Search citation statements
Paper Sections
Citation Types
Year Published
Publication Types
Relationship
Authors
Journals
People used to carry their documents about on CDs only a few years ago. Many people have recently turned to memory sticks. Cloud computing, in this case, refers to the capacity to access and edit data stored on remote servers from any Internet-connected platform. Cloud computing is a self-service Internet infrastructure that allows people to access computing resources at any location worldwide. The world has altered as a result of cloud computing. Cloud computing can be thought of as a new computing typology that can provide on-demand services at a low cost. By increasing the capacity and flexibility of data storage and providing scalable compute and processing power that fits the dynamic data requirements, cloud computing has aided the advancement of IT to higher heights. In the field of information technology, privacy and data security have long been a serious concern. It becomes more severe in the cloud computing environment because data is stored in multiple locations, often across the globe. Users' primary challenges regarding the cloud technology revolve around data security and privacy. We conduct a thorough assessment of the literature on data security and privacy issues, data encryption technologies, and related countermeasures in cloud storage systems in this study. Ubiquitous network connectivity, location-independent resource pooling, quick resource flexibility, usage-based pricing, and risk transference are all features of cloud computing.
People used to carry their documents about on CDs only a few years ago. Many people have recently turned to memory sticks. Cloud computing, in this case, refers to the capacity to access and edit data stored on remote servers from any Internet-connected platform. Cloud computing is a self-service Internet infrastructure that allows people to access computing resources at any location worldwide. The world has altered as a result of cloud computing. Cloud computing can be thought of as a new computing typology that can provide on-demand services at a low cost. By increasing the capacity and flexibility of data storage and providing scalable compute and processing power that fits the dynamic data requirements, cloud computing has aided the advancement of IT to higher heights. In the field of information technology, privacy and data security have long been a serious concern. It becomes more severe in the cloud computing environment because data is stored in multiple locations, often across the globe. Users' primary challenges regarding the cloud technology revolve around data security and privacy. We conduct a thorough assessment of the literature on data security and privacy issues, data encryption technologies, and related countermeasures in cloud storage systems in this study. Ubiquitous network connectivity, location-independent resource pooling, quick resource flexibility, usage-based pricing, and risk transference are all features of cloud computing.
The field of data management has been reformed by the Cloud computing technologies which offered valuable establishments and amended the storage restrictions barriers for its users. In large enterprises the cloud has been extensively used for implementation due to its benefits. There are still lot of security threats for the data in the cloud. The data owners suffer from its privacy issues which are considered as one of the major concerns. Data privacy can be secured by employing some of the existing methods such as Attribute-based Encryption (ABE). Yet, the security issues are prevailing largely over the cloud. In this research a secured data access control is proposed using the Advanced Encryption Standard (AES) combined with a weighted attribute-based Encryption (AES-WABE). To encrypt the data, the access control policies are used and weight is assigned according to its significance of each attribute. The outsourced data is stored by the cloud service provider and the attribute authority based on the weight that updates the attributes. To minimize the computational overload the data file is accessed by the receiver corresponding to its weight. The proposed procedure provides resistance for collusion, multiple user security with control of fine-grained access based on protection, reliability and efficiency. On concerning the data collaboration and confidentiality, the performance rating is done related with the Cipher-text Policy–Attribute-based Encryption (CP-ABE) and the hybrid attribute-based encryption (HABE) scheme, access control flexibility, limited decryption, full delegation, verification and partial signing.
Distributed Cloud Computing Storage has come up as a service that can expedite data owners (DO) to store their data remotely according to their application or data or file environment. However, insecure data storage, high uploading bandwidth, integration issues of DCS has breached the trustworthiness of the user to store data. In order to conquer the challenge, the work has developed a data Deduplication and portability-based secure data storage in DCS. The work aids to remove unwanted data and selects the most relevant features to avoid data loss by using GK-QDA Feature Reduction Method and HFG feature selection method. The selected cloud server for the respective data or application is analyzed for redundant data by data duplication using a whirlpool hashing algorithm followed by a hash chaining algorithm. Finally, to minimize the integration issues while moving the encrypted data between the DCS, the work has developed an LF-WDO technique. An experimental analysis has showed an enormous result by achieving a computation time of 2987 ms as compared to the existing methods
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
hi@scite.ai
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.