Security of Cloud-Based Storage

  • Saharan S
  • Somani G
N/ACitations
Citations of this article
2Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Cloud computing is an emerging paradigm which allows to enhance the capabilities of users dynamically. It requires no investment in setting up new infrastructure and saves the cost of human resources, i.e., capabilities are increased with the available man power. Despite the presence of all the facilities, enterprise customer hesitates in transferring their business over the cloud. One major reason behind this reluctance is security. In cloud computing, data privacy and protection are always seen as the major concerns. The users of the cloud services need to be careful in understanding the risks of data breaches in cloud environment.Clouds have variant models for different types of services that are made available to the user. In Infrastructure as a Service (IaaS), cloud storage is offered as a service. Cloud storage is an online storage that can be accessed through network, i.e., both storing and accessing operations are performed with the help of network usage. The data is stored in virtualized pool of storage. This chapter gives the detailed overview of the cloud storage architecture and its detailed security architecture. It covers various possible security risks for cloud storage techniques and methods developed so far for making cloud storage secure. We have provided a detailed overview of the storage deduplication techniques, which are deployed for making cloud storage more efficient and free from various security risks caused due to deduplication. It provides comparison between different techniques used for security of cloud storage. Additionally, an effort has been made to include various case studies considering security aspects. This chapter provides detailed guidelines to secure various parts of cloud storage.

Cite

CITATION STYLE

APA

Saharan, S., & Somani, G. (2015). Security of Cloud-Based Storage (pp. 65–81). https://doi.org/10.1007/978-3-319-25988-8_5

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free