Full Paper View Go Back

Data Storage in Cloud Environment: Challenges and Issues

Ashok Sharma1

Section:Technical Paper, Product Type: Journal-Paper
Vol.3 , Issue.2 , pp.8-18, Feb-2017


Online published on Feb 28, 2017


Copyright © Ashok Sharma . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
 

View this paper at   Google Scholar | DPI Digital Library


XML View     PDF Download

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Ashok Sharma, “Data Storage in Cloud Environment: Challenges and Issues,” International Journal of Scientific Research in Multidisciplinary Studies , Vol.3, Issue.2, pp.8-18, 2017.

MLA Style Citation: Ashok Sharma "Data Storage in Cloud Environment: Challenges and Issues." International Journal of Scientific Research in Multidisciplinary Studies 3.2 (2017): 8-18.

APA Style Citation: Ashok Sharma, (2017). Data Storage in Cloud Environment: Challenges and Issues. International Journal of Scientific Research in Multidisciplinary Studies , 3(2), 8-18.

BibTex Style Citation:
@article{Sharma_2017,
author = {Ashok Sharma},
title = {Data Storage in Cloud Environment: Challenges and Issues},
journal = {International Journal of Scientific Research in Multidisciplinary Studies },
issue_date = {2 2017},
volume = {3},
Issue = {2},
month = {2},
year = {2017},
issn = {2347-2693},
pages = {8-18},
url = {https://www.isroset.org/journal/IJSRMS/full_paper_view.php?paper_id=2156},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.isroset.org/journal/IJSRMS/full_paper_view.php?paper_id=2156
TI - Data Storage in Cloud Environment: Challenges and Issues
T2 - International Journal of Scientific Research in Multidisciplinary Studies
AU - Ashok Sharma
PY - 2017
DA - 2017/02/28
PB - IJCSE, Indore, INDIA
SP - 8-18
IS - 2
VL - 3
SN - 2347-2693
ER -

233 Views    183 Downloads    146 Downloads
  
  

Abstract :
Cloud Computing has led to new trends of computing and storing in Information in IT and it has brought change in the IT business with introduction of pay per use model. In this paper, author introduces the evolution of cloud computing and its deployment models which includes Private cloud, Public cloud, Hybrid cloud and Community cloud and in addition, various service models which includes IaaS, PaaS, SaaS, XaaS has been discussed. No doubt cloud computing offers many opportunities but it has lots of concern which IT Community has raised.In this survey article, author also gives insight into types of information stored in cloud and security concerns raised by data owners.

Key-Words / Index Term :
Cloud Computing, Data Security, Symmetric algorithms

References :
[1]. R. Arokia Paul Rajan, S. shanmugapriyaa, “Evolution of cloud storage as cloud computing infrastructure service” Journal of Computer Engineering, Vol.1(1), pp.38-45, 2012.
[2]. Daniel J. Abadi, “Data management in the cloud: limitations and opportunities” IEEE Data Engineering bulletin, Vol.32, pp.3-12, 2009.
[3]. Santosh Kumar and R. H. Gouda, “ Cloud Computing – Research Issues, Challenges, Architecture, Platforms and Applications: A Survey” International Journal of Future Computer and Communication, Vol.1(4), pp.356-61, 2012.
[4]. Palvinder singh, Er. Anurag Jain, “Survey paper on cloud computing,” International Journal of innovations in Engineering and Technology (IJIET) Vol.3(4), pp.84-89, 2014.
[5]. Dimpi Rani, Rajiv Kumar Ranjan, “A comparative study of SaaS, PaaS and IaaS in cloud computing” International Journal of Advanced Research in Computer science and software Engineering Vol.4(6), pp.458-462, 2014.
[6]. Jie Ding, Leijie Sha, Xiao Chen, “Modeling and evaluating IaaS cloud using performance evaluation process Algebra” 22nd Asia-Pacific Conference in Communications (APCC), 2016.
[7]. Tarun Karnwal, T. Sivakumar, G. Aghila, “Cloud Services in Different Cloud Deployment Models: An Overview” International Journal of Computer Applications, Vol.34(8), pp.30-37, 2011.
[8]. Tejaswini, Jayanthy illuri V, Jagadesh Desaraju, Pratyosh, Adicharlasrujansimha, “A brief analysis on architecture and reliability of cloud based data storage,” international journal of information systems and Computer sciences, Vol.2(4), 2013.
[9]. Emanuel Ferreira continuo, Danielo Gonçalves Gomes, José Neuman de souza, “An Autonomic computing-based architecture for cloud computing” Symposium on elasticity network operations and management (lanoms), Oct 2015.
[10]. Tahira Mahboob, Maryam zahid, Gulnoor Ahmad, “Adopting information security techniques for cloud computing A Survey” International conference on information technology, information systems and Electrical Engineering (ICITISEE), 2016.
[11]. Swetha d, Thippeswamy k, “Dynamic collaboration of multi cloud an efficient use of cloud computing” International Journal of Computer applications, pp33-36, 2013.
[12]. Monjur Ahmed,Mohammad Ashraf Hussain, “Cloud computing and security issues in the cloud” International Journal of Network Security & its Applications (IJNSA), Vol.6(1), pp.25-37, 2014.
[13]. Yunchuan sun, Junsheng zhang, Yongping xiong, Guangyu zhu, “Data security and privacy in cloud computing” International Journal of distributed sensor networks Vol.2014, doi.org/10.1155/2014/190903.
[14]. Dinil mon divakaran, Mohan gurusamy, “Towards flexible guarantees in clouds: adaptive bandwidth allocation and pricing”, IEEE Transactions on parallel and distributed systems Vol.26(6), pp.1754 – 64, 2015.
[15]. Massimo villari, Antonio celesti, Francesco tusa, Antonio puliafito, “Data reliability in multi-provider cloud storage service with rns ” Advances in service-oriented and cloud computing Vol.393 Series communications in Computer and information science pp.83-93.
[16]. C.W. Hsu, C.W. Wang, Shiuhpyng Shieh, “Reliability and Security of Large Scale Data Storage in Cloud Computing” Annual Technical Reports supported in part by National Science Council, NCP, TWISC, ITRI, III, iCAST, Chungshan Institute of Science and Technology, Bureau of Investigation, and Chunghwa Telecomm 2010.
[17]. Geng yushui, Yuan jiaheng, “Cloud data migration method based on pso algorithm” 14th international Symposium on distributed computing and applications for business engineering and science (DCABES), 2015 .
[18]. Nirav Shah, Sandip Chauhan, “Survey Paper on Security Issues While Data Migration in Cloud Computing” International Journal of innovative research in Technology Vol.1(7), pp.134-137 ,2012.
[19]. Rashmi Rao, Pawan Prakash ,”Improving security for data migration in cloud computing using randomized encryption technique” Journal of Computer Engineering Vol.11(6), pp.39-42, 2013.
[20]. J. opara-martins, R sahandi and F. tian, “Critical review of vendor lock-in and its impact on adoption of cloud computing” International conference on information society London, pp.92-97, 2014.
[21]. Mostapha defraud, Amina mimouni,Mohsine eleuldj, “Vulnerabilities and storage security in cloud computing” International conference on cloud technologies and applications (CLOUDTECH), 2015.
[22]. Sarika u. kadlag, Rahul, Paikrao” Hybrid cryptosystem for secure text file for cloud” International Journal of advance research in Computer science and management studies Vol.2(2), pp.419-26, 2014.
[23]. Shelly, Dr Rajesh Kumar Bawa, “Secure Image Transmission for Cloud Storage System Using Hybrid Scheme” International Journal of Engineering Research and Development Vol.11(9), pp.18-26, 2015.
[24]. Pramod Kumar, Dinesh Goyal, “Performance analysis for audio streaming in cloud” IOSR Journal of Computer Engineering (IOSR-JCE) Vol.16(5), pp.98-104, 2014.
[25]. Xie Si lian ,Su Fu-hua, “Research of Video Data Store Based on Cloud Storage” Fifth International Conference on Measuring Technology and Mechatronics Automation (ICMTMA), 2013.
[26]. William S. and Stalling, “Cryptography and Network Security” 4th edition, Pearson Education India, ISBN: 978-81-7758-774-6, 2006.
[27]. Schneiner B., “Applied cryptography: protocols, Algorithms and source code in C” 2th edition, Wiley, 1996. ISBN: 978-1-119-09672-6.
[28]. Maxime Fernández, Gloria Diaz, Alberto Cosme, Irtalis Negrón, Priscilla Negrón, Alfredo, “Cryptography: Algorithms and security applications” The IEEE Computer Society’s Student, Vol.8(2), 2008.
[29]. Hellman, Martin E., “An overview of public key cryptography” IEEE Communications Magazine, Vol.40(5), pp.42-49, 2002.
[30]. W. Diffie, M.E. Hellman,”Multiuser cryptographic techniques” IEEE transaction, pp.109-112, 1976.
[31]. Coppersmith D., “The Data Encryption Standard (DES) and Its Strength Against Attacks” IBM Journal of Research and Development, Vol-38(3), pp.243-250, 1994.
[32]. Mushtaque M..A., Dhiman H., Hussain S. and Maheshwari S., “Evaluation of DES, TDES, AES, Blowfish and Two fish Encryption Algorithm Based on Space Complexity” International Journal of Engineering Research & Technology (IJERT), Vol.3(4), pp.36-42, 2014.
[33]. Schneier B., “Description of a New Variable-Length Key, 64-Bit Block Cipher (Blowfish), Fast Software Encryption” Cambridge Security Workshop Proceedings, Lecture Notes in Computer Science, Vol.809, pp.191-204, 1993, Springer
[34]. Purnima Gehlot,S. R Biradar,S. R Biradar, “Implementation of Modified Twofish Algorithm using 128 and 192-bit keys on VHDL” International Journal of Computer Applications Vol.70(13), pp.37-42, 2013.
[35]. Douglas Selent, “Advanced encryption standard” insight: rivier academic journal, Vol.6(2), fall 2010.
[36]. M.Pitchaiah, Philemon Daniel, Praveen, “Implementation of Advanced Encryption Standard Algorithm” International Journal of Scientific & Engineering Research Vol.3(3), pp1-6, 2012.

Authorization Required

 

You do not have rights to view the full text article.
Please contact administration for subscription to Journal or individual article.
Mail us at  support@isroset.org or view contact page for more details.

Go to Navigation