We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 November 2024
Reseach Article

Cloud Computing: Data Storage Security Analysis and its Challenges

by Navdeep Aggarwal, Parshant Tyagi, Bhanu P. Dubey, Emmanuel S. Pilli
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 70 - Number 24
Year of Publication: 2013
Authors: Navdeep Aggarwal, Parshant Tyagi, Bhanu P. Dubey, Emmanuel S. Pilli
10.5120/12216-8359

Navdeep Aggarwal, Parshant Tyagi, Bhanu P. Dubey, Emmanuel S. Pilli . Cloud Computing: Data Storage Security Analysis and its Challenges. International Journal of Computer Applications. 70, 24 ( May 2013), 33-37. DOI=10.5120/12216-8359

@article{ 10.5120/12216-8359,
author = { Navdeep Aggarwal, Parshant Tyagi, Bhanu P. Dubey, Emmanuel S. Pilli },
title = { Cloud Computing: Data Storage Security Analysis and its Challenges },
journal = { International Journal of Computer Applications },
issue_date = { May 2013 },
volume = { 70 },
number = { 24 },
month = { May },
year = { 2013 },
issn = { 0975-8887 },
pages = { 33-37 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume70/number24/12216-8359/ },
doi = { 10.5120/12216-8359 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:33:43.909050+05:30
%A Navdeep Aggarwal
%A Parshant Tyagi
%A Bhanu P. Dubey
%A Emmanuel S. Pilli
%T Cloud Computing: Data Storage Security Analysis and its Challenges
%J International Journal of Computer Applications
%@ 0975-8887
%V 70
%N 24
%P 33-37
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Cloud computing is emerging as a new technology in the field of computing which effects many aspects of computing. The users are enabled to move their data and application software to the network and access the services on-demand. Moving data outside the organizational boundaries and access them through internet makes complete loss of control from the owner's side. The data over the cloud servers is easily accessed by both the computing providers and law enforcement agencies easier in comparison to data stored on your local disk. Cloud brings many different security issues and among them data security acts as one of the major challenge in cloud computing. Data security becomes an important issue for securing outsourced data and to maintain a level of trust among data owners. In this paper we will analyze the security requirements and the various approaches for data security. We also highlight the new emerging research challenges in data security and privacy.

References
  1. T. Hsin-Yi, M. Siebenhaar, A. Miede, H. Yu-Lun, and R. Steinmetz, "Threat as a Service?: Virtualization's Impact on Cloud Security," IT Professional, vol. 14, no. 1, pp. 32-37.
  2. Z. Xiao and Y. Xiao, "Security and Privacy in Cloud Computing," Communications Surveys & Tutorials, IEEE, vol. PP, no. 99, pp. 1-17.
  3. Amazon. com, (2008), "Amazon Web Services(AWS)"," Available: Online at http://aws. amazon. com,
  4. S. Sakr, A. Liu, D. M. Batista, and M. Alomari, "A Survey of Large Scale Data Management Approaches in Cloud Environments," IEEE Communications Surveys & Tutorials, vol. 13, no. 3, pp. 311-336.
  5. Q. Zhang, L. Cheng, and R. Boutaba, "Cloud computing: state-of-the-art and research challenges," Journal of Internet Services and Applications, vol. 1, no. 1, pp. 7-18.
  6. C. Deyan and Z. Hong, "Data Security and Privacy Protection Issues in Cloud Computing," in International Conference on Computer Science and Electronics Engineering (ICCSEE), 2012 pp. 647-651.
  7. A. M. Talib, R. Atan, R. Abdullah, and M. Azrifah, "CloudZone: Towards an integrity layer of cloud data storage based on multi agent system architecture," in Open Systems (ICOS), pp. 127-132.
  8. W. Cong, R. Kui, L. Wenjing, and L. Jin, "Toward publicly auditable secure cloud data storage services," IEEE Network, vol. 24, no. 4, pp. 19-24.
  9. P. You, P. Yuxing, W. Liu, and S. Xue, "Security Issues and Solutions in Cloud Computing," in Distributed Computing Systems Workshops (ICDCSW), , pp. 573-577.
  10. S. Subashini and V. Kavitha, "Review: A survey on security issues in service delivery models of cloud computing," J. Netw. Comput. Appl. , vol. 34, no. 1, pp. 1-11.
  11. K. Jinzhu, "A Practical Approach to Improve the Data Privacy of Virtual Machines," in Computer and Information Technology (CIT), 2010 IEEE 10th International Conference on, 2010, pp. 936-941.
  12. J. Szefer, P. Jamkhedkar, C. Yu-Yuan, and R. B. Lee, "Physical attack protection with human-secure virtualization in data centers," in Dependable Systems and Networks Workshops (DSN-W), 2012 IEEE/IFIP 42nd International Conference on, pp. 1-6.
  13. Z. Siqin, C. Kang, and Z. Weimin, "Secure Logging for Auditable File System Using Separate Virtual Machines," in Parallel and Distributed Processing with Applications, 2009 IEEE International Symposium on, 2009, pp. 153-160.
  14. W. Fu and X. Li, "The study on data security in Cloud Computing based on Virtualization," in International Symposium on IT in Medicine and Education (ITME), 2011 pp. 257-261.
  15. A. Jasti, P. Shah, R. Nagaraj, and R. Pendse, "Security in multi-tenancy cloud," in IEEE International Carnahan Conference on Security Technology (ICCST), 2010 pp. 35-41.
  16. Z. Xiao, D. Hong-tao, C. Jian-quan, L. Yi, and Z. Lei-jie, "Ensure Data Security in Cloud Storage," in Network Computing and Information Security (NCIS), 2011 International Conference on, pp. 284-287.
  17. Y. Xiaojun and W. Qiaoyan, "A View about Cloud Data Security from Data Life Cycle," in Computational Intelligence and Software Engineering (CiSE), 2010 International Conference on, pp. 1-4.
  18. X. Zhifeng and X. Yang, "Accountable MapReduce in cloud computing," in Computer Communications Workshops (INFOCOM WKSHPS), 2011 IEEE Conference on, pp. 1082-1087.
  19. K. S. Sandeep, "A combined approach to ensure data security in cloud computing," J. Netw. Comput. Appl. , vol. 35, no. 6, pp. 1831-1838.
  20. W. Jian, Z. Yan, J. Shuo, and L. Jiajin, "Providing privacy preserving in cloud computing," in International Conference on Test and Measurement, (ICTM '09) 2009, pp. 213-216.
  21. X. Xu and J. Yan, "Research on Cloud Computing Security Platform," in Computational and Information Sciences (ICCIS), 2012 Fourth International Conference on, pp. 799-802.
  22. S. Manavi, S. Mohammadalian, N. I. Udzir, and A. Abdullah, "Hierarchical secure virtualization model for cloud," in Cyber Security, Cyber Warfare and Digital Forensic (CyberSec), 2012 International Conference on, pp. 219-224.
  23. Y. Z. Jian Wang, Jiajin Le, "A New Privacy Preserving Approach used in Cloud Computing," vol. Vols. 439-440, pp. 439-440, 2010.
  24. R. Ranchal, B. Bhargava, L. B. Othmane, L. Lilien, K. Anya, K. Myong, and M. Linderman, "Protection of Identity Information in Cloud Computing without Trusted Third Party," in Reliable Distributed Systems, 2010 29th IEEE Symposium on, pp. 368-372.
Index Terms

Computer Science
Information Sciences

Keywords

Cloud computing data privacy cloud data storage security