An Analysis of Data Security and Privacy for Cloud Computing
Author : Akella SubhadraVolume 9 No.1 January-June 2020 pp 27-39
Abstract
Cloud Computing is the important buzzword in the today’s world of computer. Cloud is global platform that allows digital information to be stored and distributed at very less cost and very fast to use. In these days since the data is very big in size many users are interested to store their valuable data in the cloud .The application software and databases in cloud computing are moved to the centralized large data centers, where the management of the data and services may not be fully trustworthy. Cloud Computing is scalable, fast, flexible, and cost-effective technology platform for IT enabled services over the internet. There are various advantages of cloud computing but ultimately cloud service users have to put their data over the cloud i.e., third party servers which are not directly controlled by the data owner Data security has consistently been a major issue in information technology In cloud computing in users perspective mainly in government ,industry and business Data security and ivacy protection issues are relevant to both hardware and software in the cloud architecture. Cloud security is becoming a key differentiator and competitive edge between cloud providers. In spite of various benefits that are provided by the cloud computing services, cloud computing service users are very much afraid about the security of their data .So this paper focuses on various issues regarding cloud computing, data security and how cloud provides data integrity, confidentiality, availability over user’s data? How data stored over cloud storage servers will be protected from attackers? Risk management of data present on the Cloud is another challenge. There is a requirement to identify the risks an organization would be taking while hosting data and services on the Cloud. In this paper, we present those issues that are preventing people from adopting the cloud and to minimize risks of these issues.
Keywords
Cloud Computing, Integrity, Confidentiality, Availability.
References
- Data integrity in cloud computing security, Article in Journal of Theoretical and Applied science
- Data Integrity in Cloud Computing Security, Journal of Theoretical and Applied Information Technology, 31st December 2013. Vol. 58 No.3, Int 2 Brian O. and others, Cloud Computing, authors: 2012-11- 06, page 6, publish Swiss.
- All info about cloud news article Components of Cloud Computing, By Cloud Storage February 14, 2019
- Data integrity in cloud computing security, Article in research gate, Journal of Theoretical and Applied Information Technology 58, No.3, pp.570, December 2013
- Cloud Security: Apponix Technologies,scribd,Cloud Security: Apponix Technologies | Cloud Computing | Public Key
- IT Blog: Top 10 Could Computing Threats
- International Journal of Research in Science and Technology (IJRST) 2013, Vol. 2, No. 5, Apr-June, Data Security modal for cloud computing
- Exploring Data Security Issues and Solutions in Cloud Computing, Article in research gate, Procedia Computer Science, January 2018.
- Enterprise storage, Cloud Storage Security Standards and Best Practices, By Samuel Greengard, Posted December 5, 2018
- Data Security, Privacy, Availability and Integrity in Cloud Computing: Issues and Current Solutions (IJACSA) International Journal of Advanced Computer Science and Applications, Vol. 7, No. 4, 2016
- Erway, A. Kupc¸¨ u, C. Papamanthou, and R. Tamassia, “Dynamic provable data possession,” in Proceedings of the 16th ACM conference on Computer and communications security. Acm, 2009, pp. 213–222.
- Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, and D. Song, “Provable data possession at untrusted stores,” in Proceedings of the 14th ACM conference on Computer and communications security. Acm, 2007, pp. 598–609.
- Ateniese, R. Di Pietro, L. V. Mancini, and G. Tsudik, “Scalable and efficient provable data possession,” in Proceedings of the 4th international conference on Security and privacy in communication netowrks. ACM, 2008, p. 9.
- Yang and X. Jia, “An efficient and secure dynamic auditing protocol for data storage in cloud computing,” Parallel and Distributed Systems, IEEE Transactions on, Vol. 24, No. 9, pp. 1717–1726, 2013.
- Wang, C. Wang, K. Ren, W. Lou, and J. Li, “Enabling public auditability and data dynamics for storage security in cloud computing,” Parallel and Distributed Systems, IEEE Transactions on, Vol. 22, No. 5, pp. 847–859, 2011.
- Wang, Q. Wang, K. Ren, N. Cao, and W. Lou, “Toward secure and dependable storage services in cloud computing,” Services Computing, IEEE Transactions on, Vol. 5, No. 2, pp. 220–232, 2012.
- Wang, S. Chow, Q. Wang, K. Ren, and W. Lou, “Privacy-preserving public auditing for secure cloud storage,” Computers, IEEE Transactions on, Vol. 62, No. 2, pp. 362–375, Feb 2013.
- Balusamy, P. Venkatakrishna, A. Vaidhyanathan, M. Ravikumar, and N. Devi Munisamy, “Enhanced security framework for data integrity using third-party auditing in the cloud system,” in Artificial Intelligence and Evolutionary Algorithms in Engineering Systems, ser. Advances in Intelligent Systems and Computing. Springer India, 2015, Vol. 325, pp. 25–31.
- Ateniese, R. Burns, R. Curtmola, J. Herring, O. Khan, L. Kissner,Z. Peterson, and D. Song, “Remote data checking using provable data possession,” ACM Trans. Inf. Syst. Secur., Vol. 14, No. 1, pp. 12:1–12:34,Jun. 2011.
- Sookhak, A. Gani, M. K. Khan, and R. Buyya, “Dynamic remote data auditing for securing big data storage in cloud computing,” Information Sciences, 2015.
- Juels and B. S. Kaliski Jr, “Pors: Proofs of retrievability for large files,” in Proceedings of the 14th ACM conference on Computer and communications security. Acm, 2007, pp. 584–597.
- Halevi, D. Harnik, B. Pinkas, and A. Shulman-Peleg, “Proofs of ownership in remote storage systems,” in Proceedings of the 18th ACM conference on Computer and communications security. ACM, 2011, pp. 491–500.
- Kaaniche and M. Laurent, “A secure client-side deduplication scheme in cloud storage environments,” in New Technologies, Mobility and Security (NTMS), 2014 6th International Conference on, March 2014, pp. 1–7.
- S. Al-Anzi, A. A. Salman, N. K. Jacob, and J. Soni, “Towards robust, scalable and secure network storage in cloud computing,” in Digital Information and Communication Technology and it’s Applications (DICTAP), 2014 Fourth International Conference on. IEEE, 2014, pp. 51–55.
- D. Bowers, A. Juels, and A. Oprea, “Hail: a high-availability and integrity layer for cloud storage,” in Proceedings of the 16th ACM conference on Computer and communications security. ACM, 2009, pp. 187–198.
- Bessani, M. Correia, B. Quaresma, F. Andre, and P. Sousa, “Depsky: ´dependable and secure storage in a cloud-of-clouds,” ACM Transactions on Storage (TOS), Vol. 9, No. 4, p. 12, 2013.
- Chen, X. Li, L. Wang, S. Khan, J. Wang, K. Zeng, and C. Cai, “Fast and scalable multi-way analysis of massive neural data,” IEEE Trans. Comput, Vol. 63, 2014.
- N. Khan, M. M. Kiah, S. A. Madani, M. Ali, S. Shamshirband et al., “Incremental proxy re-encryption scheme for mobile cloud computing environment,” The Journal of Supercomputing, Vol. 68, No. 2, pp. 624–651,2014.
- S. Kumari, P. Venkateswarlu, and M. Afzal, “A key aggregate framework with adaptable offering of information in cloud,” International Journal of Research, Vol. 2, No. 3, pp. 5–10, 2015.
- -K. Chu, S. S. Chow, W.-G. Tzeng, J. Zhou, and R. H. Deng, “Key-aggregate cryptosystem for scalable data sharing in cloud storage,” Parallel and Distributed Systems, IEEE Transactions on, Vol. 25, No. 2, pp. 468–477, 2014.
- A. Sana Belguith, AbderrazakJemai, “Enhancing data security in cloud computing using a lightweight cryptographic algorithm,” ICAS 2015.
- Shamir, “Identity-based cryptosystems and signature schemes,” in Advances in cryptology. Springer, 1985, pp. 47–53.
- Sahai and B. Waters, “Fuzzy identity-based encryption,” in Advances in Cryptology–EUROCRYPT 2005. Springer, 2005, pp. 457–473.