A Review of Data Security Challenges and their Solutions in Cloud Computing

Full Text (PDF, 486KB), PP.30-38

Views: 0 Downloads: 0

Author(s)

Isma Zulifqar 1 Sadia Anayat 1,* Imtiaz Kharal 1

1. Govt College Women University Sialkot, Pakistan

* Corresponding author.

DOI: https://doi.org/10.5815/ijieeb.2021.03.04

Received: 12 Aug. 2020 / Revised: 20 Oct. 2020 / Accepted: 17 Nov. 2020 / Published: 8 Jun. 2021

Index Terms

Cloud computing, data security, E-waste.

Abstract

Cloud computing is the newest web based computing network that offers the users with convenient and flexible resources to access or function with different cloud applications. Cloud computing is the availability of the computer network services, mainly storing data and computational power, without explicit user active control. The data in cloud computing is stored and accessed on a distant server by using cloud service provider’ applications. Providing protection is a main issue because information is transferred to the remote server through a medium. It is important to tackle the security issues of cloud computing before implementing it in an organization. In this paper, we call attention to the data related security issues and solution to be addressed in the cloud computing network. To protect our data from malicious users we can implement encryption. We have discussed the advantages of cloud computing in our paper.

Cite This Paper

Isma Zulifqar, Sadia Anayat, Imtiaz Khara, "A Review of Data Security Challenges and their Solutions in Cloud Computing", International Journal of Information Engineering and Electronic Business(IJIEEB), Vol.13, No.3, pp. 30-38, 2021. DOI:10.5815/ijieeb.2021.03.04

Reference

[1]Takabi, Hassan, James BD Joshi, and Gail-Joon Ahn. "Security and privacy challenges in cloud computing environments." IEEE Security & Privacy 8.6 (2010): 24-31.
[2]Bassi, Sonia, and Anjali Chaudhary. "Cloud Computing Data Security–Background and Benefits." International Journal of Computer Science & Communication 6.1 (2015).
[3]On technical security issues in cloud computing, Meiko Jensen etal, 2009
[4]L.M. Vaquero, L. Rodero-Merino, J. Caceres, and M. Lindner. A break in the clouds: towards a cloud definition, in:ACM SIGCOMM Computer Communication Review, 2008.p.50-55
[5]M.B. Mollah, K.R. Islam, and S.S. Islam. Next generation of computing through cloud computing technology, in: 2012 25th IEEE Canadian Conference on Electrical Computer Engineering (CCECE), May 2012.p.1-6.
[6]Ensuring Data Storage security in cloud computing, Cong Wang, etal, 2010
[7]Privacy reserving, Cong Wang etal, 2010
[8]Data Security in the world of cloud computing, John Harauz, etal, 2010
[9]S. Subashini and V. Kavitha, “A survey on security issues in service delivery models of cloud computing,” J. Netw. Comput. Appl., vol. 34(1), Jan.2011, pp. 1–11.
[10]B. Gupta, D. P, "Handbook of research on modern cryptographic solutions for computer and cyber security," IGI Global, 2016.
[11]Mell, Peter, and Tim Grance. "The NIST definition of cloud computing." (2011).
[12]Bairagi, Swati I., and Ankur O. Bang. "Cloud Computing: History, Architecture, Security Issues." National Conference “CONVERGENCE. Vol. 2015. 2015.
[13]Kaufman, Lori M. "Data security in the world of cloud computing." IEEE Security & Privacy 7.4 (2009): 61-64.
[14]A brief history of cloud computing By Keith D. Foote on June 22, 2017
[15]Hussein, Nidal Hassan, and Ahmed Khalid. "6." International Journal of Computer Science and Information Security 14.1 (2016): 52.
[16]Kresimir Popovic and Zeljko Hocenski. Cloud computing security issues and challenges”
[17]F. Maggi and S. Zanero. Rethinking security in a cloudy world. Techni-cal report, Technical report, Dipartimento di Elettronica e Informazione,Politecnico di Milano, 2010.
[18]Md Tanzim Khorshed, A. B. M. Ali, and Saleh A. Wasimi. A survey on gaps, threat remediation challenges and some thoughts for proactive attack detection in cloud computing. Future Generation Computer Systems, 2012
[19]F.B. Shaikh and S. Haider. Security threats in cloud computing. In Internet Technology and Secured Transactions (ICITST), 2011 International Conference for, pages 214 –219, December 2011.
[20]Eystein Mathisen. Security challenges and solutions in cloud computing. In Digital Ecosystems and Technologies Conference (DEST), 2011 Proceedings of the 5th IEEE International Conference on, pages 208–212, 2011.
[21]L. Ertaul, S. Singhal, and G. Saldamli. Security challenges in cloud com-puting.California State University, East Bay. Academic paper http://www.mcs. csueastbay. edu/ lertaul/Cloudpdf, 2009.
[22]Wentao Liu. Research on Cloud Computing Security Problem and Strategy, in:2nd International Conference on Consumer Electronics. Communications and Networks (CECNet), April 2012.p.1216-1219.
[23]Eman M.Mohamed, Hatem S Abdelkader, Sherif EI Etriby. Enhanced Data SecurityModel for Cloud Computing, in:8th International Conference on Informatics and Systems(INFOS), Cairo,May 2012.p.12-17.
[24]Rao, R. Velumadhava, and K. Selvamani. "Data security challenges and its solutions in cloud computing." Procedia Computer Science 48 (2015): 204-209.
[25]Aldossary, Sultan, and William Allen. "Data security, privacy, availability and integrity in cloud computing: issues and current solutions." International Journal of Advanced Computer Science and Applications 7.4 (2016): 485-498.
[26]Karajeh, Huda, Mahmoud Maqableh, and R. Masa’deh. "Privacy and Security Issues of Cloud Computing Environment." Proceedings of the 23rd IBIMA Conference Vision 2020. 2016.
[27]Aldossary, Sultan, and William Allen. "Data security, privacy, availability and integrity in cloud computing: issues and current solutions." International Journal of Advanced Computer Science and Applications 7.4 (2016): 485-498.
[28]Bairagi, Swati I., and Ankur O. Bang. "Cloud Computing: History, Architecture, Security Issues." National Conference “CONVERGENCE. Vol. 2015. 2015.
[29]D. Daniels, “Identity Management Practices and Concerns in Enterprise Cloud Infrastructures,” J-Gate Acad. J. Database, vol.II, no. 14, 2013, pp. 2321–5518.
[30]S. Hajra et al., “DRECON: DPA Resistant Encryption by Construction,” Springer, 2014, pp. 420–439.
[31]A. Tripathi and A. Mishra, “Cloud computing security considerations,” IEEE Intl.Conference on 90Signal Processing, Communications and Computing (ICSPCC), 2011, pp. 1–5
[32]“SANS Institute: Network Security Resources.” [Online]. Available: 91https://www.sans.org/network-security/. [Accessed: 16 Feb. 2017]
[33]M. Al Morsy, J. Grundy, and I. Müller, “An Analysis of the Cloud Computing Security Problem,”APSEC Cloud W., Nov.2010.
[34]K. M. Khan and Q. Malluhi, “Establishing Trust in Cloud Computing,” IT Prof., vol. 12 (5), Sept. 2010, pp. 20–27.
[35]N. Attrapadung, J. Herranz, F. Laguillaumie, B. Libert, E. de Panafieu, and C. Ràfols, “Attribute-based encryption schemes with constant-size ciphertexts,” Theor. Comput. Sci., vol. 422, Mar.2012, pp. 15–38.
[36]S. Ramgovind, Mariki M. Eloff, and E. Smith. The management of securityin cloud computing. InInformation Security for South Africa (ISSA), 2010, pages 1–7, 2010.