Study and Analysis of Various Cloud Security, Authentication, and Data Storage Models: A Challenging Overview

Study and Analysis of Various Cloud Security, Authentication, and Data Storage Models: A Challenging Overview

Ankush Balaram Pawar, Shashikant U. Ghumbre, Rashmi M. Jogdand
Copyright: © 2023 |Pages: 16
DOI: 10.4018/IJDSST.315760
Article PDF Download
Open access articles are freely available for download

Abstract

In recent days, widespread acceptance of cloud data storage applications increases various privacy problems and security problems. Outsourced data security is considered the main confrontation for cloud clients because of data control loss. This review presents a detailed survey of 50 research papers presenting privacy preservation approaches, namely authentication-based, cloud security-based, data storage-based, data security-based, and encryption-based techniques. The analysis is considered based on the categorization of approaches, dataset employed, utilized software tools, published year, and the performance metrics are discussed. Furthermore, problems raised in existing privacy preservation techniques are elucidated in the research gaps and problems section. The future work of this study is based on the research gaps and problems recognized from present research schemes. Additionally, JAVA software language is widely utilized for implementing privacy preservation models, and the Amazon access sample database is a commonly employed dataset for the privacy preservation approach.
Article Preview
Top

1. Introduction

Cloud computing is an important task for sharing resources, which includes infrastructures, business processes, applications, and so on. Cloud computing is a border formation of communication convergence. Generally, cloud computing encounters numerous challenges. One of the main challenges in cloud computing is security, which has to turn into the popularization of cloud computing and restrictive factor. If appropriate security measures are not taken into account to the data transmission and cloud operation, the data is at higher risk than while storing or operating in local repositories. Therefore, the cloud process offers data security and application security if the device is missing or damaged (Varadharajan & Tupakula, 2014). In recent days, cloud computing has been paid great attention in Information and Communication Technologies (ICT). Moreover, cloud computing is a data computation or data off-site to internal or exterior, position transport facility or service provider and its moving services (Torkura, et al., 2020). Security is most significant in cloud systems for several business critical computations. Infrastructure as a Service (IAAS) cloud inherits several security concerns linked to utilized technologies. However, the integration of these technologies and a large number of user-sharing resources generate new security concerns. The key element to permit cloud operators and unlimited scaling potential is resource sharing (Banyal, et al., 2013). In a cloud computing system, security is concerned with two layers in software attacks.

Moreover, cloud storage is a raising scheme in the cloud computing model and it enables the user to accumulate their data and access them any time and any place. If the data is entered in the cloud, then users lost their control over data. Therefore, the necessity of control increases as challenging and complex issues for reliability and data storage privacy in the cloud (Jakóbik, 2020). Along with this, security involves major three dimensions, namely confidentiality, integrity, and availability. Recently, public auditing of cloud data looking at integrity guarantee is a progressing research problem. Attribute-Based Encryption (ABE) is a developing cryptographic technique to provide fine-grained access control with confidentiality and outsourced data (Ismail & Islam, 2020). Various researches are focused to strengthen security protection and privacy preservation in the cloud environment (Megouache et al., 2020). Apart from this, various cryptographic approaches were introduced to address privacy problems and potential problems, like data sharing protocols, data public auditing systems, data possession methods, key management, secure data storage systems, privacy-preserving systems, and so on. In addition, previous studies mainly focused on the authentication process to recognize the legal user. Apart from this, many types of research mainly focused on various partly homomorphic cryptosystems for permitting various insufficient operations (Gill, et al., 2020). The advantages of cloud computing receive a lot of attention from both researchers and practitioners, as well as its adoption amid organizations is on the demand.

The major intention of this survey is to analyze several privacy preservation methods. Based on the categorization of review, existing privacy preservation approaches are separated into authentication-based technique, cloud security-based method, data security-based scheme, data storage-based method, and encryption-based approach. This survey is developed by considering employed software, utilizes dataset, classification of various privacy preservation methods, and so on. Similarly, the computational time is considered as a performance evaluation for the privacy preservation system. The negative aspects available in existing review papers are clearly elucidated in the research gaps and issues section. Hence, the research gaps section is considered as a motivation for future work for effectual privacy preservation approaches. Moreover, the major objective of this paper is to discuss some crucial research topics associated with cloud security and thus assist developers and researchers to better realize the advantages of the cloud computing field and contribute to its development.

Complete Article List

Search this Journal:
Reset
Volume 16: 1 Issue (2024)
Volume 15: 2 Issues (2023)
Volume 14: 4 Issues (2022): 1 Released, 3 Forthcoming
Volume 13: 4 Issues (2021)
Volume 12: 4 Issues (2020)
Volume 11: 4 Issues (2019)
Volume 10: 4 Issues (2018)
Volume 9: 4 Issues (2017)
Volume 8: 4 Issues (2016)
Volume 7: 4 Issues (2015)
Volume 6: 4 Issues (2014)
Volume 5: 4 Issues (2013)
Volume 4: 4 Issues (2012)
Volume 3: 4 Issues (2011)
Volume 2: 4 Issues (2010)
Volume 1: 4 Issues (2009)
View Complete Journal Contents Listing