One small step for a man
One Giant leap for the mankind

There is no wealth like Knowledge
                            No Poverty like Ignorance
Journal of Emerging Trends in Computing and Information Sciences Logo

Journal of Emerging Trends in Computing and Information Sciences >> Call for Papers Vol. 8 No. 3, March 2017

Journal of Emerging Trends in Computing and Information Sciences

A Survey of Security Issues for Data Sharing over Untrusted Cloud Providers

Full Text Pdf Pdf
Author Ebtesam A. Alomari, Muhammad M. Monowar
ISSN 2079-8407
On Pages 609-619
Volume No. 5
Issue No. 8
Issue Date September 1, 2014
Publishing Date September 1, 2014
Keywords Cloud Computing, Entrusted Storage, Security, Encryption.


Abstract

Interest in cloud computing market is growing rapidly in the recent years. It provides on-demand, high scalability computing resources with high availability and reliability. However, security is considered as one of the biggest obstacles for cloud computing. In this paper, we focus on the main security and privacy issues, pertinent to store and share data on untrusted cloud storage. We have investigated several existing approaches focused on security concerns in cloud computing. We classify the discussed studies based on three categories, which are: encryption and key management approaches, searching methods over encrypted data and access control schemes. We provide a comparative study of the existing solutions from each category identifying their strengths and limitations. We emphasize that although several techniques were proposed to protect data from cloud provider or any unauthorized users, there are still limitations need to be tackled. Therefore, we identified the research challenges indicating the future research directions in this area.
Back

Seperator
    Journal of Computing | Call for Papers (CFP) | Journal Blog | Journal of Systems and Software | ARPN Journal of Science and Technology | International Journal of Health and Medical Sciences | International Journal of Economics, Finance and Management     
Copyrights
© 2015 Journal of Computing