You are on page 1of 5

Volume 6, Issue 3, March 2016

ISSN: 2277 128X

International Journal of Advanced Research in
Computer Science and Software Engineering
Research Paper
Available online at: www.ijarcsse.com

Simple But Comprehensive Study on Cloud Storage
1

1

Md. Tuhin Reza*, 2Md. Aktar Faruqe Billal, 3Md. Alam Hossain
Computer Science &Engineering, Jessore University of Engineering & Technology, Bangladesh
2
Computer Science &Engineering, JUST, Bangladesh
3
Assistant Professor, Computer Science &Engineering, JUST, Bangladesh

Abstract— Cloud storage is a super influential and flexible service model in which data is conserved, patronized,
backed up by a large group of server over the internet. It is fruitful for both private user and enterprise. Different
cloud storage providers have evolved during recent years providing various services and features. However, the
current cloud offers is not always satisfied with user’s requirements and due to diversity, it is tough to select a storage
platform. For instance, some storage providers do not guarantee sufficient resource flexibility and high availability.
In this work, we guide and commentate a survey on current Cloud Storage and technologies in order to assist users
(1) choosing the better cloud offer that suits with their demands or (2) different services provided by the recent Cloud
Storage. (3)Recent user’s trends that need to develop for cloud services like Dropbox, Copy etc. Based on the
comparative study conclusion has been drawn and development way has been highlighted.
Keywords— Cloud storage; Comparison on different dimensions; Performance analysis; recent security;
I. INTRODUCTION
Cloud Storage is a kind of Internet-based computing, where shared resources, data and information are provided to
computers and other devices on-demand. It is a combination of hardware and software resources managed by the third
party services to provide access to advanced software applications and high–end networks of server computers and to
describe a variety of computing concepts [1]. Cloud storage means storing data centralized in any online medium. So that
the same data can be used by multiple users. In this system data may be stored in the cloud, software and service, provide
broad network access on the cloud. Storing files in the cloud has many merits. A user or organisation can check the
documents from any phone, tablet, or computer that connected to the internet. It also allows the user download and play
media file and user can share a secure link to a file to one’s friends, family, or worker rather than dealing with e-mail file
size limits or security issues of delivering a full sized file. It also provide backup of files. So, information never
disappears by getting lost of phones or computer crashing. For this reason this study compiled to guide the most popular
cloud storage services covering their strength, weakness, performance, present security retained etc.

Figure 1: A model of Cloud Computing and cloud storage model
II. TYPES OF CLOUD STORAGE [3][4][5]
There are three primary categories of cloud storage such as private, public and hybrid cloud storage infrastructure. [6]
In public storage application and storage are available for general use over the internet. Here, the computing storage is
provided by the vendor and a user has no visibility and control over the storage. Users only pay for the CPU cycles,
storage or bandwidth they consume. Leading public cloud providers are Amazon Web Services (AWS), IBM/SoftLayer
Google Compute Engine and Microsoft Azure. Due to cost divide public cloud customers are benefited from economic of
scale. Public cloud storage and infrastructure are dedicated to particular organization.
Finally, Hybrid storage is a mixed deployment procedure comprising both private and public storage infrastructure
© 2016, IJARCSSE All Rights Reserved

Page | 111

Reza et al., International Journal of Advanced Research in Computer Science and Software Engineering 6(3),
March - 2016, pp. 111-115

Figure 2: Public, Private, hybrid cloud storage including shared data and data management
III. COMPARATIVE ANALYSIS ON CLOUD STORAGES FOLLOWING DIFFERENT DIMENSIONS
Now-a-days digital preservation [2] using cloud storage is an important factor for personal affairs as well as
organizational purposes. For a seeker who need to know about details on cloud services like business plan or personal use
the table has been sketched briefly but providing a lot of potential information for them . Among the storage a few are
providing editing capability in their respective server (box, Google drive etc).

Provider

Carbonite
IDrive

Crashplan
SOS
Google
Drive
MEGA
Dropbox

Onedrive
Backblaze
OpenDrive
Mozy

Table 1: A summary of comparative services provided by storage providers [7][8][9]
Maximum Free
Monthly Upload Down
Keep
Public
24/7 Mobile
storageonline price(it
Speed
Load
Deleted file
Supp Apps
space
storag may
(Mbps) Speed
File
sharing ort
e
vary for
Max
(Mbps)
different
Max
plans)
Unlimited No
3.1
4.7
30 days Yes
No
Android,
iOS
10TB
5GB
$4.96
7.5
21
Forever Yes
Yes
Android,
iOS,
Windows
Phone
Unlimited No
$5.99
8.1
28
Forever No
No
Android,
iOS
Unlimited No
$7.99
11.14
40
Forever Yes
Yes
Android,
max
iOS
100GB
15GB $1.99
6.1ma
68.4
Forever Yes
Yes
Android,
x
iOS
500GB
50GB $13.50
7.2
31
30 days No
No
Android,
iOS
1TB
2GB
$9.99
7.6
30
30 days Yes
No
Android,
iOS,
Windows
,
Blackberr
y
100GB
5GB
$1.99
4.9
56.1
1 year
Yes
Yes
Android,
iOS
Unlimited NO
$5.00
7.2
31.00
30 days No
No
Android,
iOS
Unlimited 5GB
$12.95
7.3
10.9
90 days Yes
No
Android,
iOS
125GB
No
$5.99
4.2
12.34
30 days No
Yes
Android,
iOS

Phone
Support

Yes
Yes

Yes
Yes
Yes
No
Yes

No
No
No
Yes

IV. PERFORMANCE MEASUREMENT
This figure is analysing three factors using a graph including free storage, upload and download speed .For example,
by following this a user may search which product is providing the highest free storage like deggo(100GB free) and
surdog(100GB) free.
© 2016, IJARCSSE All Rights Reserved

Page | 112

Reza et al., International Journal of Advanced Research in Computer Science and Software Engineering 6(3),
March - 2016, pp. 111-115
Analitycal diagram
of free storage, upload & download speed

Storage(GB)

Upload Speed Max(Mbps)

Download Speed(Mbps)

100

100
94.2

68.4
62
50

28

31

31.2

30

15
5

8.1

Idrive

7.6

7.2

2
MEGA

Dropbox

12

6.1

Google
drive

Deggo

108.2

Box

12

10

12

3

33.57

4

pcloud

Cloudme

Surdoc

Figure: Performance analysis using speed (download and upload) and free storage
V. CURRENTLY PROVIDED SECURITY ISSUES
Encryption can be made at different layers. Users can nominate full disk encryption, virtual disk encryption or
folder/file level encryption. Service provider must ensure these conveniences for fortification against data theft due to
multitenancy [10].Google provides a variety of cloud services like Google Cloud storage, Google Cloud SQL, Google
drive etc. Google employs different security actions like x509 certificates for application’s verification and for accessing
production environment. Google’s employee work according to their unique user id, follow Google’s password strategy.
Google uses two factor authentication technique based on certificates and one time password generator in order to keep
their supervision interface secure. Google presides over automated /manual scanning of malware, network traffic
monitoring for botnet attacks, uses endorsed services and protocols, network firewall, routing all outdoor packets to
federal server etc for the infrastructure security. Google copies data at multiple organically scattered data centers for
ensuring data availability [11].AWS controls the substantial component of their service. Every resource that controlled
by the clients includes encryption, identity and access management. So client is the real owner of data. Security process
exists for multi tenancy issues[12].AWS provides HMAC ,TLS and RSA-1024 bit algorithms for further security but
these algorithms does not guarantees its user privacy and integrity of data[13].In [14] authors have laid the need for new
kind of encryption schemes e.g. proof of storage, searchable encryption scheme. Currently two variants of searchable
encryption schemes have been developed. They are asymmetric and symmetric. Another encryption scheme of great use
is identity based encryption schemes which can be used to enhance the privacy ensuring search [15]. In [16] authors have
suggested the use of secure cryptographic processor. They have also designed protocols for ensuring privacy in the cloud
based system. Trusted computing facility can help us in alleviating most of the problems of cloud .In [17] authors have
proposed new scheme based on identity based encryption and attribute based encryption which provides fine grained
access control over the data and full delegation. The following are the security steps taken by the storage provider. This
table is a sample.
Provider
Encrypted
Encrypted
Personal
Two factor
Storage
Transfer
Encryption
Authentication
Carbonite



×
IDrive



×
Crashplan




SOS



×
Google Drive


×

© 2016, IJARCSSE All Rights Reserved

Page | 113

Reza et al., International Journal of Advanced Research in Computer Science and Software Engineering 6(3),
March - 2016, pp. 111-115
MEGA




Dropbox


×

Onedrive

×

Backblaze




OpenDrive



×
Mozy



×
Figure: Recent security of existing cloud storage [18]
VI. COMPARISON OF TYPICAL STORAGE AND CLOUD BASED STORAGE[19][20][21]
Aspect
Cloud Based Storage
Typical Storage
Distributed
Cloud based Storage is distributed among the
Across the globe traditional storage is
Workforce
user’s of geographically dispersed locations.
managed and manipulated by owner.
Operational
It curtails the necessity of IT staffs and
Failure against troubleshooting,
Cost
maintenance expenditures.
capacity enhancement, performance has
to be controlled by the user.
Disaster
During disaster CSP handles the responsibility Handling disaster challenges is
Recovery
of data recovery.
performed by user.
Data Growth
According to demand user can scale up or
Owner is bound to fit the data into
down the quantity of storage
existing infrastructure or purchase new
storage device.
Power
It consumes less power
Power consumption magnifies with the
Consumption
growth in data volume
VII. RECENT TRENDS
With rising anxiety due to sudden increase of data, bigger extending of flash and hybrid arrays, and more private,
public and hybrid cloud storage opportunities than ever before, enterprise storage is seeing plenty of innovation, like crux
security and thin provisioning, into their systems. Storage virtualization is also arising as a key area of innovation for
vendors such that storage may provide better archiving, backup and recovery management. Many are biasing on
converged storage solutions that mix compute and storage to optimize application standard and cut the storage footprint.
[22]
VIII. CONCLUSIONS
Innovation on cloud storages is going on a full speed. This paper presents the features of different cloud storages and
their analysis. Under the study security and huge data handling on the cloud following a satisfactory method is the main
issue for business plans. Recent performance, portability, scalability, availability should be developed for tackling the
future challenges. So emphasis should be given on virtualization, security and super management of resources.
ACKNOWLEDGMENT
I would like to offer millions of heartfelt thanks to Almighty who has given the strength and energy to complete this
paper. I would also like to express the deepest appreciation to Md. Alarm Hossain, Assistant Professor Department of
CSE, JUST, Jessore without whom this paper would have not been possible.
REFERENCES
[1]
https://en.wikipedia.org/wiki/Cloud_computing
[2]
Guidance on Cloud Storage and Digital Preservations , Prepared by Charles Beagrie Ltd Authors: Neil Beagrie,
Andrew Charlesworth, and Paul Miller.
[3]
IOSR Journal of Computer Engineering (IOSRJCE) ISSN : 2278-0661 Volume 1, Issue 1 (May-June 2012), PP
38-45 www.iosrjournals.org
[4]
Analysis of Cloud Based Storage as a Services,Abhudy Tripathi,CS Department, PSTI, Kanpur, Uttar Prodesh,
India. Available at: ijarcsse.com
[5]
M.Lakshmi Neelima et al, International Journal of Computer Science and Mobile Computing, Vol.3 Issue.5,
May- 2014, pg. 966-971
[6]
https://www.researchgate.net/publication/258489864 a comparative study of major cloud service provider.
[7]
http://www.cnet.com/how-to/onedrive-dropbox-google-drive-and-box-which-cloud-storage-service-is-right-foryou/ Access time:3.26 pm , date:14/3/16.
[8]
www.backupre.view.com,
[9]
http://cloud-computing.softwareinsider.com/
[10]
K.Scarfone,M.Souppaya,M.Sexton.”Guide to Storage Encryption Technologies for End User Devices”. Special
Publication 800-111.NIST.November 2007.[22]”Google’s Approach to IT Security”.Avaialaible at
https://cloud.google.com/files/Google-CommonSecurity-WhitePaper v1.4.pdf.
[11]
Garfinkel, S.L.An evaluation of amazonʼs grid computing services: EC2, S3, and SQS.Center for, p.115.2007.Available
at:
© 2016, IJARCSSE All Rights Reserved

Page | 114

[12]

[13]
[14]
[15]

[16]

[17]
[18]
[19]
[20]
[21]

Reza et al., International Journal of Advanced Research in Computer Science and Software Engineering 6(3),
March - 2016, pp. 111-115
http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.172.2239\npapers2://publication/uuid/4E97C55-56664DAC-A25A-284BFB651A56.
”Amazon
Web
Services:Risk
andCompliance”.November2013.URL:https://media.amazonwebservices.com/AWS_Risk_and_Compliance_W
hitepaper.pdf
K.Seny,L.Kristin.Cryptogrphic
Cloud
Storage.Available
at:http://research.microsoft.com/en
us/people/klauter/cryptostoragerlcps.pdf
Boneh, D. & Franklin, M. Identity-Based Encryption from the Weil Pairing. SIAM Journal on
Computing, 32(3), p.586-615.2003.
Itani, W., Kayssi, A. & Chehab, A. “Privacy as a service: Privacy-aware data storage and processing in
cloud computing architectures”. In 8th IEEE International Symposium on Dependable, Autonomic and
Secure Computing, DASC 2009. pp. 711-716.
Wang, G., & Liu, Q.Hierarchical Attribute-Based Encryption for Fine-Grained Access Control in Cloud
Storage
Services.
Control,
735-737.2010.ACM
Press.
Retrieved
from
http://portal.acm.org/citation.cfm?id=1866307.1866414
Online- backup- services –review.toptenviews.com Time:3.39PM, Date: 09/03/2016.
http://www.ijarcsse.com/docs/papers/Volume_5/6_June2015/V5I6-0319.pdf
B.Nisbet, L.Dubois.”The Benefits of Cloud –Based Backup: Addressing Business continuity as a distributed
workforce” September,2011,Available at
D.Csaplar “ The proven benefits of cloud based Baking-up : Data to the cloud.” Available at:
http://research.aberdeen.com/1/ebook/proven_Benefits_of_Baking _up_Data-to-the_Cloud.pdf
http://www.tomsitpro.com/tags/cloud-storage+storage/ Honest,” Proc. 11th USENIX Workshop on Hot Topics
in
Operating
Systems
(HOTOS
’07),
pp.1–6,
200
https://mozy.co.uk/system/resources/w1sZilsIjIwMTMvmTIvMTIvMTVVfNDhfMzlfMTBfsuRDXOj1c21uZX
NzXONvbnRpbnVpdH1fVus ucGrmi1d/IDC Business Continuity UK.pdf

© 2016, IJARCSSE All Rights Reserved

Page | 115