Open Access Open Access  Restricted Access Subscription Access

A Survey on Data Security Mechanism for Cloud Storage System


Affiliations
1 Dept. of Computer Science, KPR Institute of Engineering and Technology, Coimbatore-6411407, TN, India
 

Objectives: To analysis various mechanisms to improve the security of cloud storage system.

Methods: The methods such as unidirectional proxy re-encryption schemes, Identity-Based Proxy Re-Encryption system, third party auditor scheme, NCCloud, certificate based signature scheme and two-factor data security protection mechanism are analyzed in this paper.

Findings: In this paper various cloud storage data security protection techniques are compared through their merits and demerits of the technique to prove two-factor data security protection is better than other techniques. Encryption is the most effective technique to transmit the sensitive data in cloud environment. The findings of this work prove that the two-factor data security protection mechanism provides better result than other approaches.


Keywords

Cloud Storage System, Cloud Security, Cloud Protection, Two-Factor Data Security Protection.
User
Notifications

  • H. Ziglari, S. Yahya. Deployment models: Enhancing security in cloud computing environment. In: 2016 22nd Asia-Pacific Conference on Communications (APCC), IEEE. 2016; 204-209.
  • F. F. Moghaddam, M. B. Rohani, M. Ahmadi, T. Khodadadi, K. Madadipouya. Cloud computing: Vision, architecture and Characteristics. In: 2015 IEEE 6th Control and System Graduate Research Colloquium (ICSGRC), IEEE. 2015; 1-6.
  • X. Wu, M. C. Wang, W. Zhang, Y. Guo. Cloud program with a pricing strategy for IaaS in cloud computing. In Parallel and Distributed Processing Symposium Workshops & Ph.D. Forum (IPDPSW), 2012 IEEE 26th International, IEEE. 2012; 2316-2319.
  • Y. Jinzhou, H. Jin, Z. Kai, W. Zhijun. Discussion on private cloud PaaS construction of large scale enterprise. In: 2016 IEEE International Conference on Cloud Computing and Big Data Analysis (ICCCBDA), IEEE. 2016; pp. 273-278.
  • X. Cao, L. Xu, Y. Zhang, W. Wu. Identity-based proxy signature for cloud service in saas. In: 2012 4th International Conference on Intelligent Networking and Collaborative Systems (INCoS). IEEE. 2012; 594-599.
  • L. Ferretti, M. Colajanni, M. Marchetti. Distributed, concurrent, and independent access to encrypted cloud databases. IEEE transactions on parallel and distributed systems, 2014; 25(2), 437-446.
  • B. Libert, D. Vergnaud. Unidirectional chosen-ciphertext secure proxy re-encryption. IEEE Transactions on Information Theory. 2011; 57(3), 1786-1802.
  • J. H. Seo, K. Emura. Efficient delegation of key generation and revocation functionalities in identity-based encryption. In: Cryptographers’ Track at the RSA Conference. Springer Berlin Heidelberg. 2013; 343-358.
  • R. R. Pavithra, V. R. Nagarajan. A survey on certificate revocation scheme using various approaches. Indian Journal of Innovations and Developments. 2016; 5(5), 1-3.
  • K. Liang, Z. Liu, X. Tan, D. S. Wong, C. Tang. A CCA-secure identity-based conditional proxy re-encryption without random oracles. In: International Conference on Information Security and Cryptology. Springer Berlin Heidelberg. 2012; 231-246.
  • H. Guo, Z. Zhang, J. Zhang, C. Chen. Towards a secure certificateless proxy re-encryption scheme. In: International Conference on Provable Security. Springer Berlin Heidelberg. 2013; 8209, 330-346.
  • J. Shao, Z. Cao. Multi-use unidirectional identity-based proxy re-encryption from hierarchical identity-based encryption. Information Sciences, 2012; 206, 83-95.
  • C.K. Chu, S.S. Chow, W.G. Tzeng, J. Zhou, R.H. Deng. Key-aggregate cryptosystem for scalable data sharing in cloud storage. IEEE Transactions on Parallel and Distributed Systems. 2014; 25(2), 468-477.
  • C. Wang, S.S. Chow, Q. Wang, K. Ren, W. Lou. Privacy-preserving public auditing for secure cloud storage. IEEE Transactions on computers. 2013; 62(2), 362-375.
  • H.C. Chen, Y. Hu, P.P. Lee, Y. Tang. NCCloud: a network-coding-based storage system in a cloud-of-clouds. IEEE Transactions on Computers, 2014; 63(1), 31-44.
  • J.K. Liu, F. Bao, J. Zhou. Short and efficient certificate-based signature. In: International Conference on Research in Networking. Springer Berlin Heidelberg. 2011; 167-178.
  • A. Sahai, H. Seyalioglu, B. Waters. Dynamic credentials and ciphertext delegation for attribute-based encryption. In: Advances in Cryptology–CRYPTO 2012. Springer Berlin Heidelberg. 2012; 199-217.
  • J.K. Liu, K. Liang, W. Susilo, J. Liu, Y. Xiang. Two-Factor Data Security Protection Mechanism for Cloud Storage System. IEEE Transactions on Computers, 2016; 65(6), 1992-2004.

Abstract Views: 362

PDF Views: 0




  • A Survey on Data Security Mechanism for Cloud Storage System

Abstract Views: 362  |  PDF Views: 0

Authors

M. Vimala
Dept. of Computer Science, KPR Institute of Engineering and Technology, Coimbatore-6411407, TN, India
K. Vishnukumar
Dept. of Computer Science, KPR Institute of Engineering and Technology, Coimbatore-6411407, TN, India

Abstract


Objectives: To analysis various mechanisms to improve the security of cloud storage system.

Methods: The methods such as unidirectional proxy re-encryption schemes, Identity-Based Proxy Re-Encryption system, third party auditor scheme, NCCloud, certificate based signature scheme and two-factor data security protection mechanism are analyzed in this paper.

Findings: In this paper various cloud storage data security protection techniques are compared through their merits and demerits of the technique to prove two-factor data security protection is better than other techniques. Encryption is the most effective technique to transmit the sensitive data in cloud environment. The findings of this work prove that the two-factor data security protection mechanism provides better result than other approaches.


Keywords


Cloud Storage System, Cloud Security, Cloud Protection, Two-Factor Data Security Protection.

References