Hostname: page-component-6766d58669-h8lrw Total loading time: 0 Render date: 2026-05-15T13:19:29.566Z Has data issue: false hasContentIssue false

Survey on securing data storage in the cloud

Published online by Cambridge University Press:  23 May 2014

Chun-Ting Huang
Affiliation:
Ming Hsieh Department of Electrical Engineering, University of Southern California, Los Angeles, CA, USA
Lei Huang*
Affiliation:
Loyola Marymount University, Los Angeles, CA, USA
Zhongyuan Qin
Affiliation:
Information Science and Engineering School, Southeast University, Nanjing, Jiangsu, China
Hang Yuan
Affiliation:
Ming Hsieh Department of Electrical Engineering, University of Southern California, Los Angeles, CA, USA
Lan Zhou
Affiliation:
Information and Networked Systems Security Research, Macquarie University, North Ryde, Australia
Vijay Varadharajan
Affiliation:
Information and Networked Systems Security Research, Macquarie University, North Ryde, Australia
C.-C. Jay Kuo
Affiliation:
Ming Hsieh Department of Electrical Engineering, University of Southern California, Los Angeles, CA, USA
*
Corresponding author: Lei Huang Email: lei.huang@lmu.edu

Abstract

Cloud Computing has become a well-known primitive nowadays; many researchers and companies are embracing this fascinating technology with feverish haste. In the meantime, security and privacy challenges are brought forward while the number of cloud storage user increases expeditiously. In this work, we conduct an in-depth survey on recent research activities of cloud storage security in association with cloud computing. After an overview of the cloud storage system and its security problem, we focus on the key security requirement triad, i.e., data integrity, data confidentiality, and availability. For each of the three security objectives, we discuss the new unique challenges faced by the cloud storage services, summarize key issues discussed in the current literature, examine, and compare the existing and emerging approaches proposed to meet those new challenges, and point out possible extensions and futuristic research opportunities. The goal of our paper is to provide a state-of-the-art knowledge to new researchers who would like to join this exciting new field.

Information

Type
Overview Paper
Creative Commons
Creative Common License - CCCreative Common License - BY
The online version of this article is published within an Open Access environment subject to the conditions of the Creative Commons Attribution licence http://creativecommons.org/licenses/by/3.0/
Copyright
Copyright © The Authors, 2014
Figure 0

Fig. 1. Cloud storage architecture [5].

Figure 1

Fig. 2. Schematic of a POR system [9].

Figure 2

Fig. 3. Schematic of a PDP system.

Figure 3

Fig. 4. TPA structure [17].

Figure 4

Table 1. Performance comparison for data integrity verification schemes

Figure 5

Table 2. Performance comparison for FHE schemes