A Review of Data Security in Cloud Computing

  • Akshata Anand Parab University of Pune
Keywords: Cloud computing, security issues, data protection, iaas, pass, saas

Abstract

Cloud computing is an emerging paradigm for large scale infrastructures. It has the advantage of reducing cost by sharing computing and storage resources, combined with an on-demand provisioning mechanism relying on a pay-per-use business model. These new features have a direct impact on the IT budgeting but also affect traditional security, trust and privacy mechanisms. Cloud computing has many advantages such as flexibility, efficiency, scalability, integration, and capital reduction. Moreover, it provides an advanced virtual space for organizations to deploy their applications or run their operations. With disregard to the possible benefits of cloud computing services, the organizations are reluctant to invest in cloud computing mainly due to security concerns. Security is one of the main challenges that hinder the growth of cloud computing. In this paper we assess how security, trust and privacy issues occur in the context of cloud computing and discuss ways in which they may be addressed.

References

[1] Janakiram MSV Cloud Computing Strategist; (2010), “Demystifying the Cloud An introduction to Cloud Computing”, Version 1.0 – March. [2]Cloud Computing: Security Issues and Research Challenges by Rabi Prasad Padhy 1 Manas Ranjan Patra 2 Suresh Chandra Satapathy [3] DoD Trusted Computer System Evaluation Criteria, http://csrc.nist.gov/publications/history/ dod85.pdf.
[4] Stephen S. Yau and Ho G. An “Confidentiality Protection in Cloud Computing Systems”, Int J Software Informatics, Vol.4, No.4, December 2010, pp. 35-1365. [5] Security Issues in Cloud Computing by Abhishek Goel1, Shikha Goel2 [6] J. Liu, Y. Xiao, S. Li, W. Liang, C. L. P. Chen, “Cyber Security and Privacy Issues in Smart Grids,” IEEE Commun. Surveys Tuts., DOI:10.1109/SURV.2011.122111.00145, in press. [7] Y. Xiao, X. Shen, B. Sun, and L. Cai, “Security and Privacy in RFID and Applications in Telemedicine,” IEEE Commun. Mag., Vol. 44. No.4, Apr. 2006, pp. 64-72. [8] H. Chen, Y. Xiao, X. Hong, F. Hu, J. Xie, “A Survey of Anonymity in Wireless Communication Systems,” (Wiley Journal) Security and Communication Networks, Vol. 2 No. 5, Sept./Oct., 2009, pp. 427-444.
[9] Jack Schofield. Wednesday 17 June 2009 22.00 BST, http://www.guardian.co.uk/technology/2009/jun/17/cloud-computingjackschofield. [10] Gartner. “Seven cloud-computing security risks”. http://www.infoworld.com July 02,2008. [11] Jianfeng Yang and Zhibin Chen, Cloud Computing Research and Security Issues, 2010 IEEE 978-1-4244-5392-4/10, 2010. [12] A review on cloud computing security issues & challanges by F. A. Alvi1, Ψ, B.S Choudary2 ,N. Jaferry3 , E.Pathan4
Published
2017-12-15
How to Cite
Parab, A. (2017). A Review of Data Security in Cloud Computing. Asian Journal For Convergence In Technology (AJCT) ISSN -2350-1146, 2(2). Retrieved from http://asianssr.org/index.php/ajct/article/view/22
Section
Article

Most read articles by the same author(s)

Obs.: This plugin requires at least one statistics/report plugin to be enabled. If your statistics plugins provide more than one metric then please also select a main metric on the admin's site settings page and/or on the journal manager's settings pages.