A Protocol for Cloud Storage With Novel Efficient Remote Data Possession Assignment 2022

Verified

Added on  2022/10/11

|6
|1780
|29
Assignment
AI Summary
tabler-icon-diamond-filled.svg

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
RESEARCH PAPER 0
A protocol for cloud storage
with novel efficient remote data
possession
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Literature review
H., Yan, J., Li, J. Han and, Y., Zhang, "A novel efficient remote data possession checking
protocol in cloud storage," IEEE Transactions on Information Forensics and Security,
vol. 12, no. 1, pp.78-88, 2016.
This journal paper is based on the novel efficient data possession that was written by Hao
Yan and other authors in the year 2016. In this journal, the researchers evaluated and
analyzed the key aspects of novel efficient remote data possession used in cloud computing
technology. The key goal of this article is to analyze the significance of a novel efficient
remote data possession in the area of cloud storage. The authors argued that in order to
evaluate and manage a large amount of data in the cloud the users require a new approach
for handling data storage issues. Remote data possession is one of the effective protocols
that can be used for solving such kinds of issues while using cloud computing in companies.
There are numerous advantages of this article, for example, provided enough information,
reduced gaps, reviewed key aspects of remote data possession checking system. There are
several drawbacks of this paper, for example, the researchers did not provide any
limitations of RDPC protocol and did not conduct any literature due to which the readers
are not able to evaluate the opinions of other authors.
Z. Hao and, N., Yu, "A multiple-replica remote data possession checking protocol with
public verifiability," In 2010 second international symposium on data, privacy, and E-
commerce, vol. 6, no. 4, pp. 84-89, 2010.
This article was written by Zhuo and Nenghai in the year 2010 which is based on the
replica remote data possession checking protocol. The key purpose of this paper is to
explore the key aspects of data possession protocol and analyze their impact on the data
storage systems. The authors identified that many cloud storage providers are facing the
issue of data loss or data distortion which can be monitored with the help of data
possession protocol. In this paper, the researchers proposed a study based on the remote
data possession protocol and identified their importance in the area of cloud computing.
Document Page
After reviewing the selected paper it has found that the authors provided all reliable facts
related to the remote data possession protocol that can help the students for enhancing
their skills and experience. But, the major issue linked with this paper is that the authors
provided less information about the impacts of remote data possession protocol. Therefore,
in future research, the author will enhance the quality of the research.
Y., Yu, Y., Zhang, J., Ni, M.H., Au, L. Chen and, H., Liu, "Remote data possession checking
with enhanced security for cloud storage," Future Generation Computer Systems, vol.
52, no. 4, pp.77-85.
The title of this paper is Remote data possession checking with enhanced security for cloud
storage which was provided by Yong and other writers in the year 2015. The purpose of
the selected paper is to identify the risk factors associated with the remote data possession
protocol that affect the performance of cloud storage. The authors observed that cloud
storage enables consumers to enjoy the on-demand and large-quality data storage services
due to which it can be used in the companies. In order to provide data integration process
to the cloud storage, the consumers can use the concept behind RDPC protocol which has
the ability to improve the performance of cloud storage systems. It is identified that cyber-
attacks are common issues associated with the cloud storage and technologies due to
which the data may be lost but RDPC is an effective protocol that can be used for
controlling and monitoring such kinds of issues. From this paper, it is observed that the
major advantage of this article is that the authors provided an in-depth analysis of the
research title. Moreover, in terms of limitation, the authors provided limited facts
regarding data possession protocol which may produce gaps in the research.
Y., Yu, J., Ni, M.H. Au, H., Liu, H. Wang and, C., Xu, "Improved security of a dynamic
remote data possession checking protocol for cloud storage," Expert systems with
applications, vol. 41, no. 6, 17, pp.7789-7796, 2014.
This research paper was written by Yong and other researchers in the year 2014 and the
goal of this article is to identify security flaws of RDPC protocols. It is identified that cloud
computing is an effective technology but managing a large amount of data on the cloud is a
Document Page
key issue. For controlling and addressing such kind of issues the researchers introduced
the concept behind remote data possession protocol and also evaluated the risk factors
associated with the cloud storage. The authors discussed how a malicious cloud server can
deceive the consumers to believe that the complete file is well controlled via Metadata files.
The authors adopted various research methods while conducting the research, for example,
qualitative investigation, inductive approach, content data analysis and so on.
H., Wang, Q., Wu, B. Qin and, J., Domingo-Ferrer, "Identity-based remote data
possession checking in public clouds," IET Information Security, vol. 8, no. 2, pp.114-
121, 2013.
This paper is based on the remote data possession protocol which was written by Wang
and other authors in the year 2014. The purpose of this paper is to enhance skills in the
area of remote data possession and explore their key aspects in terms of cloud storage.
According to the authors, checking remote data possession play a major role in the cloud
storage and it also enables consumers to check the security of their data stored in the
cloud-based networks. The current remote data possession protocols have developed for
the public key infrastructure and it can help for understanding and evaluating the data of
consumers in the companies. This proposed research provided a way where the risk
factors linked with cloud storage may be analyzed and the researchers included the
viewpoints of other researchers for better understanding. In this article, the researchers
present the first RDPC protocol used in cloud storage and also analyzed the key issues
linked with cloud-based servers. There are major three advantages of this proposed study,
for example, provided effective arguments, reduced drawbacks of previous studies and
highlighted each and every point about RDPC protocol. The major issue associated with this
paper is that the authors did not provide any information about the risk factors linked with
the RDPC protocol. In future research, the authors will improve and manage the quality of
the research by conducting survey and data analysis techniques.
L., Chen, S., Zhou, X. Huang and, L., Xu, "Data dynamics for remote data possession
checking in cloud storage," Computers & Electrical Engineering, vol. 39, no. 7,
pp.2413-2424, 2013.
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
The title of the selected paper is Data dynamics for remote data possession checking in
cloud storage that was written by Chen, Zhou, Huang and Xu in the year 2013. In this paper,
the authors provided information related to the RDPC and also delivered provable data
possession and integrity protection. The authors identified that in cloud storage, storage
servers may not be fully trustworthy and remote data possession is a reliable technique
that analyzed and evaluated by the authors. The authors also included the viewpoints of
other researchers that helped for understanding the factors linked with the RDPC system.
The proposed systems and facts provided provable data possession and integrity
protection system which can help the readers for improving their skills in the area of cloud
computing technology. The authors highlighted their opinions on remote data possession
protocol and also examined the key issues faced occurred in the cloud storage. Therefore,
the proposed literature provides complete information about the research topic and also
reviewed recent journal papers based on the remote data possession protocol.
Document Page
References
H., Yan, J., Li, J. Han and, Y., Zhang, "A novel efficient remote data possession checking
protocol in cloud storage," IEEE Transactions on Information Forensics and Security, vol. 12,
no. 1, pp.78-88, 2016.
Z. Hao and, N., Yu, "A multiple-replica remote data possession checking protocol with
public verifiability," In 2010 second international symposium on data, privacy, and E-
commerce, vol. 6, no. 4, pp. 84-89, 2010.
Y., Yu, Y., Zhang, J., Ni, M.H., Au, L. Chen and, H., Liu, "Remote data possession checking with
enhanced security for cloud storage," Future Generation Computer Systems, vol. 52, no. 4,
pp.77-85.
Y., Yu, J., Ni, M.H. Au, H., Liu, H. Wang and, C., Xu, "Improved security of a dynamic remote
data possession checking protocol for cloud storage," Expert systems with applications, vol.
41, no. 6, 17, pp.7789-7796, 2014.
H., Wang, Q., Wu, B. Qin and, J., Domingo-Ferrer, "Identity-based remote data possession
checking in public clouds," IET Information Security, vol. 8, no. 2, pp.114-121, 2013.
L., Chen, S., Zhou, X. Huang and, L., Xu, "Data dynamics for remote data possession checking
in cloud storage," Computers & Electrical Engineering, vol. 39, no. 7, pp.2413-2424, 2013.
chevron_up_icon
1 out of 6
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]