{"title":"Survey of data and storage security in cloud computing","authors":"Ayesha Malik, Yunchuan Sun, Mazhar Ali","doi":"10.1109/ICCS1.2017.8325966","DOIUrl":null,"url":null,"abstract":"Data Security and consumer data privacy are the key challenges in cloud computing era. The appropriateness and privacy of data stored in cloud may be compromised because of limited security for data owners. This paper presents an extensive survey on privacy preservation, data and storage security challenging issues in cloud computing. The Security of cloud data is further analyzed in terms of data integrity, access control and attribute based encryption. The survey analyzes each category of work in detail. A comparison table is also presented along with the strength and weakness of each approach.","PeriodicalId":367360,"journal":{"name":"2017 IEEE International Conference on Circuits and Systems (ICCS)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"26","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 IEEE International Conference on Circuits and Systems (ICCS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCS1.2017.8325966","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 26
Abstract
Data Security and consumer data privacy are the key challenges in cloud computing era. The appropriateness and privacy of data stored in cloud may be compromised because of limited security for data owners. This paper presents an extensive survey on privacy preservation, data and storage security challenging issues in cloud computing. The Security of cloud data is further analyzed in terms of data integrity, access control and attribute based encryption. The survey analyzes each category of work in detail. A comparison table is also presented along with the strength and weakness of each approach.