CFP last date
20 January 2025
Reseach Article

Navigating Database Security in Cloud Computing: Challenges and Solutions

by Sanjay Bauskar
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 186 - Number 51
Year of Publication: 2024
Authors: Sanjay Bauskar
10.5120/ijca2024924173

Sanjay Bauskar . Navigating Database Security in Cloud Computing: Challenges and Solutions. International Journal of Computer Applications. 186, 51 ( Nov 2024), 26-31. DOI=10.5120/ijca2024924173

@article{ 10.5120/ijca2024924173,
author = { Sanjay Bauskar },
title = { Navigating Database Security in Cloud Computing: Challenges and Solutions },
journal = { International Journal of Computer Applications },
issue_date = { Nov 2024 },
volume = { 186 },
number = { 51 },
month = { Nov },
year = { 2024 },
issn = { 0975-8887 },
pages = { 26-31 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume186/number51/navigating-database-security-in-cloud-computing-challenges-and-solutions/ },
doi = { 10.5120/ijca2024924173 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-12-01T00:09:59.638467+05:30
%A Sanjay Bauskar
%T Navigating Database Security in Cloud Computing: Challenges and Solutions
%J International Journal of Computer Applications
%@ 0975-8887
%V 186
%N 51
%P 26-31
%D 2024
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Cloud computing is a system that offers many resources that may be customized, allowing for decentralized data management and storage. Cloud technologies have revolutionized concepts of data storage and access in organizations thus offering organizations flexible and efficient solutions. Cloud services such as DBaaS allow users to utilize sophisticated capabilities of databases without the responsibility of conventional databases. However, with cloud computing, there is a great concern of security since issues such as data privacy, access control, and compliance to regulatory requirements are paramount. This paper explores the cloud computing architectural model, the differences between DBaaS and conventional cloud offerings, and the security risks of DBaaS. It discusses key areas of database security like data confidentiality, data integrity, and data availability, and provides information on security threats like SQL injection or data breaches. Additionally, it provides guidance on vulnerability management and incident handling in the context of cloud computing. This paper focuses on the conceptual clarification of cloud database security best practices and the shared responsibility model between providers and users.

References
  1. S. Bykov, A. Geller, G. Kliot, J. R. Larus, R. Pandya, and J. Thelin, “Orleans: Cloud computing for everyone,” in Proceedings of the 2nd ACM Symposium on Cloud Computing, SOCC 2011, 2011. doi: 10.1145/2038916.2038932.
  2. J. Weis and J. Alves-Foss, “Securing database as a service: Issues and compromises,” IEEE Secur. Priv., 2011, doi: 10.1109/MSP.2011.127.
  3. P. Gehaloach and R. Mahajan, “Cloud Computing Security Issues and Challenges: A Review,” Int. J. Adv. Res. Comput. Sci. Softw. Eng., 2018, doi: 10.23956/ijarcsse.v8i1.526.
  4. D. Bijwe, “Database in Cloud Computing-Database-as-a Service (DBaas) with its Challenges,” Int. J. Comput. Sci. Mob. Comput., 2015.
  5. A. Verma and S. Kaushal, “Cloud computing security issues and challenges: A survey,” in Communications in Computer and Information Science, 2011. doi: 10.1007/978-3-642-22726-4_46.
  6. S. G. Ankur Kushwaha, Priya Pathak, “Review of optimize load balancing algorithms in cloud,” Int. J. Distrib. Cloud Comput., vol. 4, no. 2, pp. 1–9, 2016.
  7. F. Hu et al., “A review on cloud computing: Design challenges in architecture and security,” Journal of Computing and Information Technology. 2011. doi: 10.2498/cit.1001864.
  8. W. C. N. Kaura and A. Lal, “Survey paper on cloud computing security,” in Proceedings of 2017 International Conference on Innovations in Information, Embedded and Communication Systems, ICIIECS 2017, 2017. doi: 10.1109/ICIIECS.2017.8276134.
  9. Q. Zhang, L. Cheng, and R. Boutaba, “Cloud computing: State-of-the-art and research challenges,” J. Internet Serv. Appl., 2010, doi: 10.1007/s13174-010-0007-6.
  10. T. R. G. A. B. Raut, “A Review on Database Security,” Int. J. Sci. Res., 2014.
  11. M. Malik and T. Patel, “Database Security - Attacks and Control Methods,” Int. J. Inf. Sci. Tech., 2016, doi: 10.5121/ijist.2016.6218.
  12. E. Bertino and R. Sandhu, “Database security-concepts, approaches, and challenges,” IEEE Transactions on Dependable and Secure Computing. 2005. doi: 10.1109/TDSC.2005.9.
  13. H. bediar Hashim, “Challenges and Security Vulnerabilities to Impact on Database Systems,” Al-Mustansiriyah J. Sci., 2018, doi: 10.23851/mjs.v29i2.332.
  14. M. Singh, “Study on cloud computing and cloud database,” in International Conference on Computing, Communication and Automation, ICCCA 2015, 2015. doi: 10.1109/CCAA.2015.7148468.
  15. S. Li and J. Gao, “Moving from mobile databases to mobile cloud data services,” in Proceedings - 2015 3rd IEEE International Conference on Mobile Cloud Computing, Services, and Engineering, MobileCloud 2015, 2015. doi: 10.1109/MobileCloud.2015.33.
  16. K. Munir, “Security model for cloud database as a service (DBaaS),” in Proceedings of 2015 International Conference on Cloud Computing Technologies and Applications, CloudTech 2015, 2015. doi: 10.1109/CloudTech.2015.7336974.
  17. O. Cinar, R. H. Guncer, and A. Yazici, “Database Security in Private Database Clouds,” in ICISS 2016 - 2016 International Conference on Information Science and Security, 2017. doi: 10.1109/ICISSEC.2016.7885847.
  18. D. G. J. M. Dr. CH. V. Raghavendran, Dr. G. Naga Satish, Dr. P. Suresh Varma, “A Study on Cloud Computing Services,” Int. J. Eng. Res. Technol., vol. 4, no. 34, pp. 67–72, 2016.
  19. W. Ziegler, “Cloud Computing,” in Studies in Big Data, 2023. doi: 10.1007/978-3-031-08411-9_10.
Index Terms

Computer Science
Information Sciences

Keywords

Cloud computing (CC) Database as a Service (DBaaS) Database Security Challenges