Improving Security for the Users Data by using Security Certification System in Cloud Computing
DOI:
https://doi.org/10.32628/CSEIT12390146Keywords:
Auditing, cloud computing, cloud models, decryption, encryption, malicious behavior, intrusion, secured communication.Abstract
Cloud computing has emerged as a dominant paradigm in the field of information technology, offering a flexible and scalable platform for storage, processing, and retrieval of data. However, the adoption of cloud computing also introduces new challenges and concerns, particularly regarding the protection of personal information. In this paper, we explore the importance of personal information protection in cloud computing and examine the role of security certification systems in ensuring the security and privacy of user data. We analyze the current landscape of cloud security certifications and propose recommendations for enhancing personal information protection in the cloud computing security certification system.
References
- Al-Haj, A., & Al-Rousan, M. (2018). A Review of Cloud Security Certification Standards. In 2018 9th International Conference on Information and Communication Systems (ICICS) (pp. 185-190). IEEE.
- Joshi, K. P., & Neven, G. (2015). Privacy Certification for Cloud Computing: An Analysis of ISO/IEC 27018. In Privacy and Identity Management for the Future Internet in the Age of Globalisation (pp. 201-216). Springer.
- Liu, Y., et al. (2017). Personal Data Protection in Cloud Computing: An Analysis of Consent and Security Requirements. IEEE Transactions on Services Computing, 10(4), 552-565.
- Hötzendorfer, W., & Schatten, A. (2015). Certified Cloud Services: An Overview of the CSA STAR Certification. In Cloud Computing and Services Science (pp. 105-118). Springer.
- Ravindra Changala, “Secured Activity Based Authentication System” in " in Journal of innovations in computer science and engineering (JICSE), Volume 6, Issue 1,Pages 1-4, September 2016.ISSN: 2455-3506.
- Gao, W., et al. (2017). Personal Data Protection in Cloud Computing: An Analysis of Emerging Privacy Issues. International Journal of Information Management, 37(1), 150-157.
- P. T. Jaeger, J. Lin, and J. M. Grimes, ``Cloud computing and information policy: Computing in a policy cloud?'' J. Inf. Technol. Politics, vol. 5, no. 3,pp. 269-283, Oct. 2008.
- C. Vidal and K.-K. R. Choo, ``Situational crime prevention and the mitigation of cloud computing threats,'' in Proc. Int. Conf. Secur. Privacy Commun. Syst. Springer, 2017, pp. 218-233.
- N. Khan and A. Al-Yasiri, ``Cloud security threats and techniques to strengthen cloud computing adoption framework,'' in Cyber Security and Threats: Concepts, Methodologies, Tools, and Applications. Hershey, PA, USA: IGI Global, 2018, pp. 268-285.
- H. A. Kholidy, A. Erradi, S. Abdelwahed, and F. Baiardi, ``Arisk mitigation approach for autonomous cloud intrusion response system,'' Computing, vol. 98, no. 11, pp. 1111-1135, Nov. 2016.
- Ravindra Changala, "Data Mining Techniques for Cloud Technology" in International Journal of Advanced Research in Computer and Communication Engineering (IJARCCE),Volume 4, Issue 8, Pages 2319-5940, ISSN: 2278-1021, August 2015.
- C.-J. Chung, P. Khatkar, T. Xing, J. Lee, and D. Huang, ` `NICE: Network intrusion detection and countermeasure selection in virtual network systems,'' IEEE Trans. Dependable Secure Comput., vol. 10, no. 4, pp. 198-211, Jul. 2013.
- J.-Y. Park, S.-H. Na, and E.-N. Huh, ``An optimal investment scheme based on ATM considering cloud security environment,'' in Proc. 11th Int. Conf. Ubiquitous Inf. Manage. Commun., Jan. 2017, pp. 1-7.
- B. Tomas and B. Vuksic, ``Peer to peer distributed storage and computing cloud system,'' in Proc. ITI 34th Int. Conf. Inf. Technol. Interfaces, 2012, pp. 7-84.
- H. Tianfield, ``Security issues in cloud computing,'' in Proc. IEEE Int. Conf. Syst., Man, Cybern. (SMC), Apr. 2012, pp. 1082-1089.
- A. Yamada, Y. Miyake, K. Takemori, A. Studer, and A. Perrig, ``Intrusion detection for encrypted Web accesses,'' in Proc. 21st Int. Conf. Adv. Inf. Netw. Appl. Workshops (AINAW), 2007, pp. 569-576.
- K.-L. Tsai, F.-Y. Leu, and J.-S. Tan, ``An ECC-based secureEMRtransmission system with data leakage prevention scheme,'' Int. J. Comput. Math.,vol. 93, no. 2, pp. 367383, Feb. 2016.
- N. Kumar, V. Verma, and V. Saxena, ``A security algorithm for online analytical processing data cube,'' Int. J. Comput. Appl., vol. 79, no. 14,pp. 7-10, Oct. 2013.
- N. Tirthani and R. Ganesan, ``Data security in cloud architecture based on Diffie Hellman and elliptical curve cryptography,'' IACR Cryptol. ePrintArch., vol. 2014, p. 49, 2014.
Downloads
Published
Issue
Section
License
Copyright (c) IJSRCSEIT

This work is licensed under a Creative Commons Attribution 4.0 International License.