Downloads: 2 | Views: 148 | Weekly Hits: ⮙1 | Monthly Hits: ⮙2
Review Papers | Computer Science and Information Technology | United States of America | Volume 13 Issue 4, April 2024 | Popularity: 5 / 10
Secure Data Outsourcing Techniques for Cloud Storage
Ankur Mahida
Abstract: In this rapidly growing cloud computing age, data outsourcing has become the preferred solution to cost-effective and scalable storage for individuals and organizations. Indeed, cloud service providers' engagement in storing sensitive customer data increases security and privacy issues. The article offers a comprehensive review of various secure data outsourcing methods to overcome the security, integrity, and availability challenges of cloud-based data. It looks at state-of-the-art encryption techniques, access control methods, and auditing procedures, pointing out their power, drawbacks, and actual value. The review first discusses using cryptographic algorithms, including symmetric and asymmetric encryption, which safeguard data confidentiality while it is in storage and while data is being transmitted. It also discusses access control techniques such as identity-based encryption, attribute-based encryption, and proxy re-encryption, which are the means of fine-grained and secure data sharing. Other than this, the review observes some data integrity protocols like digital signatures, hash functions, and provable data possession schemes that make data authentication possible and enable verification. The review then touches upon the auditing protocols, such as third-party auditing and remote data checking, that enable the data owners to audit the integrity of the outsourced dataset in periodic intervals without retrieving the entire data. Through these methods, organizations can curb risks related to data outsourcing and take advantage of the cloud storage benefits by retaining the security, integrity, and availability of their classified data.
Keywords: Cloud storage, data outsourcing, encryption, access control, data integrity, privacy-preserving, auditing
Edition: Volume 13 Issue 4, April 2024
Pages: 181 - 184
DOI: https://www.doi.org/10.21275/SR24402065432
Make Sure to Disable the Pop-Up Blocker of Web Browser