimensionality Reduction of Hyperspectral Data on Cloud Computing Architectures”,IEEE Journal of SelectedTopics in Applied Earth Observations and Remote Sensing, 2016. 38. Kan Yang, Xiaohua Jia, Kui Ren, Bo Zhang, and Ruitao Xie, “DACMACS: Effective DataAccess Control for Multiauthority Cloud Storage Systems”, IEEE Transactions on Informationand Forensics and Security, vol. 8, no. 11, pp. 1790-1801, November 2013. 39. Lars Bremer and Kalam Graffi, “Symbiotic Coupling of P2P and Cloud Systems: TheWikipedia Case”, In the Proceedings of IEEE International Conference on Communication, pp.3444-3449, 2013. 40. Heng He, Ruixuan Li and Xinhua Dong and Zhao Zhang, “Secure, Efficient andFine-Grained Data Access Control Mechanism for P2P Storage Cloud”, IEEE Transactions onCloud Computing, vol. 2, no. 4, pp. 471-484, 2014. 41. Garcia-Rodriguez, Gerardo, and Francisco de Asis Lopez-Fuentes, “A Storage Servicebased on P2P Cloud System”, Advances in Information and Technology, pp. 89-96, 2014. 42. Kavalionak, Hanna and Montresor, Alberto, “P2P and Cloud: A Marriage of Conveniencefor Replica Management”, Self-Organizing Systems, pp. 60-71, 2012. 43. Babaoglu, Ozalp Marzolla, Moreno Tamburini, Michele, “Design and Implementation of aP2P Cloud System”, In the Proceedings of 27th Annual ACM Symposium on AppliedComputing, pp. 412-417, 2012. 44. Jin Li, “Erasure Resilient Codes in Peer-to-Peer Storage Cloud”, In the Proceedings ofIEEE International Conference on Acoustics, Speech and Signal Processing, vol. 4, pp. 4-6,2006. 45. Sanghamitra De, Mridul Sankar Barik, Indrajit Banerjee, “Goal based Threat Modellingfor Peer-to-Peer Cloud” 2016. 46. Rajiv Ranjan, Liang Zhao, Xiaomin Wu, Anna Liu, Andres Quiroz and Manish Parashar,”Peer-to-peer Cloud Provisioning: Service Discovery and Load-Balancing”, Cloud Computing,pp. 195-217, 2010. 47. Azad F Barsoum and Aftab Hasan, “Enabling Dynamic Data and Indirect Mutual Trustfor Cloud Computing Storage Systems”,IEEE Transactions on Parallel and Distributed Systems,vol. 24, no. 12, pp. 2375-2385, 2013. 48. Kaiping Xue and Peilin Hong, “A Dynamic Secure Group Sharing Framework in PublicCloud Computing”, IEEE Transactions on Cloud Computing, vol. 2, no. 4, pp. 459-470, 2014. 49. N Jenefa and N Jayalaxmi, “A Cloud Storage System with Data Confidentiality and DataForwarding”, International Journal of Soft Computing and Engineering, vol. 3, March-2013. 50. Hsiao-Ying Lin and Wen-Guey Tzeng, “A Secure Erasure Code based Cloud StorageSystem with Secure Data Forwarding”, IEEE Transactions on Parallel and Distributed Systems,vol. 23, no. 6, pp. 995-1003, 2012.

4 / 9

Page 5: Data Storage Security and Privacy in Cloud Computing: A ... Scheme for Secure Data Sharing with Public Cloud”, In the Proceedings of the 7th ACM Symposium on Information, Computer

Data Storage Security and Privacy in Cloud Computing: A Comprehensive Survey

51. G. Ateniese, K. Fu, M. Green, and S. Hohenberger, “Improved Proxy Re-EncryptionSchemes with Applications to Secure Distributed Storage”, In the Proceedings of NetworkDistributed System Security Symposium, 2005. 52. Mazhar Ali, Saif Malik, and Samee Khan, “DaSCE: Data Security for Cloud Environmentwith Semi-Trusted Third Party”, IEEE Transactions on Cloud Computing, 2015. 53. Jayant D Bokefade, Audhut S, Bhise Prajakta A, Satarkar Dattatray G.Modani, “Developing A Secure Cloud Storage System for Storing IoT Data by Applying Role BasedEncryption”, In the Proceedings of 12th International Multi-Conference on InformationProcessin, vol. 89, pp. 43-50 2016. 54. Lihong Jiang, Li Da Xu, Hongming Cai, Zuhai Jiang, Fenglin Bu and Boyi Xu, “AnIoT-oriented Data Storage Framework in Cloud Computing Platform”,IEEE Transactions onIndustrial Informatics, vol. 10, no. 2, pp. 1443-1451, 2014. 55. Yang Tang, Patrick PC Lee, John CS Lui and Radia Perlman, “FADE: Secure OverlayCloud Storage with File Assured Deletion”, Security and Privacy in Communication Networks,pp. 380-397, 2010. 56. Aditya Kaushal Rajan, Vijay Kumar and Muzzammil Hussain, “Security Analysis of CloudStorage with Access Control and File Assured Deletion (FADE)”, Second InternationalConference on Advances in Computing and Communication Engineering (ICACCE), pp.453-458, 2015. 57. Ashfia Binte Habib, Tasnim Khanam and Rajesh Patil, “Simplified File Assured Deletion(SFADE)-A User Friendly Overlay Approach for Data Security in Cloud Storage System”,International Conference on Advances in Computing, Communications and Informatics(ICACCI), pp. 1640-1644, 2013. 58. Hui Tian, Yuxiang Chen, Chin-Chen Chang, Hong Jiang, Yongfeng Huang, YonghongChen, Jin Liu, “Dynamic-Hash-Table Based Public Auditing for Secure Cloud Storage”, IEEETransactions on Service Computing, 2015. 59. Zhenyu Wen, Jacek Caa, Paul Watson, and Alexander Romanovsky, “Cost Effective,Reliable and Secure Workflow Deployment over Federated Clouds”, Transactions on ServicesComputing, vol. 13, no.9, pp. 604-612, September 2014. 60. A. Mei, L. V. Mancini, and S. Jajodia, Secure Dynamic Fragment and Replica Allocationin Large-Scale Distributed File Systems, IEEE Transactions on Parallel and DistributedSystems, vol. 14, no. 9, pp. 885-896, 2003. 61. Zhongyuan Zhao, Mugen Peng, Zhiguo Ding, Wenbo Wang, and H. Vincent Poor,“Cluster Content Caching: An Energy-Efficient Approach to Improve Quality of Service in CloudRadio Access Networks”, IEEE Journal on Selected Areas in Communications, 2016. 62. Qian Wang, Cong Wang, Jin Li, Kui Ren and Wenjing Lou, “Enabling Public Verifiabilityand Data Dynamics for Storage Security in Cloud Computing”, Computer Security–ESORICS,pp. 355-370, 2009. 63. Amol S. Choure S. M. Bansode, “A Comprehensive Survey on Storage Techniques inCloud Computing”, International Journal of Computer Applications, vol. 122, no. 18, pp. 3-25,July 2015. 64. Cheng-Kang Chu, Sherman S.M. Chow, Wen-Guey Tzeng, Jianying Zhou, and RobertH. Deng, “Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage”, IEEETransactions on Parallel And Distributed Systems, vol. 25, no. 2, pp. 468-477, Febraury 2014. 65. Dong Yuan, Yun Yang, Xiao Liu and JinJun Chen, “A Cost-Effective Strategy forIntermediate Data Storage in Scientific Cloud Workflow Systems”, IEEE International

5 / 9

Page 6: Data Storage Security and Privacy in Cloud Computing: A ... Scheme for Secure Data Sharing with Public Cloud”, In the Proceedings of the 7th ACM Symposium on Information, Computer

Data Storage Security and Privacy in Cloud Computing: A Comprehensive Survey

Symposium on Parallel and Distributed Processing (IPDPS), pp. 1-7, 2010. 66. Shubhashis Sengupta, Annervaz K M, Amitabh Saxena, Sanjoy Paul, “DataVaporizer-Towards a Configurable Enterprise Data Storage Framework in Public Cloud”, IEEE8th International Conference on Cloud Computing, pp. 73-80, 2015. 67. Rajat Saxena, Somnath Dey, “Cloud Audit: A Novel Approach for Data IntergrityVerification in Cloud Computing”, In the Proceedings of International Conference on Secuirty inComputer Networks and Distributed Systems, pp. 1-15, 2016. 68. Leena H.U, Premasudha B.G, Basavaraja P.K, “Sensible Approach for Soil FertilityManagement using GIS Cloud”, 2016. 69. Huaqun Wang, Debiao He, and Shaohua Tang, “Identity Based Proxy- Oriented DataUploading and Remote Data Integrity Checking in Public Cloud”, IEEE Transaction onInformation Forensics and Security, vol. 11, no. 6, pp. 1165-1176, June 2016. 70. Li Mingqiang, Qin Chuan, Li Jingwei and Lee Patrick, “CDStore: Toward Reliable,Secure and Cost-Efficient Cloud Storage via Convergent Dispersal”, In the Proceedings ofUSENIX Annual Technical Conference (USENIX ATC, pp. 111-124, July 2015. 71. Seungyeop Han, Haichen Shen, Taesoo Kim, Arvind Krishnamurthy, Thomas Anderson,and David Wetherall, “MetaSync: Coordinating Storage Across Multiple File SynchronizationServices”, IEEE Internet Computing, 2016. 72. Yang, Zhi and Zhao, Ben Y and Xing, Yuanjian and Ding, Song and Xiao, Feng and Dai,Yafei, “AmazingStore: Available, Low-cost Online Storage Service Using Cloudlets”, vol. 10, no.6 pp. 1-5, 2010. 73. Zhongyuan Zhao, Mugen Peng, Zhiguo Ding, Wenbo Wang, and H. Vincent Poor,“Cluster Content Caching: An Energy-Efficient Approach to Improve Quality of Service in CloudRadio Access Networks”, IEEE Journal on Selected Areas in Communications, vol. 34, no. 5,pp. 1207-1221, ISSN: 0733-8716, 2016. 74. Xu, Xiaolong and Tu, Qun, “Data Deduplication Mechanism for Cloud Storage Systems”,In the Proceedings of International Conference on Cyber-Enabled Distributed Computing andKnowledge Discovery (CyberC), pp. 286-294, 2015. 75. R. Curtmola, O. Khan, R. Burns, and G. Ateniese, “MR-PDP: Multiple- Replica ProvableData Possession”, International Conference on Distributed Computing Systems, pp. 411-420,2008. 76. Quanlu Zhang, Shenglong Li, Zhenhua Li, Yuanjian Xing, Zhi Yang, and Yafei Dai,“CHARM: A Cost-Efficient Multi-Cloud Data Hosting Scheme with High Availability”, IEEETransactions on Cloud Computing, vol. 3, no. 3, pp. 372-386, July-September 2015. 77. Haifeng Lu, Chuan Heng Foh, Yonggang Wen and Jianfei Cai, “Delay- Optimized FileRetrieval under LT-Based Cloud Storage” IEEE Transactions on Cloud Computing, ISSN:2168-7161, 2015. 78. Ping Hu, Chi Wan Sung, Siu-Wai Ho, and Terence H. Chan, “Optimal Coding andAllocation for Perfect Secrecy in Multiple Clouds”, IEEE Transaction on Information Forensicsand Secuirty, vol. 11, no. 2, pp. 388-399, February 2016. 79. R K Banyal, V K Jain and Pragya Jain, “Data Management System to Improve Securityand Availability in Cloud Storage”, 2015 International Conference on Computational Intelligenceand Networks (CINE), pp. 124-129, 2015. 80. Pallavi Srivastava and Navish Garg, “Secure and Optimized Data Storage for IoTthrough Cloud Framework”, International Conference on Computing, Communication andAutomation (ICCCA), pp. 720-723, 2015.

6 / 9

Page 7: Data Storage Security and Privacy in Cloud Computing: A ... Scheme for Secure Data Sharing with Public Cloud”, In the Proceedings of the 7th ACM Symposium on Information, Computer

Data Storage Security and Privacy in Cloud Computing: A Comprehensive Survey

81. Zhenyu Wen, Jacek Caa, Paul Watson, and Alexander Romanovsky, “Cost Effective,Reliable and Secure Workflow Deployment over Federated Clouds”, IEEE Transactions onServices Computing, 2016. 82. Abdul Sattar Raja and Dr. Shukor Abd Razak, “Analysis of Security and Privacy in PublicCloud Environment”, International Conference on Cloud Computing, pp. 1-6, April 2015. 83. Baojiang Cui, Zheli Liu and Lingyu Wang,“Key-Aggregate Searchable Encryption(KASE) for Group Data Sharing via Cloud Storage”, IEEE Transactions on Computers, vol. 6,no. 1, Jnauary 2014. 84. Chi, Po-Wen and Lei, Chin-Laung, “Audit-Free Cloud Storage via DeniableAttribute-based Encryption”, IEEE Transactions on Cloud Computing, ISSN: 2168-7161, April2015. 85. Yongge Wang, “Privacy-Preserving Data Storage in Cloud Using Array BP-XOR Codes”,IEEE Transactions on Cloud Computing, vol. 3, no. 4, pp. 425-435, October-December 2015. 86. Kalyani, Hulawale and Rahul, Paikrao and Ambika, Pawar, “Achieve Fine Grained DataAccess Control in Cloud Computing using KP-ABE along with Lazy and Proxy Re-encryption”,International Journal of Emerging Technology and Advanced Engineering, vol. 4, issue. 2, pp.457-461, Febraury 2014. 87. V. Goyal, O. Pandey, A. Sahai, and B. Waters,“Attribute-based Encryption forFine-Grained Access Control of Encrypted Data”, In the Proceedings of 13th ACM Conferenceon Computer and Communications Security, pp. 89-98, 2006. 88. Shulan Wang, Kaitai Liang, Joseph K. Liu, Member, IEEE, Jianyong Chen, Jianping Yu,Weixin Xie, “Attribute-Based Data Sharing Scheme Revisited in Cloud Computing”, IEEETransactions on Information Forensics and Security, 2016. 89. Jin Sun, Yupu Hu, and Leyou Zhang, “A Key-Policy Attribute-Based BroadcastEncryption”, The International Arab Journal of Information Technology, vol. 10, no. 5, pp.444-453, September 2013. 90. Shucheng Yu, Cong Wang, Kui Ren, and Wenjing Lou, “Achieving Secure, Scalable andFinegrained Data Access Control in Cloud Computing”, In the Proceedings of INFOCOM, pp.1-9, ISSN: 0743-166X, 2010. 91. Sun, Jin and Hu, Yupu and Zhang, Leyou, “A Key-Policy Attribute based BroadcastEncryption”, The International Arab Journal of Information Technology, vol. 10, no. 5, pp.444-452, 2013. 92. M. Blaze, G. Bleumer, and M. Strauss, ”Divertible Protocols and Atomic ProxyCryptography”, Proceedings of EUROCRYPT, pp. 127-144, 1998. 93. M. Kallahalla, E. Riedel, R. Swaminathan, Q. Wang, and K. Fu, “Scalable Secure FileSharing on Untrusted Storage”, In the Proceedings of FAST, vol. 3, pp. 29-42, 2003. 94. Jiguo Li, Wei Yao, Yichen Zhang, Huiling Qian and Jinguang Han, “Flexible andFine-Grained Attribute-Based Data Storage in Cloud Computing”, IEEE Transactions onServices Computing, ISSN: 1939- 1374, January 2016. 95. Nabeel, Mohamed and Shang, Ning and Bertino, Elisa, “Privacy PreservingPolicy-based Content Sharing in Public Clouds”, IEEE Transactions on Knowledge and DataEngineering, vol. 25, no. 11, pp. 2602–2614, 2013. 96. Cong Wang, Sherman S.M.Chow, Qian Wang, Kui Ren, and Wenjing Lou, “PrivacyPreserving Public Auditing for Secure Cloud Storage”, IEEE transaction on Computers, vol. 62,no. 2, pp. 362-375, February 2013. 97. Arockia Ranjini A, Arun S, “ A Comparison Study of Various Virtual Machine

7 / 9

Page 8: Data Storage Security and Privacy in Cloud Computing: A ... Scheme for Secure Data Sharing with Public Cloud”, In the Proceedings of the 7th ACM Symposium on Information, Computer

Data Storage Security and Privacy in Cloud Computing: A Comprehensive Survey

Consolidation Algorithms in Cloud Datacenter”, vol. 78, pp.491-498, 2016. 98. Li, Jie and Ma, Ronghua and Guan, Haiyan, “Tees: An Efficient Search Scheme overEncrypted Data on Mobile Cloud”, IEEE Transactions Cloud Computing, 2015. 99. L. Vaquero, L. Rodero-Merino, J. Caceres, and M. Lindner, “A Break in the Clouds:Towards a Cloud Definition”, ACM SIGCOMM Computer Communication Review, vol. 39, no. 1,pp. 50-55, 2008. 100. Neeraj Kumar, Rahat Iqbal, Sudip Misra, Joel J. P. C. Rodrigues, M.S. Obaidat,“Bayesian Cooperative Coalition Game as-a-Service for RFID-Based Secure QoS Managementin Mobile Cloud”, IEEE Transactions on Emerging Topics in Computing, ISSN: 2168-6750,March 2016. 101. A. N. Khan, M. L. M. Kiah, S. U. Khan, and S. A. Madani, “Towards Secure MobileCloud Computing: A Survey”, Future Generation Computer Systems, vol. 29, no. 5, 2013, pp.1278-1299, 2012 102. D. Sun, G. Chang, L. Sun, and X. Wang, “Surveying and Analysing Security, Privacyand Trust Issues in Cloud Computing Environments”, Procedia Engineering, vol. 15, pp.2852-2856, 2011. 103. Vishwa Kiran S, Ramesh Prasad, Thriveni J, Venugopal K R, L M Patnaik, ”MobileCloud Computing for Medical Applications”, pp. 1-6, ISBN: 978-1-4799-5364-6, 2015. 104. Vishwa Kiran S, Raghuram S, Thriveni J, Venugopal K R, “Efficient Video Transferusing LAN Caching assisted by Cloud Computing”, TENCON 2015- 2015 IEEE Region 10Conference, pp. 1-5, ISSN: 2159-3450, January 2016. 105. Abir Awad , Adrian Matthews, Yuansong Qiao and Brain Lee,“Chaotic SearchableEncryption for Mobile Cloud Storage”, IEEE Transactions on Cloud Computing, ISSN:2168-7161, 2015. 106. Veerabathina Santi Priya, B Venkata Ramana and Smita Rani Shahu,“Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data”, InternationalJournal of Scientific Engineering and Technology Research, vol. 04, issue. 11, pp. 2030-2032,May 2015. 107. S Raghavendra, Nithyashree K, C M Geeta, Rajkumar Buyya, K R Venugopal, S SIyengar and L M Patnaik, “ FRORSS: Fast Result Object Retrieval using Similarity on Cloud”, inthe proceedings of International Conference on Distributed Computing, VLSI, Electrical Circutsand Robotics (DISCOVER), 2016. 108. Bing Wang, Shucheng Yu, Wenjing Lou and Y Thomas Hou, ”Privacy-PreservingMulti-Keyword Fuzzy Search over Encrypted Data in the Cloud”, INFOCOM, 2014 ProceedingsIEEE, pp. 2112-2120, 2014. 109. X. Yu and Q. Wen, “Design of Security Solution to Mobile Cloud Storage”, inKnowledge Discovery and Data Mining. Springer pp. 255-263, 2012. 110. D. Huang, “Mobile cloud computing”, IEEE COMSOC Multimedia CommunicationsTechnical Committee (MMTC) E-Letter, vol. 6, no.10, pp.27-31, 2011. 111. William Zegers, Sang-yoon Chang, Younghee park and Jerry Gao, “A Light-WeightEncryption and Secure Protocol for Smartphone Cloud”, IEEE Symposium on Service-OrientedSystem Engineering (SOSE), pp. 259-266, 2015. 112. S. Kamara and K. Lauter, “Cryptographic Cloud Storage”, Financial Cryptography andData Security. Springer, pp. 136-149, 2010. 113. M. Li, S. Yu, K. Ren, W. Lou, and Y. T. Hou, “Toward Privacy-Assured and SearchableCloud Data Storage Services”, IEEE Transactions on Network, vol. 27, no. 4, pp. 56-62, 2013.

8 / 9

Page 9: Data Storage Security and Privacy in Cloud Computing: A ... Scheme for Secure Data Sharing with Public Cloud”, In the Proceedings of the 7th ACM Symposium on Information, Computer

Data Storage Security and Privacy in Cloud Computing: A Comprehensive Survey

114. S Raghavendra, C M Geeta, Rajkumar Buyya, Venugopal K R, S S Iyengar and L MPatnaik, “DRSMS: Domain and Range Specific Multi-Keyword Search over Encrypted CLoudData”, in the International Journal of Computer Science and Information Security (IJCSIS), vol.14, no. 5, ISSN: 1947-5500, May 2016. 115. S Raghavendra, Doddabasappa P A, C M Geeta, Rajkumar Buyya, Venugopal K R, SS Iyengar and L M Patnaik, “Secure Multi-Keyword Search and Multi-User Access Control overan Encrypted Cloud Data”, International Journal of Information Processing (IJIP), vol. 10, no. 2,ISSN:0973-8215, 2016 116. W. Sun, B. Wang, N. Cao, M. Li, W. Lou, Y. T. Hou, and H. Li, “Privacy-PreservingMulti-Keyword Text Search in the Cloud Supporting Similarity-based Ranking”, 8th ACMSIGSAC Symposium on Information, Computer and Communications Security Proceedings, pp.71-82, 2013. 117. Mehdi Bahrami and Mukesh Singhal, “A Light-Weight Permutation based Method forData Privacy in Mobile Cloud Computing”, 3rd IEEE International Conference on Mobile CloudComputing, Services and Engineering (MobileCloud), pp. 189-198, 2015. 118. Piotr K Tysowski and M Anwarul Hasan, “Re-Encryption-Based Key ManagementTowards Secure and Scalable Mobile Applications in Clouds”, IACR Cryptology ePrint Archive,pp. 668-678, 2011.

Index Terms Computer Science Distributed Systems

Keywords

Storage Area Network Trusted Computing Group, CeritificateLess Proxy Re- Encryption, EllipticCurve Cryptography, Dynamic Hash Table.

9 / 9