CFP last date
20 January 2025
Reseach Article

A Review on Data Security in Cloud Computing

by Aized Amin Soofi, M. Irfan Khan, Fazal-e-amin
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 94 - Number 5
Year of Publication: 2014
Authors: Aized Amin Soofi, M. Irfan Khan, Fazal-e-amin
10.5120/16338-5625

Aized Amin Soofi, M. Irfan Khan, Fazal-e-amin . A Review on Data Security in Cloud Computing. International Journal of Computer Applications. 94, 5 ( May 2014), 12-20. DOI=10.5120/16338-5625

@article{ 10.5120/16338-5625,
author = { Aized Amin Soofi, M. Irfan Khan, Fazal-e-amin },
title = { A Review on Data Security in Cloud Computing },
journal = { International Journal of Computer Applications },
issue_date = { May 2014 },
volume = { 94 },
number = { 5 },
month = { May },
year = { 2014 },
issn = { 0975-8887 },
pages = { 12-20 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume94/number5/16338-5625/ },
doi = { 10.5120/16338-5625 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:16:47.244767+05:30
%A Aized Amin Soofi
%A M. Irfan Khan
%A Fazal-e-amin
%T A Review on Data Security in Cloud Computing
%J International Journal of Computer Applications
%@ 0975-8887
%V 94
%N 5
%P 12-20
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Cloud computing is an Internet-based computing and next stage in evolution of the internet. It has received significant attention in recent years but security issue is one of the major inhibitor in decreasing the growth of cloud computing. It essentially shifts the user data and application software to large datacenters i. e, cloud, which is remotely located, at which user does not have any control and the management of data may not be completely secure. However, this sole feature of the cloud computing introduce many security challenges which need to be resolved and understood clearly. One of the most important and leading is security issue that needs to be addressed. Data Security concerns arising because both user data and program are located in provider premises. In this study, an attempt is made to review the research in this field. The results of review are categorized on the basis of type of approach and the type of validation used to validate the approach.

References
  1. NIST SP 800-145, "A NIST definition of cloud computing", [online] 2012, http://csrc. nist. gov/publications/drafts/800-145/Draft-SP- 800-145_cloud-definition. pdf (Accessed: 23 December 2013).
  2. Gartner,"What you need to know about cloud computing security and compliance"(Heiser J), [online] 2009, https://www. gartner. com/doc/1071415/need-know-cloud- computing- Security (Accessed 23 December 2013).
  3. IDG Cloud Computing Survey: "Security, Integration Challenge Growth", [online] http://www. forbes. com/sites/louiscolumbus/2013/08/13/idg- cloud-computing-survey- (Accessed: 28 December 2013).
  4. Ricadela, "Cloud security is looking overcast"[online] http://www. businessweek. com/magazine/cloud-security- is-lookin g-overcast-09012011. html. (Accessd: 29December 2013).
  5. Nguyen, "Only seven percent of UK it services in the cloud, says survey,Computerworld"[online] http://www. itworld. com/ cloud-computing/200657/only- seven-percent-uk-it-services-cloud-says- surveyS. (Accessed: 29 December 2013).
  6. Elahi, T. , & Pearson, S. (2007). Privacy Assurance: Bridging the Gap Between Preference and Practice. In C. Lambrinoudakis, G. Pernul & A. Tjoa (Eds. ), Trust, Privacy and Security in Digital Business (Vol. 4657, pp. 65-74): Springer Berlin Heidelberg.
  7. Siani Pearson, "Taking Account of Privacy when Designing Cloud Computing Services," CLOUD'09, May 23, 2009, Vancouver, Canada, pp. 44-52.
  8. European Network and Information Security Agency (ENISA)"Benefits, risks and recommendations for information security"[online] http://www. enisa. europa. eu/activities/riskmanagement/files/ deliverables/cloud-computing- risk-assessment. (Accessed: 28. December 2013).
  9. Cloud Security Alliance, "Security Guidance for Critical Areas of Focus in Cloud Computing"[online] https://cloudsecurityalliance. org/csaguide. pdf (Accessed 26 December2013)
  10. J. Archer et al. , "Top Threats to Cloud Computing," in Cloud Security Alliance [online] https://cloudsecurityalliance. org/topthreats/csathreats. v1. 0. pdf (Accessed: 26 December 2013).
  11. Crampton, J. , Martin, K. , & Wild, P. (2006, 0-0 0). On key assignment for hierarchical access control. Paper presented at the Computer Security Foundations Workshop, 2006. 19th IEEE.
  12. D. Feng, et al. "Study on cloud computing security. " Journal of Software 22. 1 (2011): pp. 71-83.
  13. R. Chow, et al. , "Controlling data in the cloud: Outsourcing computation without outsourcing control," presented at the Proceedings of the 2009 ACM workshop on Cloud computing security, Chicago, Illinois, USA, 2009.
  14. S. Dawn Xiaoding, et al. , "Practical techniques for searches on encrypted data," in Security and Privacy, 2000. S&P 2000. Proceedings. 2000 IEEE Symposium on, 2000, pp. 44-55.
  15. Michael Annbrust etc. ,Above the Clouds: A Berkeley View of Cloud Computing, http: //eecs. berkeley. edu/Pubs/TechRpts/2009 /EECS 2009-28. pdf:2009. 2 .
  16. Deyan, C. , & Hong, Z. (2012, 23-25 March 2012). Data Security and Privacy Protection Issues in Cloud Computing. Paper presented at the Computer Science and Electronics Engineering (ICCSEE), 2012 International Conference on.
  17. Seccombe, A. , Hutton, A. , Meisel, A. , Windel, A. , Mohammed, A. , & Licciardi, A. (2009). Security guidance for critical areas of focus in cloud computing, v2. 1. Cloud Security Alliance.
  18. T. Mather and S. Latif, "Cloud Security and Privacy,[online] 2009, http://www. slideshare. net/USFstudent1980/cloud- computing security-concerns (Accessed: 4 September 2013)
  19. IBM, "what is cloud computing" [online] http://www. ibm. com/cloud- computing/in/en/what- is-cloud-computing. html (Accessed: 14 December 2013)
  20. Mell Peter and Grance Tim, "Effectively and securely using the cloud computing paradigm" [online] 2011, http://csrc. nist. gov/groups/SNS/cloud computing/cloudcomputing-v26. ppt (Accessed 18 August 2013).
  21. Subashini, S. , & Kavitha, V. (2011). A survey on security issues in service delivery models of cloud computing. Journal of Network and Computer Applications, 34(1), 1- 11.
  22. Sarwar, A. , & Khan, M. N. (2013). A Review of Trust Aspects in Cloud Computing Security. International Journal of Cloud Computing and Services Science (IJ-CLOSER), 2(2), 116-122.
  23. Sun, D. , Chang, G. , Sun, L. , & Wang, X. (2011). Surveying and Analyzing Security, Privacy and Trust Issues in Cloud Computing Environments. Procedia Engineering, 15(0), 2852-2856.
  24. Brereton, P. , Kitchenham, B. A. , Budgen, D. , Turner, M. , & Khalil, M. (2007). Lessons from applying the systematic literature review process within the software engineering domain. Journal of Systems and Software, 80(4), 571-583.
  25. Fazal-e-Amin, A. K. M. , & Oxley, A. (2010). A review on aspect oriented implementation of software product lines components. Information Technology Journal, 9(6), 1262-1269.
  26. Fazal-e-Amin, A. K. M. , & Oxley, A. (2011). A Review of Software Component Reusability Assessment Approaches. Research Journal of Information Technology, 3(1), 1-11.
  27. Somani, U. , Lakhani, K. , & Mundra, M. (2010, 28-30 Oct. 2010). Implementing digital signature with RSA ncryption algorithm to enhance the Data Security of cloud in Cloud Computing. Paper presented at the Parallel Distributed and Grid Computing (PDGC), 2010 1st International Conference on.
  28. Vamsee k and sriram r,(2011) "Data Security in Cloud Computing,"in Journal of Computer and Mathematical Sciences Vol. 2, pp. 1-169.
  29. Shuai, H. , & Jianchuan, X. (2011, 15-17 Sept. 2011). Ensuring data storage security through a novel third party auditor scheme in cloud computing. Paper presented at the Cloud Computing and Intelligence Systems (CCIS), 2011 IEEE International Conference on.
  30. Sood, S. K. (2012). A combined approach to ensure data security in cloud computing. Journal of Network and Computer Applications, 35(6), 1831-1838.
  31. Parsi Kalpana & Sudha Singaraju (2012). Data Security in Cloud Computing using RSA Algorithm. International Journal of Research in Computer and Communication technology( IJRCCT), vol 1, Issue 4.
  32. Mohamed, E. M. , Abdelkader, H. S. , & El-Etriby, S. (2012,14-16 May 2012). Enhanced data security model for cloud computing. Paper presented at the Informatics and Systems (INFOS), 2012 8th International Conference on.
  33. Singh, J. , Kumar, B. , & Khatri, A. (2012, 6-8 Dec. 2012). Improving stored data security in Cloud using Rc5 algorithm. Paper presented at the Engineering (NUiCONE), 2012 Nirma University International Conference on.
  34. Lan, Z. , Varadharajan, V. , & Hitchens, M. (2013). Achieving Secure Role-Based Access Control on Encrypted Data in Cloud Storage. Information Forensics and Security, IEEE Transactions on, 8(12), 1947-1960.
  35. Taeho, J. , Xiang-Yang, L. , Zhiguo, W. , & Meng, W. (2013, 14-19 April 2013). Privacy preserving cloud data access with multi-authorities. Paper presented at the INFOCOM, 2013 Proceedings IEEE.
  36. Ching-Nung, Y. , & Jia-Bin, L. (2013, 2-5 July 2013). Protecting Data Privacy and Security for Cloud Computing Based on Secret Sharing. Paper presented at the Biometrics and Security Technologies (ISBAST), 2013 International Symposium on.
  37. Abolghasemi, M. S. , Sefidab, M. M. , & Atani, R. E. (2013, 22-25 Aug. 2013). Using location based encryption to improve the security of data access in cloud computing. Paper presented at the Advances in Computing, Communications and Informatics (ICACCI), 2013 International Conference on.
  38. Rewagad, P. , & Pawar, Y. (2013, 6-8 April 2013). Use of digital Signature with Diffie Hellman Key Exchange and AES Encryption Algorithm to Enhance Data Security in Cloud Computing. Paper presented at the Communication Systems and Network Technologies CSNT), 2013 International Conference on.
  39. Yau, S. S. , & An, H. G. (2010). Protection of users' data confidentiality in cloud computing. Paper presented at the Proceedings of the Second Asia-Pacific Symposium on Internetware.
  40. Feng-qing, Z. , & Dian-Yuan, H. (2012, 24-26 Aug. 2012). Applying agents to the data security in cloud computing. Paper presented at the Computer Science and Information Processing (CSIP), 2012 International Conference on.
  41. Zhongbin, T. , Xiaoling, W. , Li, J. , Xin, Z. , & Wenhui, M. (2012, 27-30 May 2012). Study on Data Security of Cloud Computing. Paper presented at the Engineering and Technology (S-CET), 2012 Spring Congress on.
  42. Rachna, A. , and Anshu, P. (Jul-Aug 2013). Secure User Data in Cloud Computing Using Encryption Algorithms in International Journal of Engineering Research and Applications (IJERA), 3(4),1922-1926.
  43. Ko, R. K. L. , Kirchberg, M. , & Bu Sung, L. (2011, 3-5 Aug. 2011). From system-centric to data-centric logging Accountability, trust & security in cloud computing. Paper presented at the Defense Science Research Conference and Expo (DSR), 2011.
  44. Gawali, M. B. , & Wagh, R. B. (2012, 6-8 Dec. 2012). Enhancement for data security in cloud computing environment. Paper presented at the Engineering (NUiCONE), 2012 Nirma University International Conference on.
  45. Wei, L. , Zhu, H. , Cao, Z. , Dong, X. , Jia, W. , Chen, Y. , et al. (2014). Security and privacy for storage and computation in cloud computing. Information Sciences, 258(0), 371-386.
  46. Rashid, F. , Miri, A. , & Woungang, I. (2013, June 28 2013-July 3 2013). Secure Enterprise Data Deduplication in the Cloud. Paper presented at the Cloud Computing (CLOUD), 2013 IEEE Sixth International Conference on.
  47. Cong, W. , Qian, W. , Kui, R. , & Wenjing, L. (2009, 13-15 July 2009). Ensuring data storage security in Cloud Computing. Paper presented at the Quality of Service, 2009. IWQoS. 17th International Workshop on.
  48. Tribhuwan, M. R. , Bhuyar, V. A. , & Pirzade, S. (2010, 16-17 Oct. 2010). Ensuring Data Storage Security in Cloud Computing through Two-Way Handshake Based on Token Management. Paper presented at the Advances in Recent Technologies in Communication and Computing (ARTCom), 2010 International Conference on.
  49. Leistikow, R. , & Tavangarian, D. (2013, 25-28 March 2013). Secure Picture Data Partitioning for Cloud Computing Services. Paper presented at the Advanced Information Networking and Applications Workshops (WAINA), 2013 27th International Conference on.
  50. Delettre, C. , Boudaoud, K. , & Riveill, M. (2011, June 28 2011-July 1 2011). Cloud computing, security and data concealment. Paper presented at the Computers and Communications (ISCC), 2011 IEEE Symposium on.
  51. Mishra, R. , Dash, S. K. , Mishra, D. P. , & Tripathy, A. (2011, 8-10 April 2011). A privacy preserving repository for securing data across the cloud. Paper presented at the Electronics Computer Technology (ICECT), 2011 3rd International Conference on.
  52. Syam Kumar, P. , Subramanian, R. , & Thamizh Selvam, D. (2010, 28-30 Oct. 2010). Ensuring data storage security in cloud computing using Sobol Sequence. Paper presented at the Parallel Distributed and Grid Computing (PDGC), 2010 1st International Conference on.
  53. Anane, R. , Dhillon, S. , & Bordbar, B. (2008). Stateless data concealment for distributed systems. Journal of Computer and System Sciences, 74(2), 243-254.
Index Terms

Computer Science
Information Sciences

Keywords

Data security cloud data concealment cloud security review