• #0 (no title)
  • #0 (no title)
  • About
  • Facebook
  • Twitter
  • RSS
(As ISO 9001:2015 Certified Publications)
    • Quick Search
    • Advanced Search
  • Home
  • Editorial Policy
  • Author Guidelines
  • Submission
  • Copyright Form
  • Career
  • Contact us
  • Subscription

Back to Journal

Home»Articles»An Analysis of Data Security and Privacy for Cloud Computing

An Analysis of Data Security and Privacy for Cloud Computing

Author : Akella Subhadra
Volume 9 No.1 January-June 2020 pp 27-39

Abstract

Cloud Computing is the important buzzword in the today’s world of computer. Cloud is global platform that allows digital information to be stored and distributed at very less cost and very fast to use. In these days since the data is very big in size many users are interested to store their valuable data in the cloud .The application software and databases in cloud computing are moved to the centralized large data centers, where the management of the data and services may not be fully trustworthy. Cloud Computing is scalable, fast, flexible, and cost-effective technology platform for IT enabled services over the internet. There are various advantages of cloud computing but ultimately cloud service users have to put their data over the cloud i.e., third party servers which are not directly controlled by the data owner Data security has consistently been a major issue in information technology In cloud computing in users perspective mainly in government ,industry and business Data security and ivacy protection issues are relevant to both hardware and software in the cloud architecture. Cloud security is becoming a key differentiator and competitive edge between cloud providers. In spite of various benefits that are provided by the cloud computing services, cloud computing service users are very much afraid about the security of their data .So this paper focuses on various issues regarding cloud computing, data security and  how cloud provides data integrity, confidentiality, availability  over user’s data? How data stored over cloud storage servers will be protected from attackers?  Risk management of data present on the Cloud is another challenge. There is a requirement to identify the risks an organization would be taking while hosting data and services on the Cloud. In this paper, we present those issues that are preventing people from adopting the cloud and to minimize risks of these issues.

Keywords

Cloud Computing, Integrity, Confidentiality, Availability.

Full Text:

References

  1. Data integrity in cloud computing security, Article in Journal of Theoretical and Applied science
  2. Data Integrity in Cloud Computing Security, Journal of Theoretical and Applied Information Technology, 31st December 2013. Vol. 58 No.3, Int 2 Brian O. and others, Cloud Computing, authors: 2012-11- 06, page 6, publish Swiss.
  3. All info about cloud news article Components of Cloud Computing, By Cloud Storage February 14, 2019
  4. Data integrity in cloud computing security, Article in research gate, Journal of Theoretical and Applied Information Technology 58, No.3, pp.570, December 2013
  5. Cloud Security: Apponix Technologies,scribd,Cloud Security: Apponix Technologies | Cloud Computing | Public Key
  6. IT Blog: Top 10 Could Computing Threats
  7. International Journal of Research in Science and Technology (IJRST) 2013, Vol. 2, No. 5, Apr-June, Data Security modal for cloud computing
  8. Exploring Data Security Issues and Solutions in Cloud Computing, Article in research gate, Procedia Computer Science, January 2018.
  9. Enterprise storage, Cloud Storage Security Standards and Best Practices, By Samuel Greengard, Posted December 5, 2018
  10. Data Security, Privacy, Availability and Integrity in Cloud Computing: Issues and Current Solutions (IJACSA) International Journal of Advanced Computer Science and Applications, Vol. 7, No. 4, 2016
  11. Erway, A. Kupc¸¨ u, C. Papamanthou, and R. Tamassia, “Dynamic provable data possession,” in Proceedings of the 16th ACM conference on Computer and communications security. Acm, 2009, pp. 213–222.
  12. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, and D. Song, “Provable data possession at untrusted stores,” in Proceedings of the 14th ACM conference on Computer and communications security. Acm, 2007, pp. 598–609.
  13. Ateniese, R. Di Pietro, L. V. Mancini, and G. Tsudik, “Scalable and efficient provable data possession,” in Proceedings of the 4th international conference on Security and privacy in communication netowrks. ACM, 2008, p. 9.
  14. Yang and X. Jia, “An efficient and secure dynamic auditing protocol for data storage in cloud computing,” Parallel and Distributed Systems, IEEE Transactions on, Vol. 24, No. 9, pp. 1717–1726, 2013.
  15. Wang, C. Wang, K. Ren, W. Lou, and J. Li, “Enabling public auditability and data dynamics for storage security in cloud computing,” Parallel and Distributed Systems, IEEE Transactions on, Vol. 22, No. 5, pp. 847–859, 2011.
  16. Wang, Q. Wang, K. Ren, N. Cao, and W. Lou, “Toward secure and dependable storage services in cloud computing,” Services Computing, IEEE Transactions on, Vol. 5, No. 2, pp. 220–232, 2012.
  17. Wang, S. Chow, Q. Wang, K. Ren, and W. Lou, “Privacy-preserving public auditing for secure cloud storage,” Computers, IEEE Transactions on, Vol. 62, No. 2, pp. 362–375, Feb 2013.
  18. Balusamy, P. Venkatakrishna, A. Vaidhyanathan, M. Ravikumar, and N. Devi Munisamy, “Enhanced security framework for data integrity using third-party auditing in the cloud system,” in Artificial Intelligence and Evolutionary Algorithms in Engineering Systems, ser. Advances in Intelligent Systems and Computing. Springer India, 2015, Vol. 325, pp. 25–31.
  19. Ateniese, R. Burns, R. Curtmola, J. Herring, O. Khan, L. Kissner,Z. Peterson, and D. Song, “Remote data checking using provable data possession,” ACM Trans. Inf. Syst. Secur., Vol. 14, No. 1, pp. 12:1–12:34,Jun. 2011.
  20. Sookhak, A. Gani, M. K. Khan, and R. Buyya, “Dynamic remote data auditing for securing big data storage in cloud computing,” Information Sciences, 2015.
  21. Juels and B. S. Kaliski Jr, “Pors: Proofs of retrievability for large files,” in Proceedings of the 14th ACM conference on Computer and communications security. Acm, 2007, pp. 584–597.
  22. Halevi, D. Harnik, B. Pinkas, and A. Shulman-Peleg, “Proofs of ownership in remote storage systems,” in Proceedings of the 18th ACM conference on Computer and communications security. ACM, 2011, pp. 491–500.
  23. Kaaniche and M. Laurent, “A secure client-side deduplication scheme in cloud storage environments,” in New Technologies, Mobility and Security (NTMS), 2014 6th International Conference on, March 2014, pp. 1–7.
  24. S. Al-Anzi, A. A. Salman, N. K. Jacob, and J. Soni, “Towards robust, scalable and secure network storage in cloud computing,” in Digital Information and Communication Technology and it’s Applications (DICTAP), 2014 Fourth International Conference on. IEEE, 2014, pp. 51–55.
  25. D. Bowers, A. Juels, and A. Oprea, “Hail: a high-availability and integrity layer for cloud storage,” in Proceedings of the 16th ACM conference on Computer and communications security. ACM, 2009, pp. 187–198.
  26. Bessani, M. Correia, B. Quaresma, F. Andre, and P. Sousa, “Depsky: ´dependable and secure storage in a cloud-of-clouds,” ACM Transactions on Storage (TOS), Vol. 9, No. 4, p. 12, 2013.
  27. Chen, X. Li, L. Wang, S. Khan, J. Wang, K. Zeng, and C. Cai, “Fast and scalable multi-way analysis of massive neural data,” IEEE Trans. Comput, Vol. 63, 2014.
  28. N. Khan, M. M. Kiah, S. A. Madani, M. Ali, S. Shamshirband et al., “Incremental proxy re-encryption scheme for mobile cloud computing environment,” The Journal of Supercomputing, Vol. 68, No. 2, pp. 624–651,2014.
  29. S. Kumari, P. Venkateswarlu, and M. Afzal, “A key aggregate framework with adaptable offering of information in cloud,” International Journal of Research, Vol. 2, No. 3, pp. 5–10, 2015.
  30. -K. Chu, S. S. Chow, W.-G. Tzeng, J. Zhou, and R. H. Deng, “Key-aggregate cryptosystem for scalable data sharing in cloud storage,” Parallel and Distributed Systems, IEEE Transactions on, Vol. 25, No. 2, pp. 468–477, 2014.
  31. A. Sana Belguith, AbderrazakJemai, “Enhancing data security in cloud computing using a lightweight cryptographic algorithm,” ICAS 2015.
  32. Shamir, “Identity-based cryptosystems and signature schemes,” in Advances in cryptology. Springer, 1985, pp. 47–53.
  33. Sahai and B. Waters, “Fuzzy identity-based encryption,” in Advances in Cryptology–EUROCRYPT 2005. Springer, 2005, pp. 457–473.

Asian Journal of Computer Science and Technology is a peer-reviewed international journal that publishes high-quality scientific articles (both theory and practice) and research papers covering all aspects of future computer and Information Technology areas. Topics include, but are not limited to:

Foundations of High-performance ComputingTheory of algorithms and computability

Parallel & distributed computing

Computer networks

Neural networks

LAN/WAN/MAN

Database theory & practice

Mobile Computing for e-Commerce

Future Internet architecture

Protocols and services

Mobile and ubiquitous networks

Green networking

Internet content search

Opportunistic networking

Network applications

Network scaling and limits

Artifial Intelligences

Pattern/Image Recognitions

Communication Network

Information Security

Knowledge Management

Management Information systems

Multimedia communicatiions

Operations research

Optical networks

Software Engineering

Virtual reality

Web Technologies

Wireless technology

Cloud Computing is the important buzzword in the today's world of computer. Cloud is global platform that allows digital information to be stored and distributed at very less cost and very fast to use. In these days since the data is very big in size many users are interested to store their valuable data in the cloud .The application software and databases in cloud computing are moved to the centralized large data centers, where the management of the data and services may not be fully trustworthy. Cloud Computing is scalable, fast, flexible, and cost-effective technology platform for IT enabled services over the internet. There are various advantages of cloud computing but ultimately cloud service users have to put their data over the cloud i.e., third party servers which are not directly controlled by the data owner Data security has consistently been a major issue in information technology In cloud computing in users perspective mainly in government ,industry and business Data security and ivacy protection issues are relevant to both hardware and software in the cloud architecture. Cloud security is becoming a key differentiator and competitive edge between cloud providers. In spite of various benefits that are provided by the cloud computing services, cloud computing service users are very much afraid about the security of their data .So this paper focuses on various issues regarding cloud computing, data security and  how cloud provides data integrity, confidentiality, availability  over user’s data? How data stored over cloud storage servers will be protected from attackers?  Risk management of data present on the Cloud is another challenge. There is a requirement to identify the risks an organization would be taking while hosting data and services on the Cloud. In this paper, we present those issues that are preventing people from adopting the cloud and to minimize risks of these issues.

Editor-in-Chief
Dr. K. Ganesh
Global Lead, Supply Chain Management, Center of Competence and Senior Knowledge
Expert at McKinsey and Company, India
[email protected]
Editorial Advisory Board
Dr. Eng. Hamid Ali Abed AL-Asadi
Department of Computer Science, Basra University, Iraq
[email protected]
Dr. Norjihan Binti Abdul Ghani
Department of Information System, University of Malaya, Malaysia
[email protected]
Dr. Christos Bouras
Department of Computer Engineering & Informatics, University of Patras, Greece
[email protected]
Dr. Maizatul Akmar Binti Ismail
Department of Information System, University of Malaya, Malaysia
[email protected]
Dr. Harold Castro
Department of Systems Engineering and Computing, University of the Andes, Colombia
[email protected]
Dr. Busyairah Binti Syd Ali
Department of Software Engineering, University of Malaya, Malaysia
[email protected]
Dr. Sri Devi Ravana
Department of Information system, University of Malaya, Malaysia
[email protected]
Dr. Karpaga Selvi Subramanian
Department of Computer Engineering, Mekelle University, Ethiopia
[email protected]
Dr. Mazliza Binti Othman
Department of Computer System & Technology, University of Malaya, Malaysia
[email protected]
Dr. Chiam Yin Kia
Department of Software Engineering, University of Malaya, Malaysia
[email protected]
Dr. OUH Eng Lieh
Department of Information Systems, Singapore Management University, Singapore
[email protected]

2016

2015

2014

  • Results
  • Asian Review of Mechanical Engineering (ARME)
  • career

2013

  • Home
  • Shop
  • My Account
  • Logout
  • Contact us
  • The Asian Review of Civil Engineering (TARCE)

2012

  • Asian Journal of Electrical Sciences(AJES)
  • Asian Journal of Computer Science and Technology (AJCST)
  • Asian Journal of Information Science and Technology (AJIST)
  • Asian Journal of Engineering and Applied Technology (AJEAT)
  • Asian Journal of Science and Applied Technology (AJSAT)
  • Asian Journal of Managerial Science (AJMS)
  • Asian Review of Social Sciences (ARSS)

2011

2010

    Table of Contents

    Editorial Note

    Editorial Dr. K. Ganesh

    Editor-in-Chief
    Dr. K. Ganesh
    Global Lead, Supply Chain Management, Center of Competence and Senior Knowledge
    Expert at McKinsey and Company, India
    [email protected]
    Editorial Advisory Board
    Dr. Eng. Hamid Ali Abed AL-Asadi
    Department of Computer Science, Basra University, Iraq
    [email protected]
    Dr. Norjihan Binti Abdul Ghani
    Department of Information System, University of Malaya, Malaysia
    [email protected]
    Dr. Christos Bouras
    Department of Computer Engineering & Informatics, University of Patras, Greece
    [email protected]
    Dr. Maizatul Akmar Binti Ismail
    Department of Information System, University of Malaya, Malaysia
    [email protected]
    Dr. Harold Castro
    Department of Systems Engineering and Computing, University of the Andes, Colombia
    [email protected]
    Dr. Busyairah Binti Syd Ali
    Department of Software Engineering, University of Malaya, Malaysia
    [email protected]
    Dr. Sri Devi Ravana
    Department of Information system, University of Malaya, Malaysia
    [email protected]
    Dr. Karpaga Selvi Subramanian
    Department of Computer Engineering, Mekelle University, Ethiopia
    [email protected]
    Dr. Mazliza Binti Othman
    Department of Computer System & Technology, University of Malaya, Malaysia
    [email protected]
    Dr. Chiam Yin Kia
    Department of Software Engineering, University of Malaya, Malaysia
    [email protected]
    Dr. OUH Eng Lieh
    Department of Information Systems, Singapore Management University, Singapore
    [email protected]

    Articles

Advanced Search

You can submit your research paper to the journal in just a few clicks. Please follow the steps outlined below: 1. Register your details and select to be an Author 2. Log in with your user name and password 3. ‘Start a new submission’ and follow these 5 steps:

[gravityform id="1" name="Registration" title="false" description="false"]

Privacy Statement

The names and email addresses entered in this journal site will be used exclusively for the stated purposes of this journal and will not be made available for any other purpose or to any other party.

Privacy Statement

The names and email addresses entered in this journal site will be used exclusively for the stated purposes of this journal and will not be made available for any other purpose or to any other party.

Lorem1 ipsum dolor sit amet, consectetur adipiscing elit. Nulla convallis ultricies scelerisque. Fusce dolor augue, sollicitudin eget lacus vitae, rutrum commodo lacus. Praesent ullamcorper facilisis dui. Sed suscipit id lorem ut dapibus. Integer dictum cursus nisl, quis ullamcorper augue. Sed non rutrum mauris. Maecenas in dolor est. Donec eget sagittis mi. Sed non leo eu odio mollis pulvinar vitae et leo. Integer eu feugiat tortor. Duis massa purus, eleifend id erat eget, hendrerit semper risus. Suspendisse cursus varius dapibus

Lorem1 ipsum dolor sit amet, consectetur adipiscing elit. Nulla convallis ultricies scelerisque. Fusce dolor augue, sollicitudin eget lacus vitae, rutrum commodo lacus. Praesent ullamcorper facilisis dui. Sed suscipit id lorem ut dapibus. Integer dictum cursus nisl, quis ullamcorper augue.

Subscription

Subscription (for 12 issues):
Rs. 5000; Overseas - USD 500;
Cheque drawn in favour of "Informatics Publishing Limited"
Click here to download online subscription form

Download

DD Mailing Address

Lorem1 ipsum dolor sit amet,
Lorem1 ipsum dolor sit amet,
Lorem1 ipsum dolor sit amet.

BACK TO TOP

Outstanding Scholars

The Journals honor Outstanding Scholars in various fields. Scholar of the Month should have contributed to their field and to the larger community. Recipients will be nominated by the Advisory Board and approved by the Editor-in-Chief of the allied journals published by The Research Publication. Scholar of the Month will be displayed in the web portal of the concerned journal.

Please send your brief write up to [email protected]

Editors and Reviewers

The Research Publication is seeking qualified researchers to join its editorial team as Associate Editor, Editorial Advisory Board Member, and Reviewers.
Kindly send your details to [email protected]

Call For Papers

Authors are requested to submit their papers electronically to [email protected] with mentioning the journal title.

Mailing Address

The Research Publication 1/611, Maruthi Nagar, Rakkipalayam Post, Coimbatore – 641 031, Tamil Nadu, India Phone No.: 0422 2461001

  • About
  • Editorial Policy
  • Author Guidelines
  • Contact us
  • Copyright
  • Facebook
  • Twitter
  • RSS

© 2015 The Research Publication. All rights reserved.

The Research Publication
  • Home
  • Editorial Policy
  • Author Guidelines
  • Submission
  • Copyright Form
  • Career
  • Contact us
  • Subscription