Academic literature on the topic 'Cloud data storage'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Cloud data storage.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Cloud data storage"
A.Mounika, A. Mounika, and C. Srinivas C.Srinivas. "Enabling Dynamic Data In Cloud Storage." International Journal of Scientific Research 1, no. 5 (June 1, 2012): 25–27. http://dx.doi.org/10.15373/22778179/oct2012/9.
Full textAiyer, Viswanath, Rohit Bhutkar, Sagar Anvekar, and Dinesh Chavan. "Guaranteeing Data Storage Security in Cloud Computing." International Journal of Engineering Research 4, no. 5 (May 1, 2015): 231–34. http://dx.doi.org/10.17950/ijer/v4s5/504.
Full textMahida, Ankur. "Secure Data Outsourcing Techniques for Cloud Storage." International Journal of Science and Research (IJSR) 13, no. 4 (April 5, 2024): 181–84. http://dx.doi.org/10.21275/sr24402065432.
Full textYolchuyev, Agil, and Janos Levendovszky. "Data Chunks Placement Optimization for Hybrid Storage Systems." Future Internet 13, no. 7 (July 11, 2021): 181. http://dx.doi.org/10.3390/fi13070181.
Full textXIE, Hua-cheng, and Xiang-dong CHEN. "Cloud storage-oriented unstructured data storage." Journal of Computer Applications 32, no. 6 (August 24, 2013): 1924–28. http://dx.doi.org/10.3724/sp.j.1087.2012.01924.
Full textBhavani, S. Durga, Gudlanarva Sudhakar, and Ujjwal Karna. "Data Storage Security in Cloud Computing: A Survey." International Journal of Advanced Research in Computer Science and Software Engineering 7, no. 1 (January 30, 2017): 52–57. http://dx.doi.org/10.23956/ijarcsse/v7i1/0148.
Full textJaikar, S. P. "Securing Cloud Data Storage." IOSR Journal of Computer Engineering 1, no. 6 (2012): 43–49. http://dx.doi.org/10.9790/0661-0164349.
Full textEkta, Mrinal. "Secured Cloud Data Sharing: Privacy-Preserving Storage Optimization with Data Confidentiality." International Journal of Research Publication and Reviews 4, no. 8 (August 2023): 2957–66. http://dx.doi.org/10.55248/gengpi.4.823.51935.
Full textK L, Anitha, and T. R. Gopalakrishnan Nair. "Data storage lock algorithm with cryptographic techniques." International Journal of Electrical and Computer Engineering (IJECE) 9, no. 5 (October 1, 2019): 3843. http://dx.doi.org/10.11591/ijece.v9i5.pp3843-3849.
Full textNaga Chandrika H, Et al. "Data Security on Backed Up Data and Recovery in Cloud Storage." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 9 (November 5, 2023): 4563–74. http://dx.doi.org/10.17762/ijritcc.v11i9.9971.
Full textDissertations / Theses on the topic "Cloud data storage"
Avlasovych, V. V. "Cloud data Storage." Thesis, Sumy State University, 2016. http://essuir.sumdu.edu.ua/handle/123456789/46877.
Full textCappelli, Gino. "Data cloud through google cloud storage." Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2012. http://amslaurea.unibo.it/3032/.
Full textWang, Xing. "Benchmarking Cloud Storage Systems." Thesis, Norges teknisk-naturvitenskapelige universitet, Institutt for telematikk, 2014. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-26716.
Full textAl, Beshri Aiiad Ahmad M. "Outsourcing data storage without outsourcing trust in cloud computing." Thesis, Queensland University of Technology, 2013. https://eprints.qut.edu.au/61738/1/Aiiad_Ahmad_M._Al_Beshri_Thesis.pdf.
Full textBilbray, Kyle. "DSFS: a data storage facilitating service for maximizing security, availability, performance, and customizability." Thesis, Georgia Institute of Technology, 2014. http://hdl.handle.net/1853/52984.
Full textGonçalves, André Miguel Augusto. "Estimating data divergence in cloud computing storage systems." Master's thesis, Faculdade de Ciências e Tecnologia, 2013. http://hdl.handle.net/10362/10852.
Full textMany internet services are provided through cloud computing infrastructures that are composed of multiple data centers. To provide high availability and low latency, data is replicated in machines in different data centers, which introduces the complexity of guaranteeing that clients view data consistently. Data stores often opt for a relaxed approach to replication, guaranteeing only eventual consistency, since it improves latency of operations. However, this may lead to replicas having different values for the same data. One solution to control the divergence of data in eventually consistent systems is the usage of metrics that measure how stale data is for a replica. In the past, several algorithms have been proposed to estimate the value of these metrics in a deterministic way. An alternative solution is to rely on probabilistic metrics that estimate divergence with a certain degree of certainty. This relaxes the need to contact all replicas while still providing a relatively accurate measurement. In this work we designed and implemented a solution to estimate the divergence of data in eventually consistent data stores, that scale to many replicas by allowing clientside caching. Measuring the divergence when there is a large number of clients calls for the development of new algorithms that provide probabilistic guarantees. Additionally, unlike previous works, we intend to focus on measuring the divergence relative to a state that can lead to the violation of application invariants.
Partially funded by project PTDC/EIA EIA/108963/2008 and by an ERC Starting Grant, Agreement Number 307732
Kaaniche, Nesrine. "Cloud data storage security based on cryptographic mechanisms." Thesis, Evry, Institut national des télécommunications, 2014. http://www.theses.fr/2014TELE0033/document.
Full textRecent technological advances have given rise to the popularity and success of cloud. This new paradigm is gaining an expanding interest, since it provides cost efficient architectures that support the transmission, storage, and intensive computing of data. However, these promising storage services bring many challenging design issues, considerably due to the loss of data control. These challenges, namely data confidentiality and data integrity, have significant influence on the security and performances of the cloud system. This thesis aims at overcoming this trade-off, while considering two data security concerns. On one hand, we focus on data confidentiality preservation which becomes more complex with flexible data sharing among a dynamic group of users. It requires the secrecy of outsourced data and an efficient sharing of decrypting keys between different authorized users. For this purpose, we, first, proposed a new method relying on the use of ID-Based Cryptography (IBC), where each client acts as a Private Key Generator (PKG). That is, he generates his own public elements and derives his corresponding private key using a secret. Thanks to IBC properties, this contribution is shown to support data privacy and confidentiality, and to be resistant to unauthorized access to data during the sharing process, while considering two realistic threat models, namely an honest but curious server and a malicious user adversary. Second, we define CloudaSec, a public key based solution, which proposes the separation of subscription-based key management and confidentiality-oriented asymmetric encryption policies. That is, CloudaSec enables flexible and scalable deployment of the solution as well as strong security guarantees for outsourced data in cloud servers. Experimental results, under OpenStack Swift, have proven the efficiency of CloudaSec in scalable data sharing, while considering the impact of the cryptographic operations at the client side. On the other hand, we address the Proof of Data Possession (PDP) concern. In fact, the cloud customer should have an efficient way to perform periodical remote integrity verifications, without keeping the data locally, following three substantial aspects : security level, public verifiability, and performance. This concern is magnified by the client’s constrained storage and computation capabilities and the large size of outsourced data. In order to fulfill this security requirement, we first define a new zero-knowledge PDP proto- col that provides deterministic integrity verification guarantees, relying on the uniqueness of the Euclidean Division. These guarantees are considered as interesting, compared to several proposed schemes, presenting probabilistic approaches. Then, we propose SHoPS, a Set-Homomorphic Proof of Data Possession scheme, supporting the 3 levels of data verification. SHoPS enables the cloud client not only to obtain a proof of possession from the remote server, but also to verify that a given data file is distributed across multiple storage devices to achieve a certain desired level of fault tolerance. Indeed, we present the set homomorphism property, which extends malleability to set operations properties, such as union, intersection and inclusion. SHoPS presents high security level and low processing complexity. For instance, SHoPS saves energy within the cloud provider by distributing the computation over multiple nodes. Each node provides proofs of local data block sets. This is to make applicable, a resulting proof over sets of data blocks, satisfying several needs, such as, proofs aggregation
Kaaniche, Nesrine. "Cloud data storage security based on cryptographic mechanisms." Electronic Thesis or Diss., Evry, Institut national des télécommunications, 2014. http://www.theses.fr/2014TELE0033.
Full textRecent technological advances have given rise to the popularity and success of cloud. This new paradigm is gaining an expanding interest, since it provides cost efficient architectures that support the transmission, storage, and intensive computing of data. However, these promising storage services bring many challenging design issues, considerably due to the loss of data control. These challenges, namely data confidentiality and data integrity, have significant influence on the security and performances of the cloud system. This thesis aims at overcoming this trade-off, while considering two data security concerns. On one hand, we focus on data confidentiality preservation which becomes more complex with flexible data sharing among a dynamic group of users. It requires the secrecy of outsourced data and an efficient sharing of decrypting keys between different authorized users. For this purpose, we, first, proposed a new method relying on the use of ID-Based Cryptography (IBC), where each client acts as a Private Key Generator (PKG). That is, he generates his own public elements and derives his corresponding private key using a secret. Thanks to IBC properties, this contribution is shown to support data privacy and confidentiality, and to be resistant to unauthorized access to data during the sharing process, while considering two realistic threat models, namely an honest but curious server and a malicious user adversary. Second, we define CloudaSec, a public key based solution, which proposes the separation of subscription-based key management and confidentiality-oriented asymmetric encryption policies. That is, CloudaSec enables flexible and scalable deployment of the solution as well as strong security guarantees for outsourced data in cloud servers. Experimental results, under OpenStack Swift, have proven the efficiency of CloudaSec in scalable data sharing, while considering the impact of the cryptographic operations at the client side. On the other hand, we address the Proof of Data Possession (PDP) concern. In fact, the cloud customer should have an efficient way to perform periodical remote integrity verifications, without keeping the data locally, following three substantial aspects : security level, public verifiability, and performance. This concern is magnified by the client’s constrained storage and computation capabilities and the large size of outsourced data. In order to fulfill this security requirement, we first define a new zero-knowledge PDP proto- col that provides deterministic integrity verification guarantees, relying on the uniqueness of the Euclidean Division. These guarantees are considered as interesting, compared to several proposed schemes, presenting probabilistic approaches. Then, we propose SHoPS, a Set-Homomorphic Proof of Data Possession scheme, supporting the 3 levels of data verification. SHoPS enables the cloud client not only to obtain a proof of possession from the remote server, but also to verify that a given data file is distributed across multiple storage devices to achieve a certain desired level of fault tolerance. Indeed, we present the set homomorphism property, which extends malleability to set operations properties, such as union, intersection and inclusion. SHoPS presents high security level and low processing complexity. For instance, SHoPS saves energy within the cloud provider by distributing the computation over multiple nodes. Each node provides proofs of local data block sets. This is to make applicable, a resulting proof over sets of data blocks, satisfying several needs, such as, proofs aggregation
Noman, Ali. "Addressing the Data Location Assurance Problem of Cloud Storage Environments." Thesis, Université d'Ottawa / University of Ottawa, 2018. http://hdl.handle.net/10393/37375.
Full textArteaga, Clavijo Dulcardo Ariel. "Flash Caching for Cloud Computing Systems." FIU Digital Commons, 2016. http://digitalcommons.fiu.edu/etd/2496.
Full textBooks on the topic "Cloud data storage"
Zhang, Yuan, Chunxiang Xu, and Xuemin Sherman Shen. Data Security in Cloud Storage. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-4374-6.
Full textData intensive storage services for cloud environments. Hershey, PA: Business Science Reference, 2013.
Find full textDeshpande, Prachi S., Subhash C. Sharma, and Sateesh K. Peddoju. Security and Data Storage Aspect in Cloud Computing. Singapore: Springer Singapore, 2019. http://dx.doi.org/10.1007/978-981-13-6089-3.
Full textMaking Data Storage Efficient in the Era of Cloud Computing. [New York, N.Y.?]: [publisher not identified], 2020.
Find full textInternational Business Machines Corporation. International Technical Support Organization, ed. Managing security and compliance in cloud or virtualized data centers. [Poughkeepsie, NY: IBM Corp., International Technical Support Organization], 2013.
Find full textHill, Richard. Guide to Cloud Computing: Principles and Practice. London: Springer London, 2013.
Find full textauthor, Ward D. Dewey, Latham, Claire Kamm, 1953- author, and Copeland Mary Kathleen author, eds. Computerized accounting in the cloud using Microsoft Dynamics GP 2013. 7th ed. Okemos, Michigan: Armond Dalton Publishers, Inc., 2014.
Find full textM, Butler Joe, Theilmann Wolfgang, Yahyapour Ramin, and SpringerLink (Online service), eds. Service Level Agreements for Cloud Computing. New York, NY: Springer Science+Business Media, LLC, 2011.
Find full textBook chapters on the topic "Cloud data storage"
Frampton, Michael. "Cloud Storage." In Complete Guide to Open Source Big Data Stack, 17–58. Berkeley, CA: Apress, 2018. http://dx.doi.org/10.1007/978-1-4842-2149-5_2.
Full textZhang, Yuan, Chunxiang Xu, and Xuemin Sherman Shen. "Cloud Storage Reliability." In Data Security in Cloud Storage, 29–54. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-4374-6_3.
Full textKamara, Seny, and Kristin Lauter. "Cryptographic Cloud Storage." In Financial Cryptography and Data Security, 136–49. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-14992-4_13.
Full textZhao, Liang, Sherif Sakr, Anna Liu, and Athman Bouguettaya. "Cloud-Hosted Data Storage Systems." In Cloud Data Management, 21–45. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-04765-2_3.
Full textKaoudi, Zoi, Ioana Manolescu, and Stamatis Zampetakis. "Cloud-Based RDF Storage." In Cloud-Based RDF Data Management, 21–42. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-031-01875-6_3.
Full textZhang, Yuan, Chunxiang Xu, and Xuemin Sherman Shen. "Secure Data Provenance." In Data Security in Cloud Storage, 119–41. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-4374-6_6.
Full textChen, Yu, Wei-Shinn Ku, Jun Feng, Pu Liu, and Zhou Su. "Secure Distributed Data Storage in Cloud Computing." In Cloud Computing, 221–48. Hoboken, NJ, USA: John Wiley & Sons, Inc., 2011. http://dx.doi.org/10.1002/9780470940105.ch8.
Full textSukhdeve, Shitalkumar R., and Sandika S. Sukhdeve. "Data Analytics and Storage." In Google Cloud Platform for Data Science, 161–87. Berkeley, CA: Apress, 2023. http://dx.doi.org/10.1007/978-1-4842-9688-2_6.
Full textZhang, Yuan, Chunxiang Xu, and Xuemin Sherman Shen. "Secure Data Time-Stamping." In Data Security in Cloud Storage, 143–66. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-4374-6_7.
Full textShashi, Ashutosh. "Data Storage in Google Cloud." In Designing Applications for Google Cloud Platform, 73–117. Berkeley, CA: Apress, 2023. http://dx.doi.org/10.1007/978-1-4842-9511-3_4.
Full textConference papers on the topic "Cloud data storage"
Matveev, Artem. "Cost-Efficient Data Privacy Protection in Multi Cloud Storage." In 3rd International Conference on Data Mining and Machine Learning (DMML 2022). Academy and Industry Research Collaboration Center (AIRCC), 2022. http://dx.doi.org/10.5121/csit.2022.120706.
Full textBaalagi, R., H. Sindhura, M. Keerthi, and Golda Dilip. "Optimizing Information Leakage in Multi Cloud Storage Services." In International Research Conference on IOT, Cloud and Data Science. Switzerland: Trans Tech Publications Ltd, 2023. http://dx.doi.org/10.4028/p-mv0271.
Full textLi, Chao, and Balaji Palanisamy. "Emerge: Self-Emerging Data Release Using Cloud Data Storage." In 2017 IEEE 10th International Conference on Cloud Computing (CLOUD). IEEE, 2017. http://dx.doi.org/10.1109/cloud.2017.13.
Full textVernik, Gil, Alexandra Shulman-Peleg, Sebastian Dippl, Ciro Formisano, Michael C. Jaeger, Elliot K. Kolodner, and Massimo Villari. "Data On-Boarding in Federated Storage Clouds." In 2013 IEEE 6th International Conference on Cloud Computing (CLOUD). IEEE, 2013. http://dx.doi.org/10.1109/cloud.2013.54.
Full textKaaniche, Nesrine, Aymen Boudguiga, and Maryline Laurent. "ID Based Cryptography for Cloud Data Storage." In 2013 IEEE 6th International Conference on Cloud Computing (CLOUD). IEEE, 2013. http://dx.doi.org/10.1109/cloud.2013.80.
Full textParwekar, Pritee, Prakash Kumar, Mayuri Saxena, and Sakshi Saxena. "Public auditing: Cloud data storage." In 2014 5th International Conference- Confluence The Next Generation Information Technology Summit. IEEE, 2014. http://dx.doi.org/10.1109/confluence.2014.6949366.
Full textDongre, Kirti A., Roshan Singh Thakur, and Allan Abraham. "Secure cloud storage of data." In 2014 International Conference on Computer Communication and Informatics (ICCCI). IEEE, 2014. http://dx.doi.org/10.1109/iccci.2014.6921741.
Full textKurra, Hemayamini, Youssif Al-Nashif, and Salim Hariri. "Resilient cloud data storage services." In the 2013 ACM Cloud and Autonomic Computing Conference. New York, New York, USA: ACM Press, 2013. http://dx.doi.org/10.1145/2494621.2494634.
Full textJordao, Renata, Valerio Aymore Martins, Fabio Buiati, Rafael Timoteo de Sousa, and Flavio Elias de Deus. "Secure data storage in distributed cloud environments." In 2014 IEEE International Conference on Big Data (Big Data). IEEE, 2014. http://dx.doi.org/10.1109/bigdata.2014.7004383.
Full textYunqi Ye, Liangliang Xiao, Yinzi Chen, I-Ling Yen, Farokh Bastani, and Ing-Ray Chen. "Access Protocols in Data Partitioning Based Cloud Storage." In 2013 IEEE 6th International Conference on Cloud Computing (CLOUD). IEEE, 2013. http://dx.doi.org/10.1109/cloud.2013.23.
Full textReports on the topic "Cloud data storage"
Semerikov, Serhiy, Illia Teplytskyi, Yuliia Yechkalo, Oksana Markova, Vladimir Soloviev, and Arnold Kiv. Computer Simulation of Neural Networks Using Spreadsheets: Dr. Anderson, Welcome Back. [б. в.], June 2019. http://dx.doi.org/10.31812/123456789/3178.
Full textKong, Zhihao, and Na Lu. Determining Optimal Traffic Opening Time Through Concrete Strength Monitoring: Wireless Sensing. Purdue University, 2023. http://dx.doi.org/10.5703/1288284317613.
Full textRudd, Ian. Leveraging Artificial Intelligence and Robotics to Improve Mental Health. Intellectual Archive, July 2022. http://dx.doi.org/10.32370/iaj.2710.
Full textZhylenko, Tetyana I. Auto Checker of Higher Mathematics - an element of mobile cloud education. [б. в.], July 2020. http://dx.doi.org/10.31812/123456789/3895.
Full text