Open Access   Article Go Back

A Review on Fragmented hash based Storage techniques for Query Processing in Cloud Data Storage

Jegadeeswari 1 , Dinadayalan 2 , Gnanambigai 3

Section:Review Paper, Product Type: Journal Paper
Volume-07 , Issue-05 , Page no. 225-229, Mar-2019

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v7si5.225229

Online published on Mar 10, 2019

Copyright © Jegadeeswari, Dinadayalan, Gnanambigai . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Jegadeeswari, Dinadayalan, Gnanambigai, “A Review on Fragmented hash based Storage techniques for Query Processing in Cloud Data Storage,” International Journal of Computer Sciences and Engineering, Vol.07, Issue.05, pp.225-229, 2019.

MLA Style Citation: Jegadeeswari, Dinadayalan, Gnanambigai "A Review on Fragmented hash based Storage techniques for Query Processing in Cloud Data Storage." International Journal of Computer Sciences and Engineering 07.05 (2019): 225-229.

APA Style Citation: Jegadeeswari, Dinadayalan, Gnanambigai, (2019). A Review on Fragmented hash based Storage techniques for Query Processing in Cloud Data Storage. International Journal of Computer Sciences and Engineering, 07(05), 225-229.

BibTex Style Citation:
@article{_2019,
author = {Jegadeeswari, Dinadayalan, Gnanambigai},
title = {A Review on Fragmented hash based Storage techniques for Query Processing in Cloud Data Storage},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {3 2019},
volume = {07},
Issue = {05},
month = {3},
year = {2019},
issn = {2347-2693},
pages = {225-229},
url = {https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=838},
doi = {https://doi.org/10.26438/ijcse/v7i5.225229}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v7i5.225229}
UR - https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=838
TI - A Review on Fragmented hash based Storage techniques for Query Processing in Cloud Data Storage
T2 - International Journal of Computer Sciences and Engineering
AU - Jegadeeswari, Dinadayalan, Gnanambigai
PY - 2019
DA - 2019/03/10
PB - IJCSE, Indore, INDIA
SP - 225-229
IS - 05
VL - 07
SN - 2347-2693
ER -

           

Abstract

Cloud Computing is a potential paradigm employed for the deployment of applications on the Internet. Cloud is an on-demand computing service that offers a dynamic environment for the users to guarantee Quality of Service (QoS) onjjjjj’ data in cloud data centers. Security is an important role in cloud data storage while the services provided storing the data in the cloud. Most of the research works have been designed for secure cloud data storage. However, cloud users still have security issues with their outsourced data. In order to overcome such issues, we surveyed towards the fragmented hashing methods and data storage techniques in cloud. The main goal of this survey is to analysis the different method towards hashing and security methods to store data in cloud environment based on the metrics for different methods on the performance in terms of execution time and data retrieval efficiency.

Key-Words / Index Term

Cloud data storage, Cloud users, Security, Confidentiality, Fragmented data, Query Processing

References

[1] Lifeng Guo, Wei-Chuen Yau, “Efficient Secure-Channel Free Public Key Encryption with Keyword Search for EMRs in Cloud Storage”, Journal of Medical Systems, Springer, Volume 39, Issue 11, Pages 1-11, 2015.
[2] Zuojie Deng, Kenli Li, Keqin Li and Jingli Zhou, “A multi-user searchable encryption scheme with keyword authorization in cloud storage”, Future Generation Computer Systems, Elsevier, Pages 1-25, 2016.
[3] Rongmao Chen, Yi Mu, Guomin Yang, Fuchun Guo, Xiaofen Wang, “Dual-Server Public-Key Encryption with Keyword Search for Secure Cloud Storage”, IEEE Transactions on Information Forensics and Security, Volume 11, Issue 4, Pages 789 – 798, April 2016.
[4] Youwen Zhu, Zhiqiu Huang, Tsuyoshi Takagi, “Secure and controllable k-NN query over encrypted cloud data with key confidentiality”, Journal of Parallel and Distributed Computing, Elsevier, Volume 89, Pages 1–12, March 2016.
[5] Xu An Wang, Fatos Xhafa, Weiyi Cai, Jianfeng Ma, Fushan Wei, “Efficient privacy preserving predicate encryption with fine-grained searchable capability for Cloud storage”, Computers and Electrical Engineering, Elsevier, Volume 56, Pages 871–883, November 2016.
[6] Ramalingam Sugumar and Sharmila Banu Sheik Imam, “Symmetric Encryption Algorithm to Secure Outsourced Data in Public Cloud Storage”, Indian Journal of Science and Technology, Volume 8, Issue 23, Pages 1-5, 2015.
[7] Valentina Ciriani, Sabrina De Capitani Di, Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati, “Combining fragmentation and encryption to protect privacy in data storage”, ACM Transactions on Information and System Security (TISSEC), Volume 13 Issue 3, Pages 1-33, July 2010.
[8] Swapnil V.Khedkar , A.D.Gawande, “Data Partitioning Technique to Improve Cloud Data Storage Security”, International Journal of Computer Science and Information Technologies, Volume 5, Issue 3, Pages 3347-3350, 2014.
[9] R.Kirubakaramoorthi, D. Arivazhagan and D. Helen, “Survey on Encryption Techniques used to Secure Cloud Storage System”, Indian Journal of Science and Technology, Volume 8, Issue 36, Pages 1-7, 2015.
[10] Pothula Sujatha, “An Authentication Based Secure Data Storage in Cloud Computing”, International Journal of Advanced Computing and Electronics Technology (IJACET), Volume 1, Issue 1, Pages 8-13, 2014.
[11] Xinyue Cao, Zhangjie Fu and Xingming Sun, “A Privacy-Preserving Outsourcing Data Storage Scheme with Fragile Digital Watermarking-Based Data Auditing”, Journal of Electrical and Computer Engineering, Hindawi Publishing Corporation, Volume 2016, Article ID 3219042, Pages 1-7, 2016.
[12] Tonghao Yang, Junquan Li, and Bin Yu, “A Secure Ciphertext Self-Destruction Scheme with Attribute-Based Encryption”, Mathematical Problems in Engineering, Hindawi Publishing Corporation, Volume 2015, Article ID 329626, Pages 1-8, 2015.
[13] Lan Zhou,Vijay Varadharajan,and Michael Hitchens, “Trust Enhanced Cryptographic Role-based Access Control for Secure Cloud Data Storage”, IEEE Transactions on Information Forensics and Security, Volume 10, Issue 11, Pages 2381 – 2395, 2015.
[14] Joseph K. Liu, Kaitai Liang, Willy Susilo, Jianghua Liu, Yang Xiang, “Two-Factor Data Security Protection Mechanism for Cloud Storage System”, IEEE Transactions on Computers, Volume 65, Issue 6, Pages 1992 – 2004, 2016.
[15] Wenjing Lou, Kui Ren, Qian Wang, Sherman S.M. Chow, Cong Wang, “Privacy-Preserving Public Auditing for Secure Cloud Storage”, IEEE Transactions on Computers, Volume 62, Issue 02, Pages 362-375, 2013.
[16] Yogesh V. Bhapkar, Rakesh S. Gaikwad, Milind R. Hegade, “Providing Security and Privacy to Cloud Data Storage”, International Journal of Computer Science and Information Technologies, Volume 6, Issue 2, Pages 969-971, 2015.
[17] Muhammad Usman, Mian Ahmad Jan, Xiangjian He, “Cryptography-based secure data storage and sharing using HEVC and public clouds”, Information Sciences, Elsevier, Volume 387, Pages 90–102, 2017.
[18] Dharavath Ramesh, Rahul Mishra, Damodar Reddy Edla, “Secure Data Storage in Cloud: An e-Stream Cipher-Based Secure and Dynamic Updation Policy”, Arabian Journal for Science and Engineering, Springer, Pages 1–11, 2016.
[19] Tao Jiang, Xiaofeng Chena, Jin Li, Duncan S. Wong, Jianfeng Ma, Joseph K. Liu, “Towards secure and reliable cloud storage against data re-outsourcing”, Future Generation Computer Systems, Elsevier, Volume 52, Pages 86–94, November 2015.
[20] Peng Yong, Zhao Wei, Xie Feng, Dai Zhong-Hua, Gao Yang, Chen Dong-Qing, “Secure cloud storage based on cryptographic techniques”, The Journal of China Universities of Posts and Telecommunications, Elsevier, Volume 19, Supplement 2, Pages 182–189, October 2012.
[21] Dandan Yuan, Xiangfu Song , Qiuliang Xu , Minghao Zhao, Xiaochao Wei , Hao Wang and Han Jiang, “An ORAM-based privacy preserving data sharing scheme for cloud storage”, Journal of Information Security and Applications, Elsevier, Volume 39, Pages 1-9, April 2018.
[22] Shangping Wang, Jian Ye and Yaling Zhang, “A keyword searchable attribute-based encryption scheme with attribute update for cloud storage”, PLOS One, Volume 13, Issue No.5, Pages 1-19, May 2018.
[23] Yunxue Yan, Lei Wu, Ge Gao, Hao Wang and Wenyu Xu, “ A dynamic integrity verification scheme of cloud storage data based on lattice and Bloom filter”, Journal of Information Security and Applications, Elsevier, Volume 39, Pages 10-18, April 2018.
[24] Nesrine Kaaniche and Maryline Laurent, “Data Security and Privacy preservation in Cloud Storage Environments based on Cryptographic Mechanisms”, Computer Communications, Elsevier, Volume 111, Pages 120-141, October 2017.