A SURVEY: CLOUD COMPUTING SECURITY ISSUES AND TECHNIQUES
Abstract
Cloud computing is an emerging technology with promising future is becoming more and more popular nowadays. It allows users with unlimited resource. Nowadays, outsourcing computation has attracted much attention and been researched widely. Cloud storage is one of the most significant services of cloud computing. Though cloud computing has various advantages to users, it brings new security challenging problems. One of the important security problems is how to effectively check the integrity of the cloud data stored in the cloud. In the recent years, auditing protocols for cloud storages has been proposed to deal the integrity problem of cloud data. This paper deals with different auditing protocols. Literature survey shows that the protocols are focused on different aspects such as dynamic data operations, privacy protection of the data, the high efficiency, the privacy protection of the identities and the data sharing. These protocols achieve the assurance of cloud data integrity and availability and enforce the quality of cloud storage service and also enable on demand data correctness verification on behalf of the cloud users.
Keywords
Cloud computing, auditing protocols, cloud service, cloud data security.
Full Text:
PDFDOI: https://doi.org/10.26483/ijarcs.v8i7.4377
Refbacks
- There are currently no refbacks.
Copyright (c) 2017 International Journal of Advanced Research in Computer Science

