Table 1 Comparative summary of related cloud storage security and privacy Models.
From: Enhanced secure storage and data privacy management system for big data based on multilayer model
Study | Encryption Method | Data Partitioning | Privacy Technique | Integrity Verification | Distributed Storage | Performance Evaluated |
|---|---|---|---|---|---|---|
Seth et al.14 | Dual AES | ✗ | ✗ | ✗ | ✓ | ✗ |
Prabhu et al.15 | ECC + Access Control | ✗ | ✗ | Digital Signatures | ✗ | ✗ |
Bhansali et al.16 | CP-ABE | ✗ | ✗ | Hashing | ✗ | ✗ |
Ramachandra et al.17 | TDES | ✗ | ✗ | ✗ | ✗ | ✓ |
Zhao and Wang19 | Leakage-Resilient Encryption | ✗ | ✗ | ✗ | ✗ | ✓ |
Sindhe et al.20 | ✗ | ✓ | ✗ | ✗ | ✓ | ✗ |
Shao et al.22 | ✗ | ✓ | Pk-Anonymization | ✗ | ✓ | ✓ |
Cheng et al.23 | ✗ | ✓ | ✗ | ✗ | ✓ | ✗ |
Zhang et al.25 | IDA + Compression | ✓ | ✗ | ✗ | ✓ | ✓ |
Tian et al.26 | XOR + Backup | ✓ | ✗ | ✗ | ✓ | ✓ |
Proposed Model | ChaCha20 | ✓ (DSDP) | ✓ (k-Anonymization) | ✓ (SHA-512) | ✓ (Cauchy dispersion) | ✓ (MIMIC-III, latency, CPU, throughput) |