|
References | Overviews | Advantages | Techniques | Years |
|
[20] | The model presents different security policies on the cloud storage and data; the data is not secure everywhere in the cloud data which is fragmented for security purposes; the identity authentication is used for security | The model analyses the cloud storage different methods are applied at different stages to achieve security | The data transmission encryption, access control, identity authentication, and Shamir’s threshold secret sharing program are used in the presented model | 2017 |
|
[21] | The data placement problem is addressed for the big data in the cloud storage system; the data placement problems are solved by the decision, size, and number of chunks | The renewal time minimizes up to 20 percent and 21 percent for the network and Internet topology, the linear programming model, heuristic algorithm, and T-coloring approach | The linear programming model, heuristic algorithm, and T-coloring approach | 2016 |
|
[22] | As the cloud network is an open platform for the users to store and compute the data; the users store and compute the data in the cloud over a wireless remote network by using the Internet; security of the data is the concern in an open system for this purpose encryption and decryption of data outperformed to secure the data | Different steps involved in the proposed work which strongly secures the data from the start to end of the system | Encryption and decryption of data with integrity are applied | 2017 |
|
[23] | Several different security issues are discussed in this article; after that it proposes its own work; the data is divided into small and large sizes; the symmetry encryption approach is applied to large size data | A strong encryption on data applied which fully secures the larger size data from threats | The AES symmetric encryption algorithm is applied to the system | 2015 |
|
[24] | The proposed work targets the two main security issues called the confidentiality level of data and data encryption processing time; the key provided to the users which are not for to avail by any other user | The data encryption time and overhead reduced by achieving a reliable cloud network | The AES, TLS, and the secure hashing algorithm (SHA) | 2016 |
|
[25] | The big data is divided into n sequences and stored in m different CSPs which is proposed to ensure the security of big data; the cryptographic virtual mapping and trapdoor techniques are proposed to achieve high feasible protection of the big data | Two different scenarios are analyzed in the proposed model, and the simulation results concluded that the proposed model provides more security for big data in an efficient way than the other traditional approaches | The cryptographic virtual mapping, data type block or IP resembles, and trapdoor function | 2016 |
|
[26] | Three game models are discussed to analyze the security in the cloud system; the assessment model helps the users to find the risk of data privacy | This model ensures the privacy of the data and hence minimizes the influence of the third party in private data | Security assessment model, one user, multiuser, and multiprovider | 2019 |
|