|
References | Overviews | Advantages | Techniques | Years |
|
[34] | The model investigates different security and privacy issues; in this work, five layers are introduced which protect the cloud system at every layer from threats and attacks | This model provides a secure service with confidence; it provides the difference between attacks and security along with the countermeasure secure services | The model used five different layers to protect the cloud from threats called the CI, CISL, PESL, data layer (DL), and ACPML | 2016 |
|
[35] | The policy updating problem in the big data is solved by proposing the attribute-based encryption (ABE) scheme; then, DAC scheme for the big data is proposed which enables the owners to dynamic policy updating; different policy updating algorithms for different types of access control are proposed | This approach enables the checking of directly updating ciphertext by the cloud; there is no need for policy updating in data decryption | The outsource ABE, DAC scheme, Boolean formulas, and access tree | 2016 |
|
[36] | The static and dynamic load balancing techniques are proposed; the pairs of keys are generated to secure the data; load balancing attached to a cloud effectively avails the resources provided to nodes | The model performs better in terms of response time, throughput, resource utilization, fault tolerance, and scalability | Load balancing technique, dynamic load balancing, and key pairs | 2018 |
|
[37] | The data security monitoring method based on autonomic computing is proposed; different modules are proposed to gather the data stream and then evaluate the processed data to determine the abnormality; the data collection and analysis of storage are the core of the proposed model | It can accurately evaluate the degree of abnormal; the cost can be reduced by the architecture of integrating modules | The data monitoring process on autonomic computing and data mining algorithm based on the chaotic algorithm and abnormal behavior detection based on Poisson | 2018 |
|
[10] | The sharing of data between a mobile system and cloud system is discussed in this work; the AES technique is used to encrypt the high definition (HD) video; different keys are used to make secure the system are public, private, and security keys (PUK, PRK, and SK) | The delay minimizes due to utilizing the computational power | AES, HD video, HEVC, PUK, PRK, and SK | 2017 |
|