International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 2 | Views: 34 | Weekly Hits: ⮙1 | Monthly Hits: ⮙2

Review Papers | Computer Science and Information Technology | United States of America | Volume 13 Issue 4, April 2024


Secure Data Outsourcing Techniques for Cloud Storage

Ankur Mahida [9]


Abstract: In this rapidly growing cloud computing age, data outsourcing has become the preferred solution to cost-effective and scalable storage for individuals and organizations. Indeed, cloud service providers' engagement in storing sensitive customer data increases security and privacy issues. The article offers a comprehensive review of various secure data outsourcing methods to overcome the security, integrity, and availability challenges of cloud-based data. It looks at state-of-the-art encryption techniques, access control methods, and auditing procedures, pointing out their power, drawbacks, and actual value. The review first discusses using cryptographic algorithms, including symmetric and asymmetric encryption, which safeguard data confidentiality while it is in storage and while data is being transmitted. It also discusses access control techniques such as identity-based encryption, attribute-based encryption, and proxy re-encryption, which are the means of fine-grained and secure data sharing. Other than this, the review observes some data integrity protocols like digital signatures, hash functions, and provable data possession schemes that make data authentication possible and enable verification. The review then touches upon the auditing protocols, such as third-party auditing and remote data checking, that enable the data owners to audit the integrity of the outsourced dataset in periodic intervals without retrieving the entire data. Through these methods, organizations can curb risks related to data outsourcing and take advantage of the cloud storage benefits by retaining the security, integrity, and availability of their classified data.


Keywords: Cloud storage, data outsourcing, encryption, access control, data integrity, privacy-preserving, auditing


Edition: Volume 13 Issue 4, April 2024,


Pages: 181 - 184


How to Download this Article?

Type Your Valid Email Address below to Receive the Article PDF Link


Verification Code will appear in 2 Seconds ... Wait

Top