Data Security Issues in Cloud Computing

  • Nayan Yerate University of Pune
  • Rajani Sajjan
Keywords: cloud computing, Cloud computing security, data segregation, access control, data security, privacy protection

Abstract

As we are familiar that the cloud computing field is very vast and also its one of the potential field. It also has many advantages over the other storing fields. This is the only reason that the data is being migrating from the local storages to the public or the hybrid clouds. Due to some of the drawbacks the large enterprises or the critical data of the organizations are not moved to the cloud. The actual size of the cloud is much more and effective than we expect it. The data owners i.e. the cloud consumers need a high level of security regarding their data and the privacy concerns are also there. This is one of the issue that many consumers are not moving towards the cloud computing services. In this paper short but and effective analysis on the data security and privacy protection part is provided which is concerned with the data life cycle in cloud computing. The further part consists of the present work in this area. Finally the future work and the conclusion of this topic.

References

[1] Deyan Chen and Hong Zhao “Data Securityand Privacy Protection Isues in Cloud Computing” , 2012 International Conference on Computer Science and Electronics Engineering. [2] Peter Mell, and Tim Grance, “The NIST Definition of CloudComputing,” Version 15, 10-7-09, http://www.wheresmyserver.co.nz/ [3] Storage/media/faq-files/cloud-def-v15.pdf Cloud computing security, ttp://en.wikipedia.org/wiki/Cloud_computing_security. [4] Gartner: Seven cloud-computing security risks. InfoWorld.2008-07-02. http://www.infoworld.com/d/securitycentral/gartner-seven-cloudcomputing-security- risks-853. [5] Cloud Security Front and Center. Forrester Research. 2009-11-18http://blogs.forrester.com/srm/2009/11/cloud-security-frontandcenter.html [6] Cloud Security Alliance. http://www.cloudsecurityalliance.org. [7] Cloud Security Alliance, Security Guidance for Critical Areas of Focus in Cloud Computing, V2.1, http://www.cloudsecurityalliance.org/ guidance/csaguide.v2.1.pdf. [8] “IBM Discovers Encryption Scheme That ould Improve Cloud Security, Spam Filtering,” at http://www.eweek.com/c/a/Security/IBMUncovers- EncryptionScheme-That-Could-Improve -Cloud-Security-Spam-Filtering135413/. [9] Roy I, Ramadan HE, Setty STV, Kilzer A, Shmatikov V, Witchel E. “Airavat: Security and privacy for MapReduce,” In: Castro M,eds. Proc. of the 7th UsenixSymp.on Networked Systems Design and Implementation. San Jose: USENIX Association, 2010. 297.312. [10] Cong Wang, Qian Wang, KuiRen, and Wenjing Lou, "Ensuring Data Storage Security in Cloud Computing," in Proceedings of the 7th International Workshop on Quality of Service. 2009:1-9.
Published
2018-03-23
How to Cite
Yerate, N., & Sajjan, R. (2018). Data Security Issues in Cloud Computing. Asian Journal For Convergence In Technology (AJCT) ISSN -2350-1146, 1(1). Retrieved from http://www.asianssr.org/index.php/ajct/article/view/117
Section
Article

Most read articles by the same author(s)

Obs.: This plugin requires at least one statistics/report plugin to be enabled. If your statistics plugins provide more than one metric then please also select a main metric on the admin's site settings page and/or on the journal manager's settings pages.