APSIPA Transactions on Signal and Information Processing > Vol 3 > Issue 1

Survey on securing data storage in the cloud

Chun-Ting Huang, Ming Hsieh Department of Electrical Engineering, University of Southern California, USA, Lei Huang, Loyola Marymount University, USA, lei.huang@lmu.edu , Zhongyuan Qin, Southeast University, China, Hang Yuan, Ming Hsieh Department of Electrical Engineering, University of Southern California, USA, Lan Zhou, Macquarie University, Australia, Vijay Varadharajan, Macquarie University, Australia, C.-C. Jay Kuo, Ming Hsieh Department of Electrical Engineering, University of Southern California, USA
 
Suggested Citation
Chun-Ting Huang, Lei Huang, Zhongyuan Qin, Hang Yuan, Lan Zhou, Vijay Varadharajan and C.-C. Jay Kuo (2014), "Survey on securing data storage in the cloud", APSIPA Transactions on Signal and Information Processing: Vol. 3: No. 1, e7. http://dx.doi.org/10.1017/ATSIP.2014.6

Publication Date: 23 May 2014
© 2014 Chun-Ting Huang, Lei Huang, Zhongyuan Qin, Hang Yuan, Lan Zhou, Vijay Varadharajan and C.-C. Jay Kuo
 
Subjects
 
Keywords
Cloud computingData securityData integrityConfidentialityAccess controlSearchable encryptionsData availability
 

Share

Open Access

This is published under the terms of the Creative Commons Attribution licence.

Downloaded: 3597 times

In this article:
I. INTRODUCTION 
II. OVERVIEW OF SECURITY IN CLOUD STORAGE 
III. DATA INTEGRITY 
IV. DATA CONFIDENTIALITY 
V. AVAILABILITY 
VI. CONCLUSION AND FUTURE WORK 

Abstract

Cloud Computing has become a well-known primitive nowadays; many researchers and companies are embracing this fascinating technology with feverish haste. In the meantime, security and privacy challenges are brought forward while the number of cloud storage user increases expeditiously. In this work, we conduct an in-depth survey on recent research activities of cloud storage security in association with cloud computing. After an overview of the cloud storage system and its security problem, we focus on the key security requirement triad, i.e., data integrity, data confidentiality, and availability. For each of the three security objectives, we discuss the new unique challenges faced by the cloud storage services, summarize key issues discussed in the current literature, examine, and compare the existing and emerging approaches proposed to meet those new challenges, and point out possible extensions and futuristic research opportunities. The goal of our paper is to provide a state-of-the-art knowledge to new researchers who would like to join this exciting new field.

DOI:10.1017/ATSIP.2014.6