CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

An Analysis of Data Security and Privacy in Cloud Computing

by Akella Subhadra
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 176 - Number 39
Year of Publication: 2020
Authors: Akella Subhadra
10.5120/ijca2020920508

Akella Subhadra . An Analysis of Data Security and Privacy in Cloud Computing. International Journal of Computer Applications. 176, 39 ( Jul 2020), 31-40. DOI=10.5120/ijca2020920508

@article{ 10.5120/ijca2020920508,
author = { Akella Subhadra },
title = { An Analysis of Data Security and Privacy in Cloud Computing },
journal = { International Journal of Computer Applications },
issue_date = { Jul 2020 },
volume = { 176 },
number = { 39 },
month = { Jul },
year = { 2020 },
issn = { 0975-8887 },
pages = { 31-40 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume176/number39/31461-2020920508/ },
doi = { 10.5120/ijca2020920508 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:40:53.623989+05:30
%A Akella Subhadra
%T An Analysis of Data Security and Privacy in Cloud Computing
%J International Journal of Computer Applications
%@ 0975-8887
%V 176
%N 39
%P 31-40
%D 2020
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Cloud Computing is an important buzzword in today's computer world. Cloud is a global platform that allows digital information to be stored and distributed at very low cost and it is very fast to use. In present times since data storage requirements are huge many users are looking to store their invaluable data in more secure platforms such as Cloud. Cloud Computing is scalable, fast, flexible, and cost effective technology platform for IT enabled services over the internet. Even though, there are various advantages of cloud computing, cloud service users have to still put their data under third party servers which are not directly controlled by the data owner. The application software and databases in cloud computing are moved to large, centralized data centers, where the management of the data and services may not be trustworthy. Data security has consistently been a major issue in information technology. In cloud computing, mainly from government, industry and business users perspective, data security and privacy protection issues are relevant to both hardware and software parts of the cloud architecture. Cloud security is becoming a key differentiator and adding competitive edge among different cloud providers. In spite of various benefits provided by the cloud computing services, cloud users are very much concerned about data security . This paper focuses on various issues regarding Cloud Computing, Data security, how cloud provides data integrity, confidentiality, availability over user’s data and how data stored over cloud storage servers will be protected from attackers. Risk management of data present on the Cloud is another challenge. There is a requirement to identify the risks an organization would be taking while hosting data and services on the Cloud. In this paper, we present issues that are preventing people from adopting cloud and how to minimize these risks.

References
  1. Data integrity in cloud computing security, Article  in  Journal of Theoretical and Applied science.
  2. Data Integrity in Cloud Computing Security , Journal of Theoretical and Applied Information Technology, 31st December 2013. Vol. 58 No.3 .
  3. All info about cloud news article Components of Cloud Computing,By Cloud Storage February 14, 2019.
  4. Data integrity in cloud computing security, Article in research gate, Journal of Theoretical and Applied Information Technology Vol. 3,December 2013.
  5. Cloud Security: Apponix Technologies,scribd,Cloud Security: Apponix Technologies | Cloud Computing | Public Key
  6. IT Blog: Top 10 Could Computing ThreatsData Security modal for cloud computing, Journal of Research in Science And Technology(IJRST) 2013, Vol. No. 2, Issue No.3.
  7. Exploring Data Security Issues and Solutions in Cloud Computing, Article  in research gate, Procedia Computer Science, January 2018.
  8. Samuel Greengard, Cloud Storage Security Standards and Best Practices, Posted December 5, 2018.
  9. Data Security, Privacy, Availability and Integrity in Cloud Computing: Issues and Current Solutions(IJACSA) International Journal of Advanced Computer Science and Applications, Vol. 7, No. 4, 2016.
  10. C. Erway, A. Kupc¸ C. Papamanthou, and R. Tamassia, “Dynamic provable data possession,” in Proceedings of the 16th ACM conference on Computer and communications security. Acm, 2009, pp. 213–222.
  11. G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, and D. Song, “Provable data possession at untrusted stores,” in Proceedings of the 14th ACM conference on Computer and communications security. Acm, 2007, pp. 598–609.
  12. G. Ateniese, R. Di Pietro, L. V. Mancini, and G. Tsudik, “Scalable and efficient provable data possession,” in Proceedings of the 4th international conference on Security and privacy in communication netowrks. ACM, 2008, p. 9.
  13. K. Yang and X. Jia, “An efficient and secure dynamic auditing protocol for data storage in cloud computing,” Parallel and Distributed Systems, IEEE Transactions on, vol. 24, no. 9, pp. 1717–1726, 2013.
  14. Q. Wang, C. Wang, K. Ren, W. Lou, and J. Li, “Enabling public auditability and data dynamics for storage security in cloud computing,” Parallel and Distributed Systems, IEEE Transactions on, vol. 22, no. 5, pp. 847–859, 2011.
  15. C. Wang, Q. Wang, K. Ren, N. Cao, and W. Lou, “Toward secure and dependable storage services in cloud computing,” Services Computing, IEEE Transactions on, vol. 5, no. 2, pp. 220–232, 2012.
  16. C. Wang, S. Chow, Q. Wang, K. Ren, and W. Lou, “Privacy-preserving public auditing for secure cloud storage,” Computers, IEEE Transactions on, vol. 62, no. 2, pp. 362–375, Feb 2013.
  17. B. Balusamy, P. Venkatakrishna, A. Vaidhyanathan, M. Ravikumar, and N. Devi Munisamy, “Enhanced security framework for data integrity using third-party auditing in the cloud system,” in Artificial Intelligence and Evolutionary Algorithms in Engineering Systems, ser. Advances in Intelligent Systems and Computing. Springer India, 2015, vol. 325, pp. 25–31.
  18. G. Ateniese, R. Burns, R. Curtmola, J. Herring, O. Khan, L. Kissner,Z. Peterson, and D. Song, “Remote data checking using provable data possession,” ACM Trans. Inf. Syst. Secur., vol. 14, no. 1, pp. 12:1–12:34,Jun. 2011.
  19. M. Sookhak, A. Gani, M. K. Khan, and R. Buyya, “Dynamic remote data auditing for securing big data storage in cloud computing,” Information Sciences, 2015.
  20. A. Juels and B. S. Kaliski Jr, “Pors: Proofs of retrievability for large files,” in Proceedings of the 14th ACM conference on Computer and communications security. Acm, 2007, pp. 584–597.
  21. S. Halevi, D. Harnik, B. Pinkas, and A. Shulman-Peleg, “Proofs of ownership in remote storage systems,” in Proceedings of the 18th ACM conference on Computer and communications security. ACM, 2011, pp. 491–500.
  22. N. Kaaniche and M. Laurent, “A secure client side deduplication scheme in cloud storage environments,” in New Technologies, Mobility and Security (NTMS), 2014 6th International Conference on, March 2014, pp. 1–7.
  23. F. S. Al-Anzi, A. A. Salman, N. K. Jacob, and J. Soni, “Towards robust, scalable and secure network storage in cloud computing,” in Digital Information and Communication Technology and it’s Applications (DICTAP), 2014 Fourth International Conference on. IEEE, 2014, pp. 51–55.
  24. K. D. Bowers, A. Juels, and A. Oprea, “Hail: a high-availability and integrity layer for cloud storage,” in Proceedings of the 16th ACM conference on Computer and communications security. ACM, 2009, pp. 187–198.
  25. A. Bessani, M. Correia, B. Quaresma, F. Andre, and P. Sousa, “Depsky: ´dependable and secure storage in a cloud-of-clouds,” ACM Transactions on Storage (TOS), vol. 9, no. 4, p. 12, 2013.
  26. D. Chen, X. Li, L. Wang, S. Khan, J. Wang, K. Zeng, and C. Cai, “Fast and scalable multi-way analysis of massive neural data,” IEEE Trans. Comput,vol. 63, 2014.
  27. A. N. Khan, M. M. Kiah, S. A. Madani, M. Ali, S. Shamshirband et al., “Incremental proxy re-encryption scheme for mobile cloud computing environment,” The Journal of Supercomputing, vol. 68, no. 2, pp. 624–651,2014.
  28. P. S. Kumari, P. Venkateswarlu, and M. Afzal, “A key aggregate framework with adaptable offering of information in cloud,” International Journal of Research, vol. 2, no. 3, pp. 5–10, 2015.
  29. C.-K. Chu, S. S. Chow, W.-G. Tzeng, J. Zhou, and R. H. Deng, “Key-aggregate cryptosystem for scalable data sharing in cloud storage,” Parallel and Distributed Systems, IEEE Transactions on, vol. 25, no. 2, pp. 468–477, 2014.
  30. R. A. Sana Belguith, Abderrazak Jemai, “Enhancing data security in cloud computing using a lightweight cryptographic algorithm,” ICAS 2015 : The Eleventh International Conference on Autonomic and Autonomous Systems, 2015.
  31. A. Shamir, “Identity-based cryptosystems and signature schemes,” in Advances in cryptology. Springer, 1985.
  32. A. Sahai and B. Waters, “Fuzzy identity-based encryption,” in Advances in Cryptology–EUROCRYPT 2005. Springer, 2005, pp. 457–473.
  33. Cloud based learning management systems-ETEC 522 Security in Cloud Computing as it Relates to E-learning
  34. Yunhong Zhou,Na Li,Yanmei Tian,Dezhi An 2 and Licheng Wang,public key encryption with key word search in cloud.
  35. Neha kharthi, issues of data security and privacy in cloud computing,2014.
  36. Mohammed Joda Usman,Ahamad Aliyu,Abdul Samad Ismail,Energy-Efficient Resource Allocation Technique Using Flower Pollination Algorithm for Cloud Datacenters, research gate chapter 2019.
  37. AUTHORS PROFILE
  38. Mrs. AKELLA SUBHADRA, born in Amalapuram, Andhra Pradesh, India, received Masters in Computer Applications (MCA) from Andhra University, Visakhapatnam, Master of Technology in Computer Science (M.Tech.) from Nagarjuna University, Guntur and Master of Philosophy (M.Phil.) in Computer Science from Periyar University, Salem. She is presently an Associate Professor in Bonam Venkata Chalamayya Institute of Technology & Science, Amalapuram. She has 14 years of teaching & research experience. H
Index Terms

Computer Science
Information Sciences

Keywords

Cloud Computing Integrity Confidentiality Availability.