Secure Data Storage and Sharing Techniques for Data Protection in Cloud Environments: A Systematic Review, Analysis, and Future Directions

70Citations
Citations of this article
172Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

A large number of researchers, academia, government sectors, and business enterprises are adopting the cloud environment due to the least upfront capital investment, maximum scalability, and several other features of it. Despite the multiple features supported by the cloud environment, it also suffers several challenges. Data protection is the primary concern in the area of information security and cloud computing. Numerous solutions have been developed to address this challenge. However, there is a lack of comprehensive analysis among the existing solutions and a necessity emerges to explore, classify, and analyze the significant existing work for investigating the applicability of these solutions to meet the requirements. This article presents a comparative and systematic study, and in-depth analysis of leading techniques for secure sharing and protecting the data in the cloud environment. The discussion about each dedicated technique includes: Functioning for protecting the data, potential and revolutionary solutions in the domain, the core and adequate information including workflow, achievements, scope, gaps, future directions, etc. about each solution. Furthermore, a comprehensive and comparative analysis of the discussed techniques is presented. Afterward, the applicability of the techniques is discussed as per the requirements and the research gaps along with future directions are reported in the field. The authors believe that this article's contribution will operate as a catalyst for the potential researchers to carry out the research work in the area.

References Powered by Scopus

Secure spread spectrum watermarking for multimedia

4625Citations
N/AReaders
Get full text

Ciphertext-policy attribute-based encryption

4543Citations
N/AReaders
Get full text

Attribute-based encryption for fine-grained access control of encrypted data

4413Citations
N/AReaders
Get full text

Cited by Powered by Scopus

Quantum Machine Learning Driven Malicious User Prediction for Cloud Network Communications

37Citations
N/AReaders
Get full text

Extremely boosted neural network for more accurate multi-stage Cyber attack prediction in cloud computing environment

34Citations
N/AReaders
Get full text

digital watermarking-Based Cryptosystem for Cloud Resource Provisioning

31Citations
N/AReaders
Get full text

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Cite

CITATION STYLE

APA

Gupta, I., Singh, A. K., Lee, C. N., & Buyya, R. (2022). Secure Data Storage and Sharing Techniques for Data Protection in Cloud Environments: A Systematic Review, Analysis, and Future Directions. IEEE Access. Institute of Electrical and Electronics Engineers Inc. https://doi.org/10.1109/ACCESS.2022.3188110

Readers over time

‘22‘23‘24‘250255075100

Readers' Seniority

Tooltip

PhD / Post grad / Masters / Doc 25

60%

Researcher 8

19%

Lecturer / Post doc 6

14%

Professor / Associate Prof. 3

7%

Readers' Discipline

Tooltip

Computer Science 26

57%

Engineering 9

20%

Business, Management and Accounting 9

20%

Social Sciences 2

4%

Save time finding and organizing research with Mendeley

Sign up for free
0