Skip to main content

Advances, Systems and Applications

Table 4 Security Challenges of Cloud Storage with its Solutions

From: Investigation on storage level data integrity strategies in cloud computing: classification, security obstructions, challenges and vulnerability

Types of Security Issues

Symptoms

Affects

Solution with references

Risk to integrity of data

Unauthorized access, segregation problem of data, lack of maintenance of database

hamperness of cloud storage service, lack of data integrity

Data encryption method, Public data auditing technique [83, 88,89,90]

Dishonest TPA

tempering of original file, by the generation of wrong audit message, spoiling of CSP’s intention

Lack of data confidentiality, lack of data integrity

hash function with collision resistant property [87], Secure Hash Algorithm (SHA-2) [87], RSA algorithm [91], Threat Model [83], panda public auditing(PPA) [130]

Dishonest CSP

Data leakage, data modification, loss of data

loss of reputation of CSP, data unavailability, lack of data integrity

Zero knowledge proof [117], data possession verification scheme [97], string authentication technique [53], firewall policies [54]

Forgery Attack

Forge audit message, forge proof message

Violate data integrity policy, lack of reputation of CSP

soundness criteria [88], one way hash function [83], metadata of storage block order [89], hardness of diffie-Hellman computation in bilinear group [117], pass the challenge proof with non negligible probability [90]

Malicious Insider Attack

Data leakage, data modification, data loss

Violate data integrity policy

string authentication technique [14], digital signature [88, 97, 124, 125]