logo

Annotated Bibliography (Doc)| Charles Sturt University

   

Added on  2020-02-18

11 Pages3157 Words50 Views
Running head: ANNOTATED BIBLIOGRAPBHYAnnotated BibliographyName of the StudentName of the UniversityAuthor’s Note
Annotated Bibliography (Doc)| Charles Sturt University_1
1ANNOTATED BIBLIOGRAPBHYArticle 1: Ren, Y. J., Shen, J., Wang, J., Han, J., & Lee, S. Y. (2015). Mutual verifiableprovable data auditing in public cloud storage16(2), 317-323.The author states that in cloud storage, various properties of data security like dataintegrity, availability as well as confidentiality is considered as significant applications in thecommercial field. It is identified that different types of provable data possession schemes arequite helpful in protecting the data integrity. However, it is analyzed that in some cases theremote data possession helps in checking task for some proxy (Ren et al., 2015). The authorelaborates that the PDP schemes are generally secured as the various types of proxy helps instoring information in various servers of elaborates cloud storage. The paper proposed averifiable data possession scheme that generally utilizes different types of shared key that helpsin constructing the authenticator. It is found that the verifier that is mainly utilized in the schemeis stateless as well as independent service that is provided by the cloud storage.Article 2:Yang, K., & Jia, X. (2014). DAC-MACS: Effective data access control for multi-authority cloud storage systems. InSecurity for Cloud Storage Systems(pp. 59-83).Springer New York. The article elaborates that data access control is one of the significant way that helps inensuring data security within the cloud. However, it is identified that due to untrusted servers ofcloud as well as data outsourcing, the access control in data is considered as one of thechallenging issue within the storage system of cloud (Yang &Jia, 2014). The author elaboratesthat the present schemes of access control is not properly applicable to clouds storage system asnumber of encrypted copies of data needs fully trusted server of the cloud. In this article, theauthor illustrates data access control for different type of multiauthority cloud storage, effective
Annotated Bibliography (Doc)| Charles Sturt University_2
2ANNOTATED BIBLIOGRAPBHYas well as secured scheme of access control with proper revocation as well as decryption isneeded. It is identified that proper CP-ABE scheme with proper decryption for designing properattribute for revocation methodology helps in achieving both backward as well as forwardsecurity. Proper as well as extensive scheme of access control is secured under proper securityassumptions.Article 3: Chu, C. K., Chow, S. S., Tzeng, W. G., Zhou, J., & Deng, R. H. (2014). Key-aggregate cryptosystem for scalable data sharing in cloud storage.IEEE transactions onparallel and distributed systems,25(2), 468-477.The author elaborates that data sharing is functionality in cloud storage. This articleillustrates the flexibility as well as efficiency of sharing data with other due to the help of cloudstorage. It is identified that public key cryptosystems helps in producing constant size forreceiving proper delegation of encryption of rights for various set of cipher texts are needed. It isfound that the novelty is one that helps in aggregating various set of secret keys for making themmuch more compact as single key (Chu et al., 2014). However, it helps in encompassing theowner of various keys that are being aggregated. The author discusses that the secret key holdergenerally helps in releasing proper size of aggregate for different type of flexible choices ofcipher text that generally set in different cloud storage. On the other hand, it is found that theencrypted files outside helps in keeping information confidential. This main aggregate key canbe generally transferred to other for storing smart card for securing storage.
Annotated Bibliography (Doc)| Charles Sturt University_3
3ANNOTATED BIBLIOGRAPBHYArticle 4: Yang, K., & Jia, X. (2013). An efficient and secure dynamic auditing protocol fordata storage in cloud computing.IEEE transactions on parallel and distributedsystems,24(9), 1717-1726. The article illustrates that data owners generally host various data on users as well as oncloud servers for accessing various types of data from the servers of cloud. Due to outsourcing ofdata, it is identified that paradigm related with the service of data hosting assists in introducingvarious types of security related challenges that further needed an independent service ofauditing in order to check the integrity of various data and information within the cloud (Yang& Jia, 2013). It is found that different types of remote integrity checking procedures thatpresently utilized helps in serving the various types of archive data, which cannot be usedproperly within the service of auditing the data as it is analyzed that the cloud is updateddynamically. Therefore, it is identified that both secure as well as efficient protocol of auditingframework that is associated with cloud storage is considered as one of the efficient as well asprivacy preserving protocol of auditing.Article 5: Terry, D. B., Prabhakaran, V., Kotla, R., Balakrishnan, M., Aguilera, M. K., &Abu-Libdeh, H. (2013, November). Consistency-based service level agreements for cloudstorage. InProceedings of the Twenty-Fourth ACM Symposium on Operating SystemsPrinciples(pp. 309-324). ACM.The article elaborates that selecting proper system of cloud storage as well as specificoperation of writing as well as reading data generally requires the developers to makeappropriate decisions that generally trade of various consistency for performance as well asavailability (Terry et al., 2013). It is found that application can be a choice that is not found to be
Annotated Bibliography (Doc)| Charles Sturt University_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Case Study Cloud Storage System
|5
|1140
|108

Internet of Things in Healthcare: Literature Review and Annotated Bibliography
|9
|2470
|133

Development of Deploy Public Key Infrastructure
|4
|508
|281

Cloud-Based Storage: Its Advantages and Disadvantages
|8
|2271
|304

IT Infrastructure Management - Assignment Sample
|7
|1510
|71