CFP last date
20 May 2024
Reseach Article

An Investigation on the Issues in Cloud Data Security

by A. Mercy Gnana Rani, A. Marimuthu
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 82 - Number 1
Year of Publication: 2013
Authors: A. Mercy Gnana Rani, A. Marimuthu
10.5120/14083-2082

A. Mercy Gnana Rani, A. Marimuthu . An Investigation on the Issues in Cloud Data Security. International Journal of Computer Applications. 82, 1 ( November 2013), 39-43. DOI=10.5120/14083-2082

@article{ 10.5120/14083-2082,
author = { A. Mercy Gnana Rani, A. Marimuthu },
title = { An Investigation on the Issues in Cloud Data Security },
journal = { International Journal of Computer Applications },
issue_date = { November 2013 },
volume = { 82 },
number = { 1 },
month = { November },
year = { 2013 },
issn = { 0975-8887 },
pages = { 39-43 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume82/number1/14083-2082/ },
doi = { 10.5120/14083-2082 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:56:40.853153+05:30
%A A. Mercy Gnana Rani
%A A. Marimuthu
%T An Investigation on the Issues in Cloud Data Security
%J International Journal of Computer Applications
%@ 0975-8887
%V 82
%N 1
%P 39-43
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Cloud computing is one of the most fascinating technologies which attract the users to outsource their data from local to remote cloud servers using Internet. A large number of cryptographic schemes are available to encrypt the sensitive information and to protect data. Even though it protects the data but it limits the functionality of the cloud storage. This paper focuses on investigation of cloud data security and its issues. Cloud Computing is one of the most influential technology in the IT industry in recent years. In Cloud, the computing infrastructures (Hardware and Software) are provided as services over the internet in pay-as-you-use basis. The outsourced sensitive data an cloud servers are not within the same domain. For securing these sensitive user data in cloud server, at present many cryptographic solutions are available. However, these solutions have computation overhead, key distribution and data management for providing security and scalability in data access control of cloud computing. This paper presents the analysis on various cloud data security issues available.

References
  1. Jens-Matthias Bohli, Nils Gruschka, Meiko Jensen, Luigi Lo Iacono, Ninja Marnau, "Security and Privacy Enhancing Multi-Cloud Architectures" ISSN: 1545-5971,2013.
  2. Rohit Bhadauria, Rituparna Chaki, Nabendu Chaki, Sugata Sanyal "A Survey on Security Issues in Cloud Computing"2011.
  3. The NIST Definition of Cloud Computing, version 15, by Peter Mell and Tim Grance, October 7, 2009, National Institute of Standards and Technology (NIST), Information Technology Laboratory (www. csrc. nist. gov).
  4. Cong Wang ; Kui Ren ; Wenjing Lou ; Jin Li, "Toward publicly auditable secure cloud data storage services", IEEE Network, Volume: 24 , Issue: 4, Page(s): 19 – 24, 2010.
  5. Balding, C. (2008). Assessing the Security Benefits of Cloud Computing. Retrieved from http://cloudsecurity. org/blog/2008/07/21/assessing-the-security-benefits-of-cloud-computing. html
  6. Abhinay B. Angadi, Akshata B. Angadi, Karuna C. Gull, "Security Issues with Possible Solutions in Cloud Computing-A Survey", International Journal of Advanced Research in Computer Engineering & Technology (IJARCET), Volume 2, Issue 2, February 2013.
  7. Tim Mather, Subra Kumaraswamy, Shahed Latif, "Cloud Security and Privacy: An Enterprise Edition on Risks and Compliance (Theory in Practice)," O'Reilly Media, Sep. 2009; ISBN: 978-0596802769. http://oreilly. com/catalog/9780596802776.
  8. Lori M. Kaufman, "Data security in the world of cloud computing," IEEE Security and Privacy Journal, vol. 7, issue. 4, pp. 61-64, July- Aug 2009, ISSN: 1540-7993.
  9. Cong Wang, Kui Ren, Qian Wang and Wenjing Lou "Towards Secure and Dependable Storage Services in Cloud Computing," IEEE transactions on Services Computing, vol 5, no. 3, pp 220-232, 2011.
  10. Qian Wang, Cong Wang, Kui Ren, Wenjing Lou, Jin Li, "Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing" IEEE Transactions On Parallel And Distributed Systems, Vol. 22, No 5 May 2011.
  11. Sheng Zhong and Zhuo Hao. "A Privacy-Preserving Remote Data Integrity Checking Protocol with Data Dynamics and Public Verifiability," IEEE Internet Computing, 2010.
  12. Hsiao-Ying Lin, Wen-Guey Tzeng, "A Secure Erasure Code-Based Cloud Storage System with Secure Data Forwarding" IEEE transactions on parallel and distributed systems, Vol. 23, No. 6, June 2012
  13. Shucheng Yu, Cong Wang, Kui Ren, Wenjing Lou, "Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing" Technical Program at IEEE INFOCOM 2010
  14. Ashley Chonka, Yang Xiang n, Wanlei Zhou, Alessio Bonti, "Cloud security defence to protect cloud computing against HTTP-DoS and XML-DoS attacks" Journal of Network and Computer Applications 2010
  15. Mohemed Almorsy, John Grundy and Amani S. Ibrahim "Collaboration-Based Cloud Computing Security Management Framework" IEEE International Conference on Cloud Computing (CLOUD 2011).
  16. Zhidong Shen, Qiang Tong "The Security of Cloud Computing System enabled by Trusted Computing Technology" 2nd International Conference on Signal Processing Systems (ICSPS), 2010.
  17. Sayi, T. J. V. R. K. ; Krishna, R. K. N. S. ; Mukkamala, R. ; Baruah, P. K. , "Data Outsourcing in Cloud Environments: A Privacy Preserving Approach", Ninth International Conference on Information Technology: New Generations (ITNG), Page(s): 361 – 366, 2012.
  18. Miao Zhou , Yimu, Willy Susilo , Junyan , Lijudong "privacy enhanced data outsourcing in the cloud" Journal of Network and Computer Applications, 2012.
  19. Wallner, HarderE. Agee,Rfc2627: key management for multicast: issues and architectures; 1999.
  20. Wang W, LiZ, Owens R, BhargavaB. Secure and efficient access to outsourced data. In: Proceedings of the 2009 ACM workshop on cloud computing security, CCSW '09. NewYork, NY, USA: ACM;2009. p. 55–66.
Index Terms

Computer Science
Information Sciences

Keywords

Cloud Computing Outsourcing data Encryption