Professional Documents
Culture Documents
Md. Tuhin Reza*, 2Md. Aktar Faruqe Billal, 3Md. Alam Hossain
Computer Science &Engineering, Jessore University of Engineering & Technology, Bangladesh
2
Computer Science &Engineering, JUST, Bangladesh
3
Assistant Professor, Computer Science &Engineering, JUST, Bangladesh
Abstract Cloud storage is a super influential and flexible service model in which data is conserved, patronized,
backed up by a large group of server over the internet. It is fruitful for both private user and enterprise. Different
cloud storage providers have evolved during recent years providing various services and features. However, the
current cloud offers is not always satisfied with users requirements and due to diversity, it is tough to select a storage
platform. For instance, some storage providers do not guarantee sufficient resource flexibility and high availability.
In this work, we guide and commentate a survey on current Cloud Storage and technologies in order to assist users
(1) choosing the better cloud offer that suits with their demands or (2) different services provided by the recent Cloud
Storage. (3)Recent users trends that need to develop for cloud services like Dropbox, Copy etc. Based on the
comparative study conclusion has been drawn and development way has been highlighted.
Keywords Cloud storage; Comparison on different dimensions; Performance analysis; recent security;
I. INTRODUCTION
Cloud Storage is a kind of Internet-based computing, where shared resources, data and information are provided to
computers and other devices on-demand. It is a combination of hardware and software resources managed by the third
party services to provide access to advanced software applications and highend networks of server computers and to
describe a variety of computing concepts [1]. Cloud storage means storing data centralized in any online medium. So that
the same data can be used by multiple users. In this system data may be stored in the cloud, software and service, provide
broad network access on the cloud. Storing files in the cloud has many merits. A user or organisation can check the
documents from any phone, tablet, or computer that connected to the internet. It also allows the user download and play
media file and user can share a secure link to a file to ones friends, family, or worker rather than dealing with e-mail file
size limits or security issues of delivering a full sized file. It also provide backup of files. So, information never
disappears by getting lost of phones or computer crashing. For this reason this study compiled to guide the most popular
cloud storage services covering their strength, weakness, performance, present security retained etc.
Page | 111
Reza et al., International Journal of Advanced Research in Computer Science and Software Engineering 6(3),
March - 2016, pp. 111-115
Figure 2: Public, Private, hybrid cloud storage including shared data and data management
III. COMPARATIVE ANALYSIS ON CLOUD STORAGES FOLLOWING DIFFERENT DIMENSIONS
Now-a-days digital preservation [2] using cloud storage is an important factor for personal affairs as well as
organizational purposes. For a seeker who need to know about details on cloud services like business plan or personal use
the table has been sketched briefly but providing a lot of potential information for them . Among the storage a few are
providing editing capability in their respective server (box, Google drive etc).
Provider
Carbonite
IDrive
Crashplan
SOS
Google
Drive
MEGA
Dropbox
Onedrive
Backblaze
OpenDrive
Mozy
Phone
Support
Yes
Yes
Yes
Yes
Yes
No
Yes
No
No
No
Yes
Page | 112
Reza et al., International Journal of Advanced Research in Computer Science and Software Engineering 6(3),
March - 2016, pp. 111-115
Analitycal diagram
of free storage, upload & download speed
Storage(GB)
Download Speed(Mbps)
100
100
94.2
68.4
62
50
28
31
31.2
30
15
5
8.1
Idrive
7.6
7.2
2
MEGA
Dropbox
12
6.1
Google
drive
Deggo
108.2
Box
12
10
12
33.57
pcloud
Cloudme
Surdoc
Figure: Performance analysis using speed (download and upload) and free storage
V. CURRENTLY PROVIDED SECURITY ISSUES
Encryption can be made at different layers. Users can nominate full disk encryption, virtual disk encryption or
folder/file level encryption. Service provider must ensure these conveniences for fortification against data theft due to
multitenancy [10].Google provides a variety of cloud services like Google Cloud storage, Google Cloud SQL, Google
drive etc. Google employs different security actions like x509 certificates for applications verification and for accessing
production environment. Googles employee work according to their unique user id, follow Googles password strategy.
Google uses two factor authentication technique based on certificates and one time password generator in order to keep
their supervision interface secure. Google presides over automated /manual scanning of malware, network traffic
monitoring for botnet attacks, uses endorsed services and protocols, network firewall, routing all outdoor packets to
federal server etc for the infrastructure security. Google copies data at multiple organically scattered data centers for
ensuring data availability [11].AWS controls the substantial component of their service. Every resource that controlled
by the clients includes encryption, identity and access management. So client is the real owner of data. Security process
exists for multi tenancy issues[12].AWS provides HMAC ,TLS and RSA-1024 bit algorithms for further security but
these algorithms does not guarantees its user privacy and integrity of data[13].In [14] authors have laid the need for new
kind of encryption schemes e.g. proof of storage, searchable encryption scheme. Currently two variants of searchable
encryption schemes have been developed. They are asymmetric and symmetric. Another encryption scheme of great use
is identity based encryption schemes which can be used to enhance the privacy ensuring search [15]. In [16] authors have
suggested the use of secure cryptographic processor. They have also designed protocols for ensuring privacy in the cloud
based system. Trusted computing facility can help us in alleviating most of the problems of cloud .In [17] authors have
proposed new scheme based on identity based encryption and attribute based encryption which provides fine grained
access control over the data and full delegation. The following are the security steps taken by the storage provider. This
table is a sample.
Provider
Encrypted
Encrypted
Personal
Two factor
Storage
Transfer
Encryption
Authentication
Carbonite
IDrive
Crashplan
SOS
Google Drive
Page | 113
Reza et al., International Journal of Advanced Research in Computer Science and Software Engineering 6(3),
March - 2016, pp. 111-115
MEGA
Dropbox
Onedrive
Backblaze
OpenDrive
Mozy
Page | 114
[12]
[13]
[14]
[15]
[16]
[17]
[18]
[19]
[20]
[21]
Reza et al., International Journal of Advanced Research in Computer Science and Software Engineering 6(3),
March - 2016, pp. 111-115
http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.172.2239\npapers2://publication/uuid/4E97C55-56664DAC-A25A-284BFB651A56.
Amazon
Web
Services:Risk
andCompliance.November2013.URL:https://media.amazonwebservices.com/AWS_Risk_and_Compliance_W
hitepaper.pdf
K.Seny,L.Kristin.Cryptogrphic
Cloud
Storage.Available
at:http://research.microsoft.com/en
us/people/klauter/cryptostoragerlcps.pdf
Boneh, D. & Franklin, M. Identity-Based Encryption from the Weil Pairing. SIAM Journal on
Computing, 32(3), p.586-615.2003.
Itani, W., Kayssi, A. & Chehab, A. Privacy as a service: Privacy-aware data storage and processing in
cloud computing architectures. In 8th IEEE International Symposium on Dependable, Autonomic and
Secure Computing, DASC 2009. pp. 711-716.
Wang, G., & Liu, Q.Hierarchical Attribute-Based Encryption for Fine-Grained Access Control in Cloud
Storage
Services.
Control,
735-737.2010.ACM
Press.
Retrieved
from
http://portal.acm.org/citation.cfm?id=1866307.1866414
Online- backup- services review.toptenviews.com Time:3.39PM, Date: 09/03/2016.
http://www.ijarcsse.com/docs/papers/Volume_5/6_June2015/V5I6-0319.pdf
B.Nisbet, L.Dubois.The Benefits of Cloud Based Backup: Addressing Business continuity as a distributed
workforce September,2011,Available at
D.Csaplar The proven benefits of cloud based Baking-up : Data to the cloud. Available at:
http://research.aberdeen.com/1/ebook/proven_Benefits_of_Baking _up_Data-to-the_Cloud.pdf
http://www.tomsitpro.com/tags/cloud-storage+storage/ Honest, Proc. 11th USENIX Workshop on Hot Topics
in
Operating
Systems
(HOTOS
07),
pp.16,
200
https://mozy.co.uk/system/resources/w1sZilsIjIwMTMvmTIvMTIvMTVVfNDhfMzlfMTBfsuRDXOj1c21uZX
NzXONvbnRpbnVpdH1fVus ucGrmi1d/IDC Business Continuity UK.pdf
Page | 115