A Survey of Various Security Management Models for Cloud Computing Storage Systems

Authors

  • Yasha Gawande Department of Computer Science, Symbiosis Institute of Technology, SIU, Pune, India Author
  • Anuradha Jagadale Department of Computer Science, Symbiosis Institute of Technology, SIU, Pune, India Author
  • Shilpa Gite Department of Computer Science, Symbiosis Institute of Technology, SIU, Pune, India Author

Keywords:

cloud computing, CSP, owner, data correctness, distributed data integrity, auditing, security, access control, mutual trust, confidentiality, privacy.

Abstract

Cloud computing is an emerging technology and it is internet based computing, where shared resources, software and information, are provided to clients. Using Storage-as-a-Service, users and organizations can store their data remotely which poses new security risks towards the correctness of data in cloud. In order to achieve secure cloud storage, there exist different techniques such as storage auditing mechanism, trusted third party technique, PDP, CPDP, Plutus, SiRiUS etc. These techniques support secure and efficient dynamic data storage in the cloud. In this paper, we discuss important security issues related to storage and present a comprehensive survey of the security services provided by the existing storage systems.

References

Downloads

Published

2014-06-30

Issue

Section

Articles

How to Cite

A Survey of Various Security Management Models for Cloud Computing Storage Systems. (2014). International Journal of Current Engineering and Technology, 4(3), 2216-2223. https://ijcet.evegenis.org/index.php/ijcet/article/view/1024