Data security and integrity in cloud computing : Threats and Solutions
DOI:
https://doi.org/10.32628/CSEIT206667Keywords:
Cloud Computing, Cloud security, Security techniques, Security threats, Data securityAbstract
Cloud computing changed the world of Internet. With the help of cloud computing user can easily share, store and retrieve their data from anywhere. Cloud computing is scalable, fast, flexible, and cost-effective technology platform for IT enabled services over the internet. Cloud computing provides hardware, software and infrastructural storage to many users at a time Most of the times cloud users don’t know the exact location of their data or the sources of data stored with their data. In spite of various benefits that are provided by the cloud computing services, its users are very much afraid about the security of their data once it is over the cloud under the control of third-party vendors. Therefore, many data security and integrity concerns like access control, searchable encryption techniques, key management, ownership proofs and remote integrity check arise. This paper discusses the security and integrity of data in cloud computing. It is a study of aspects related to data security. The paper will go in to details of few data protection methods and approaches used throughout the world to ensure maximum data protection by reducing risks and threats. Going ahead the paper also discuss different techniques used for secured data storage on cloud.
References
- P. Mell and T. Grance, "The NIST Definition of Cloud Computing," National Institute of Standards and Technology,Vol.53,no.6, p. 50, 2009.
- A. Venkatesh and . M. . S. Eastaff, "A Study of Data Storage Security Issues in Cloud Computing," International Journal of Scientific Research in Computer Science, Engineering and Information Technology , IJSRCSEIT , vol. Volume 3, no. Issue 1, pp. 2456-3307, 2018.
- S. Subashini and V. Kavitha, "A survey on security issues in service delivery models of cloud computing," Journal of Network and Computer Applications, vol. Vol 34, no. Issue 1, pp. 1-11, 2011.
- H. Tianfield, "Security Issues In Cloud Computing," in IEEE International Conference on System, Man, Cybernetics, Seoul, Korea, 2012.
- M. T. Khorshed, A. S. Ali and S. A. Wasimi, "A survey on gaps, threat remediation challenges and some thoughts for proactive attack detection in cloud computing," Future Generation Computer Systems, vol. Vol 28, no. No. 6, pp. 833-851, 2012.
- A. Shawish and M. Salama, "Cloud Computing: Paradigms and Technologies, F. Xhafa and N. Bessis (eds.), Intercooperative Collective Intelligence: Techniques and Applications, Studies in Computational Intelligence," Studies in Computational Intelligence, p. 495, 2014.
- P. Sirohi and A. Agarwal, "Cloud computing data storage security framework relating to data integrity, privacy and trust.," 1st International Conference on Next Generation Computing Technologies (NGCT), 2015.
- C. Sarvankumar and C. Arun, "Survey on interoperability, security, trust, privacy standardization of cloud computing," in Contemporary Computing and Informatics, 2014.
- A. Jaberi and M. F. Zainal, "Data integrity and Privacy model in cloud computing," Biometrics and Security Technologies, pp. 280-284, 2014.
- S. Pearson and A. Benameur, "Privacy, Security and Trust Isseus Arising from Cloud Computing," in 2nd IEEE International Conference on Cloud Computing Technology and Science, 2010.
- Bob Violino , "CSO India: 11 top cloud security threats," 11 October 2019. Online]. Available: https://www.csoonline.com/article/3043030/top-cloud-security-threats.html. Accessed 06 May 2020].
- N. A. AL-SAIYD and N. SAIL , "DATA INTEGRITY IN CLOUD COMPUTING SECURITY," Journal of Theoretical and Applied Information Technology , vol. Vol 58, no. ISSN: 1992-8645 , 2013.
- G. Kulkarni, J. Gambhir, T. Patil and A. Dongre, "A security aspects in cloud computing," in IEEE International Conference On Computer Science and Automation Engineering, 2012.
- H. Shah and S. S. Anandane, "Security Issues on Cloud Computing," arXiv preprint arXiv:1308.5996., 2013.
- V. Winkler, "Securing the cloud: Cloud computer security techniques and tactics.," NL: Syngress Media Incorporated. , 2011.
- S. Basu, A. Bardhan , K. Gupta , P. Saha, M. Pal and M. Bose , "Cloud computing security challenges & solutions - A survey," in IEEE 8th Annual Computing and Communication Workshop and Conference (CCWC), 2018.
- M. Zhou, R. Zhang, W. Xie, W. Qian and A. Zhou, "Security and Privacy in Cloud Computing:A Survey," in Sixth International Conference on Semantics, Knowledge and Grids, 2010.
- H. Yusuf and S. Selvan, "Confidentiality Issues in Cloud Computing and Countermeasures: A Survey," in National Conference On Emerging Computer Paradigms 2016, NMAMIT, Nitte, 2016.
- A. J. Feldman, W. P. Zeller, M. J. Freedman and E. W. Felten, "SPORC:group collabration using untrested cloud resources," in Proceedings of the 9th USENIX Conference on Operating Systems Design and Implementation(OSDI'10), 2010.
- S. Yunchuan , Z. Junsheng, X. Yongping and Z. Guangyu, "Data Security and Privacy in Cloud Computing," International Journal of Distributed Sensor Networks, 2014.
- E. Stefanov, M. vanDijk and E. Shietal, "Pathoram:an extremly simple oblivious ram protocol," in Proceding of the ACM SIGSAC Conference on Computer & Communications Security, 2013.
- C. Cachin and M. Schunter, "Ac cloud you can trust," in IEEE Spectrum, 2011.
- Z. Shen, L. Li, F. Yan and X. Wu, "Cloud computing system based on trusted computing platform," in Proceddings of the international Conference on Intelligent Computation Technology and Automation(ICICTA'10), 2010.
- M. AlZain, E. Pardede, B. Soh and J. Thom, "Cloud computing security: From single to multi-clouds," 45th Hawaii International Conference , p. 5490–5499, 2012.
Downloads
Published
Issue
Section
License
Copyright (c) IJSRCSEIT

This work is licensed under a Creative Commons Attribution 4.0 International License.