CFP last date
20 January 2025
Reseach Article

A Review of Data Security Issues in Cloud Environment

by Sahil Zatakiya, Pranav Tank
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 82 - Number 17
Year of Publication: 2013
Authors: Sahil Zatakiya, Pranav Tank
10.5120/14254-2352

Sahil Zatakiya, Pranav Tank . A Review of Data Security Issues in Cloud Environment. International Journal of Computer Applications. 82, 17 ( November 2013), 15-18. DOI=10.5120/14254-2352

@article{ 10.5120/14254-2352,
author = { Sahil Zatakiya, Pranav Tank },
title = { A Review of Data Security Issues in Cloud Environment },
journal = { International Journal of Computer Applications },
issue_date = { November 2013 },
volume = { 82 },
number = { 17 },
month = { November },
year = { 2013 },
issn = { 0975-8887 },
pages = { 15-18 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume82/number17/14254-2352/ },
doi = { 10.5120/14254-2352 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:57:58.915660+05:30
%A Sahil Zatakiya
%A Pranav Tank
%T A Review of Data Security Issues in Cloud Environment
%J International Journal of Computer Applications
%@ 0975-8887
%V 82
%N 17
%P 15-18
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Cloud computing technology is becoming as the next generation architecture of IT industry. It offered many services over the internet. So it is novel pattern of computing where resources are provided on demand via internet. Being pay-as-you-go model, cloud users lease the required resource and pay for their usages only. Today cloud computing is an attractive topic in field of Research and Development. It has many potential advantage and many enterprise applications and data are moving to public or hybrid cloud. But yet many numbers of business-critical applications, organizations, large enterprise wouldn't move them to cloud because of security issues. So from the users' perspective, cloud security concerns, data security and privacy protection issues, remain them primary problem for using cloud computing. In this paper we analyzed security and privacy issues associated with cloud computing and describes some reason for why all IT company are not used cloud and give solution of some issues. Also discuss various attacks against Cloud architecture.

References
  1. Cloud Security Alliance, Security Guidance for Critical Areas of Focus in Cloud Computing, V3. 1,http://www. cloudsecurityalliance. org/guidance/csaguide. v3. 1. pdf. Nov 2011.
  2. W. Jansen, T. Grance "Guidelines on Security and Privacy in Public Cloud Computing" NIST Special Publication 800-144, December 2011.
  3. Kaufman, Halper , Hurwitz, Bllor "Cloud Computing for Dummies" Wiley India.
  4. RAN Shuanglin "Data Security Policy In The Cloud Computing" IEEE July 14-17, 2012.
  5. Qi Zhang, Lu Cheng, Raouf Boutaba "Cloud computing: state-of-the-art and research challenges" Springer, 20 April 2010.
  6. Tim Mather, Subra, Kumaraswamy, Shahed Latif "Cloud Security and Privacy" O'Reilly, September 2009.
  7. B. Meena, K. Abhishek Challa "Cloud Computing Security Issues with Possible Solutions" International Journal of Computer Science And Technology, Vol. 3, Issue 1, Jan. – March 2012.
  8. Prashant Rewagad, Yogita Pawar "Use of Digital Signature with Diffie Hellman Key Exchange and AES Encryption Algorithm to Enhance Data Security in Cloud Computing" IEEE ,2013.
  9. Uma Somani, Kanika Lakhani, Manish Mundra "Implementing Digital Signature with RSA Encryption Algorithm to Enhance the Data Security of Cloud in Cloud Computing" IEEE, 2010.
  10. C. Wang, K. Ren, W. Lou, J. Li "Toward Publicly Auditable Secure Cloud Data Storage Services" IEEE Network , July/August 2010.
  11. Hiren Patel, Dhiren Patel, Jagdish Chaudhari, Sachin Patel, K. Prajapati "Tradeoffs between Performance and Security of Cryptographic Primitives Used in Storage as a Service for Cloud Computing" ACM, September 2012.
  12. M. Dubal, Mahesh T R, Pinaki A Ghosh "Design of New Security Algorithm Using Hybrid Cryptography Architecture" IEEE, 2011.
  13. R. Shaikh , M. Sasikumar "Trust Framework for Calculating Security Strength of a Cloud Service" IEEE , Oct. 19-20, 2012.
  14. Mohamed Hamdi "Security of Cloud Computing, Storage, and Networking" IEEE, 2012.
  15. S. Sengupta, V. Kaulgud, V. Saujanya Sharma "Cloud Computing Security-Trends and Research Directions" IEEE, 2012.
  16. M. Tebaa, S. EL Hajji, A. EL Ghazi "Homomorphic Encryption method applied to Cloud Computing" IEEE, 2012.
  17. B. Makhija, V. Gupta, I. Rajput "Enhanced Data Security in Cloud Computing with Third Party Auditor" International Journal of Advanced Research in Computer Science and Software Engineering, Volume 3, Issue 2, February 2013.
  18. Ateniese, G. , Burns, R. , and Curtmola, R. , Provable Data Possession in Untrusted Stores, Proceedings of the 14th ACM conference on Computer and Communication Security, 2007.
  19. Govinda. K, Sathiyamoorthy. E, Surbhit Agarwal "Secure Key Exchange for Cloud Environment Using Cellular Automata with Triple-DES and Error Detection" International Journal of Engineering and Technology, Vol 5 No 2 Apr-May 2013.
Index Terms

Computer Science
Information Sciences

Keywords

Cloud computing security Data integrity and privacy.