Skip to main content

2019 | OriginalPaper | Buchkapitel

Issues and Threats of Cloud Data Storage

verfasst von : Maryem Berrezzouq, Abdellatif El Ghazi, Zineelabidine Abdelali

Erschienen in: Cloud Computing and Big Data: Technologies, Applications and Security

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Cloud Storage is a subset of Cloud Computing, a new technology that knows a hasty progress in the IT world. Indeed, many providers offer, as a service, plenty of Cloud Storage spaces, especially for mobile’s use. Due to the massive use of this means of storage increase issues and threats. Thus, many efforts are dedicated by scientific and researches all over the word to avoid these risks and solve the various security problems that confront Cloud Storage. This Chapter is a modest contribution to the ongoing efforts. It will be focused on the Cloud Storage security. At first, we will try to describe the data life cycle and to giving meanwhile the security measures and methods for each cycle. Then, we will present some new approaches that protect data in Cloud. Finally, we will propose and discuss a new secure architecture based on three layers.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Choi, J., Choi, C., Ko, B., Choi, D., Kim, P.: Detecting web based DDoS attack using MapReduce operations in cloud computing environment. J. Internet Serv. Inf. Secur. 3, 28–37 (2013) Choi, J., Choi, C., Ko, B., Choi, D., Kim, P.: Detecting web based DDoS attack using MapReduce operations in cloud computing environment. J. Internet Serv. Inf. Secur. 3, 28–37 (2013)
2.
Zurück zum Zitat Jamil, D., Zaki, H.: Security issues in cloud computing and countermeasures. Int. J. Eng. Sci. Technol. 3, 2672–2676 (2011) Jamil, D., Zaki, H.: Security issues in cloud computing and countermeasures. Int. J. Eng. Sci. Technol. 3, 2672–2676 (2011)
3.
Zurück zum Zitat Moyo, T., Bhogal, J.: Investigating security issues in cloud computing. In: Proceedings of the 2014 8th International Conference on Complex, Intelligent and Software Intensive Systems, CISIS 2014 (2014) Moyo, T., Bhogal, J.: Investigating security issues in cloud computing. In: Proceedings of the 2014 8th International Conference on Complex, Intelligent and Software Intensive Systems, CISIS 2014 (2014)
4.
Zurück zum Zitat Thakur, A.S.: Framework to improve data integrity in multi cloud environment. Int. J. Comput. Appl. 87(10), 28–32 (2014) Thakur, A.S.: Framework to improve data integrity in multi cloud environment. Int. J. Comput. Appl. 87(10), 28–32 (2014)
5.
6.
Zurück zum Zitat Kulkarni, G., Waghmare, R., Palwe, R., Waykule, V., Bankar, H., Koli, K.: Cloud storage architecture. In: 2012 7th International Conference on Telecommunication Systems, Services, and Applications, TSSA 2012, pp. 76–81 (2012) Kulkarni, G., Waghmare, R., Palwe, R., Waykule, V., Bankar, H., Koli, K.: Cloud storage architecture. In: 2012 7th International Conference on Telecommunication Systems, Services, and Applications, TSSA 2012, pp. 76–81 (2012)
7.
Zurück zum Zitat Weil, S.A., Brandt, S.A., Miller, E.L.: CRUSH: controlled, scalable, decentralized placement of replicated data. In: Proceedings of the 2006 ACM/IEEE Conference on SC 2006, vol. 1, no. November, p. 31 (2006) Weil, S.A., Brandt, S.A., Miller, E.L.: CRUSH: controlled, scalable, decentralized placement of replicated data. In: Proceedings of the 2006 ACM/IEEE Conference on SC 2006, vol. 1, no. November, p. 31 (2006)
8.
Zurück zum Zitat Top Threats Working Group: The notorious nine cloud computing top threats in 2013, no. February (2013) Top Threats Working Group: The notorious nine cloud computing top threats in 2013, no. February (2013)
9.
Zurück zum Zitat Varadharajan, V., Tupakula, U.: Security as a service model for cloud environment. IEEE Trans. Netw. Serv. Manag. 11, 60–75 (2014)CrossRef Varadharajan, V., Tupakula, U.: Security as a service model for cloud environment. IEEE Trans. Netw. Serv. Manag. 11, 60–75 (2014)CrossRef
10.
Zurück zum Zitat Vu, Q., Sajjad, A., Dimitrakos, T., Colombo, M., Asal, R.: Secure cloud storage: a framework for data protection as a service in the multi-cloud environment. In: IEEE Conference on Communications and Network Security (CNS), 28–30 September 2015, Florence, Italy (2015) Vu, Q., Sajjad, A., Dimitrakos, T., Colombo, M., Asal, R.: Secure cloud storage: a framework for data protection as a service in the multi-cloud environment. In: IEEE Conference on Communications and Network Security (CNS), 28–30 September 2015, Florence, Italy (2015)
11.
Zurück zum Zitat Meenakshi, I.K., George, V.S.: Cloud server storage security using TPA. Int. J. Adv. Res. Comput. Sci. Technol. (2014). Issue Special Meenakshi, I.K., George, V.S.: Cloud server storage security using TPA. Int. J. Adv. Res. Comput. Sci. Technol. (2014). Issue Special
12.
Zurück zum Zitat Ma, X.: Study on access control for cloud storage security. In: CSIC, pp. 333–336 (2015) Ma, X.: Study on access control for cloud storage security. In: CSIC, pp. 333–336 (2015)
13.
Zurück zum Zitat Yu, Y., Zhang, Y., Ni, J., Au, M.H., Chen, L., Liu, H.: Remote data possession checking with enhanced security for cloud storage. Futur. Gener. Comput. Syst. 52, 77–84 (2015)CrossRef Yu, Y., Zhang, Y., Ni, J., Au, M.H., Chen, L., Liu, H.: Remote data possession checking with enhanced security for cloud storage. Futur. Gener. Comput. Syst. 52, 77–84 (2015)CrossRef
14.
Zurück zum Zitat Chen, L.: Using algebraic signatures to check data possession in cloud storage. Futur. Gener. Comput. Syst. 29(7), 1709–1715 (2013)CrossRef Chen, L.: Using algebraic signatures to check data possession in cloud storage. Futur. Gener. Comput. Syst. 29(7), 1709–1715 (2013)CrossRef
16.
Zurück zum Zitat Elghazi, A., Berrezzouq, M., Abdelali, Z.: New version of iSCSI protocol to secure Cloud data storage. In: Proceedings of 2016 International Conference on Cloud Computing Technologies and Applications, CloudTech 2016 (2017) Elghazi, A., Berrezzouq, M., Abdelali, Z.: New version of iSCSI protocol to secure Cloud data storage. In: Proceedings of 2016 International Conference on Cloud Computing Technologies and Applications, CloudTech 2016 (2017)
17.
Zurück zum Zitat Ahmad, N.: Cloud computing: technology, security issues and solutions. In: 2017 2nd International Conference on Anti-Cyber Crimes (ICACC) (2017) Ahmad, N.: Cloud computing: technology, security issues and solutions. In: 2017 2nd International Conference on Anti-Cyber Crimes (ICACC) (2017)
18.
Zurück zum Zitat Slamanig, D., Lorunser, T., Grob, T., Langer, T., des Noes, M., Pohls, H.C., Rozenberg, B.: Towards a new paradigm for privacy and security in cloud services. In: Communications in Computer and Information Science, vol. 530, pp. 14–25 (2015) Slamanig, D., Lorunser, T., Grob, T., Langer, T., des Noes, M., Pohls, H.C., Rozenberg, B.: Towards a new paradigm for privacy and security in cloud services. In: Communications in Computer and Information Science, vol. 530, pp. 14–25 (2015)
19.
Zurück zum Zitat Chen, Y.J., Wang, L.C., Liao, C.H.: Eavesdropping prevention for network coding encrypted cloud storage systems. IEEE Trans. Parallel Distrib. Syst. 27(8), 2261–2273 (2016)CrossRef Chen, Y.J., Wang, L.C., Liao, C.H.: Eavesdropping prevention for network coding encrypted cloud storage systems. IEEE Trans. Parallel Distrib. Syst. 27(8), 2261–2273 (2016)CrossRef
20.
Zurück zum Zitat Singh, S., Jeong, Y.S., Park, J.H.: A survey on cloud computing security: issues, threats, and solutions. J. Netw. Comput. Appl. 75, 200–222 (2016)CrossRef Singh, S., Jeong, Y.S., Park, J.H.: A survey on cloud computing security: issues, threats, and solutions. J. Netw. Comput. Appl. 75, 200–222 (2016)CrossRef
Metadaten
Titel
Issues and Threats of Cloud Data Storage
verfasst von
Maryem Berrezzouq
Abdellatif El Ghazi
Zineelabidine Abdelali
Copyright-Jahr
2019
DOI
https://doi.org/10.1007/978-3-319-97719-5_5

Neuer Inhalt