2020
DOI: 10.1109/access.2020.3009876
|View full text |Cite
|
Sign up to set email alerts
|

Data Security and Privacy Protection for Cloud Storage: A Survey

Abstract: The new development trends including Internet of Things (IoT), smart city, enterprises digital transformation and world's digital economy are at the top of the tide. The continuous growth of data storage pressure drives the rapid development of the entire storage market on account of massive data generated. By providing data storage and management, cloud storage system becomes an indispensable part of the new era. Currently, the governments, enterprises and individual users are actively migrating their data to… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
82
0
2

Year Published

2020
2020
2023
2023

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 276 publications
(138 citation statements)
references
References 108 publications
(127 reference statements)
0
82
0
2
Order By: Relevance
“…This solution helps to achieve secure storage of information at a reduced price of the cloud providers, maintaining the data encrypted outside of the perimeter of the infrastructure to allow sharing with other entities to maintain user privacy. In addition, it can help to solve some open research challenges, such as designing secure privacy protection schemes to ensure that sensitive information in shared data is hidden, and designing efficient and secure third-party privacy protection schemes to support more machine learning algorithms [ 1 , 5 ].…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…This solution helps to achieve secure storage of information at a reduced price of the cloud providers, maintaining the data encrypted outside of the perimeter of the infrastructure to allow sharing with other entities to maintain user privacy. In addition, it can help to solve some open research challenges, such as designing secure privacy protection schemes to ensure that sensitive information in shared data is hidden, and designing efficient and secure third-party privacy protection schemes to support more machine learning algorithms [ 1 , 5 ].…”
Section: Discussionmentioning
confidence: 99%
“…The issue with re-identification—the process of identifying an individual using the collected data—is even greater in cases where data collected by different companies are aggregated, creating a larger dataset and increasing the likelihood of re-identification [ 5 ].…”
Section: Introductionmentioning
confidence: 99%
“…R 2 is the goodness of fit of the entire model; the higher the R 2 value, the better the fit degree, where R 2 ∈ [0, 1]. AIC and SC are information criteria; the lower the value, the better the fitting degree of the model [33]. e test results of five compared models are provided in Table 2.…”
Section: Sarima Modelmentioning
confidence: 99%
“…Security is a significant concern for data generated by IoT devices or data stored in the cloud because there is a high probability that some personal information would be included in this digital information [6][7][8][9][10]. Therefore, many privacy-preservation approaches, such as data encryption, have been proposed to make data transmission, storage, and extraction safe [11][12][13][14]. On the other hand, data encryption in the cloud can decrease the data processing efficiency for some applications, such as image classification and retrieval, because decrypting and then classifying or querying a large number of encrypted images may necessitate considerable computation resources.…”
Section: Introductionmentioning
confidence: 99%