An Analysis of Data Security and Privacy for Cloud Computing
DOI:
https://doi.org/10.51983/ajcst-2020.9.1.2153Keywords:
Cloud Computing, Integrity, Confidentiality, AvailabilityAbstract
Cloud Computing is the important buzzword in the today’s world of computer. Cloud is global platform that allows digital information to be stored and distributed at very less cost and very fast to use. In these days since the data is very big in size many users are interested to store their valuable data in the cloud .The application software and databases in cloud computing are moved to the centralized large data centers, where the management of the data and services may not be fully trustworthy. Cloud Computing is scalable, fast, flexible, and cost-effective technology platform for IT enabled services over the internet. There are various advantages of cloud computing but ultimately cloud service users have to put their data over the cloud i.e., third party servers which are not directly controlled by the data owner Data security has consistently been a major issue in information technology In cloud computing in users perspective mainly in government ,industry and business Data security and ivacy protection issues are relevant to both hardware and software in the cloud architecture. Cloud security is becoming a key differentiator and competitive edge between cloud providers. In spite of various benefits that are provided by the cloud computing services, cloud computing service users are very much afraid about the security of their data .So this paper focuses on various issues regarding cloud computing, data security and how cloud provides data integrity, confidentiality, availability over user’s data? How data stored over cloud storage servers will be protected from attackers? Risk management of data present on the Cloud is another challenge. There is a requirement to identify the risks an organization would be taking while hosting data and services on the Cloud. In this paper, we present those issues that are preventing people from adopting the cloud and to minimize risks of these issues.
References
Author(s), "Data integrity in cloud computing security," Journal of Theoretical and Applied Science.
B. O. and others, "Data Integrity in Cloud Computing Security," Journal of Theoretical and Applied Information Technology, vol. 58, no. 3, int. 2, pp. 6, Nov. 2012.
Author(s), "All info about cloud news article Components of Cloud Computing," Cloud Storage, Feb. 14, 2019.
Author(s), "Data integrity in cloud computing security," Journal of Theoretical and Applied Information Technology, vol. 58, no. 3, pp. 570, Dec. 2013. Available: Research Gate.
Apponix Technologies, "Cloud Security: Apponix Technologies," scribd, [Online]. Available: Apponix Technologies | Cloud Computing | Public Key.
Author(s), "IT Blog: Top 10 Cloud Computing Threats."
Author(s), "Data Security modal for cloud computing," International Journal of Research in Science and Technology (IJRST), vol. 2, no. 5, Apr.-June 2013.
Author(s), "Exploring Data Security Issues and Solutions in Cloud Computing," Procedia Computer Science, Jan. 2018. Available: Research Gate.
S. Greengard, "Enterprise storage, Cloud Storage Security Standards and Best Practices," Dec. 5, 2018.
Author(s), "Data Security, Privacy, Availability and Integrity in Cloud Computing: Issues and Current Solutions," International Journal of Advanced Computer Science and Applications (IJACSA), vol. 7, no. 4, 2016.
C. Erway et al., "Dynamic provable data possession," in Proceedings of the 16th ACM conference on Computer and communications security, 2009, pp. 213–222.
G. Ateniese et al., "Provable data possession at untrusted stores," in Proceedings of the 14th ACM conference on Computer and communications security, 2007, pp. 598–609.
G. Ateniese et al., "Scalable and efficient provable data possession," in Proceedings of the 4th international conference on Security and privacy in communication networks, 2008, p. 9.
K. Yang and X. Jia, "An efficient and secure dynamic auditing protocol for data storage in cloud computing," IEEE Transactions on Parallel and Distributed Systems, vol. 24, no. 9, pp. 1717–1726, 2013.
Q. Wang et al., "Enabling public auditability and data dynamics for storage security in cloud computing," IEEE Transactions on Parallel and Distributed Systems, vol. 22, no. 5, pp. 847–859, 2011.
C. Wang et al., "Toward secure and dependable storage services in cloud computing," IEEE Transactions on Services Computing, vol. 5, no. 2, pp. 220–232, 2012.
C. Wang et al., "Privacy-preserving public auditing for secure cloud storage," IEEE Transactions on Computers, vol. 62, no. 2, pp. 362–375, Feb. 2013.
B. Balusamy et al., "Enhanced security framework for data integrity using third-party auditing in the cloud system," in Artificial Intelligence and Evolutionary Algorithms in Engineering Systems, ser. Advances in Intelligent Systems and Computing. Springer India, 2015, vol. 325, pp. 25–31.
G. Ateniese et al., "Remote data checking using provable data possession," ACM Transactions on Information and Systems Security (TISSEC), vol. 14, no. 1, pp. 12:1–12:34, Jun. 2011.
M. Sookhak et al., "Dynamic remote data auditing for securing big data storage in cloud computing," Information Sciences, 2015.
A. Juels and B. S. Kaliski Jr., "Pors: Proofs of retrievability for large files," in Proceedings of the 14th ACM conference on Computer and communications security, 2007, pp. 584–597.
S. Halevi et al., "Proofs of ownership in remote storage systems," in Proceedings of the 18th ACM conference on Computer and communications security, 2011, pp. 491–500.
N. Kaaniche and M. Laurent, "A secure client-side deduplication scheme in cloud storage environments," in New Technologies, Mobility and Security (NTMS), 2014 6th International Conference on, March 2014, pp. 1–7.
F. S. Al-Anzi et al., "Towards robust, scalable and secure network storage in cloud computing," in Digital Information and Communication Technology and it’s Applications (DICTAP), 2014 Fourth International Conference on. IEEE, 2014, pp. 51–55.
K. D. Bowers et al., "Hail: a high-availability and integrity layer for cloud storage," in Proceedings of the 16th ACM conference on Computer and communications security, 2009, pp. 187–198.
A. Bessani et al., "Depsky: Dependable and secure storage in a cloud-of-clouds," ACM Transactions on Storage (TOS), vol. 9, no. 4, p. 12, 2013.
D. Chen et al., "Fast and scalable multi-way analysis of massive neural data," IEEE Transactions on Computers, vol. 63, 2014.
A. N. Khan et al., "Incremental proxy re-encryption scheme for mobile cloud computing environment," The Journal of Supercomputing, vol. 68, no. 2, pp. 624–651, 2014.
P. S. Kumari et al., "A key aggregate framework with adaptable offering of information in cloud," International Journal of Research, vol. 2, no. 3, pp. 5–10, 2015.
C.-K. Chu et al., "Key-aggregate cryptosystem for scalable data sharing in cloud storage," IEEE Transactions on Parallel and Distributed Systems, vol. 25, no. 2, pp. 468–477, 2014.
R. A. Sana Belguith, "Enhancing data security in cloud computing using a lightweight cryptographic algorithm," ICAS 2015.
A. Shamir, "Identity-based cryptosystems and signature schemes," in Advances in cryptology. Springer, 1985, pp. 47–53.
A. Sahai and B. Waters, "Fuzzy identity-based encryption," in Advances in Cryptology–EUROCRYPT 2005. Springer, 2005, pp. 457–473.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2020 The Research Publication
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.