Loading…
Survey on Data Storage and Retrieval Techniques over Encrypted Cloud Data
Cloud Computing is an ever evolving field of technology. In the simplest terms, cloud computing means storing and accessing data and programs over the Internet instead of your computer's hard drive. The cloud offers a variety of services. It reduces the complexity of the networks, makes provisi...
Saved in:
Published in: | International journal of computer science and information security 2016-09, Vol.14 (9), p.718 |
---|---|
Main Authors: | , , , , , , |
Format: | Article |
Language: | English |
Subjects: | |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Summary: | Cloud Computing is an ever evolving field of technology. In the simplest terms, cloud computing means storing and accessing data and programs over the Internet instead of your computer's hard drive. The cloud offers a variety of services. It reduces the complexity of the networks, makes provision for customization, scalability, efficiency etc. Besides, the information stored on cloud is generally not easily lost. Data stored on cloud is easily susceptible to leak by hackers. In order to prevent this, data is encrypted using Symmetric Searchable Encryption. In such a case, search over the encrypted data becomes difficult and can be executed using various keyword searches as Single Keyword Search, Multi-keyword Search, Fuzzy Keyword Search, Conjunctive Keyword Search, Similarity Search and Synonym Search. In this survey, these keyword searches are explored on the basis of various parameters like security, efficiency, scalability, query effectiveness, architecture and functionality. The overview presented thus compares the different searches on the above mentioned grounds to classify them for various requirements. Sharing of data has become mandatory with the present trending technology overtaking all circumstances. Sharing of data stored in the cloud yields with many advantages. Hence, in this survey we also investigate the various aspects of data sharing on basis of user revocation, competency, encryption techniques, identity privacy and key distribution. Plutus, Sirius, Secure scalable data access scheme, improved proxy encryption and Multi-owner Data Sharing are briefed based on the above mentioned significant parameters. |
---|---|
ISSN: | 1947-5500 |