A Comprehensive Overview of Privacy and Data Security for Cloud Storage

Authors

  • Dr. Nikhat Akhtar  Assistant Professor, Department of Computer Science & Engineering, Babu Banarasi Das Northern India Institute of Technology (BBDNIIT), Lucknow, Uttar Pradesh, India
  • Dr. Bedine Kerim  Assistant Professor, Department of Computer Science, Faculty of Computer Science & IT, Al Baha University, Al Baha, KSA
  • Dr. Yusuf Perwej  Associate Professor, Department of Computer Science & Engineering, India
  • Dr. Anurag Tiwari  Associate Professor, Department of Information Technology, Babu Banarasi Das National Institute of Technology and Management (BBDNITM), Lucknow, Uttar Pradesh, India
  • Dr. Sheeba Praveen  Assistant Professor, Department of Computer Science & Engineering, Integral University, Lucknow, Uttar Pradesh, India

DOI:

https://doi.org//10.32628/IJSRSET21852

Keywords:

Cloud Computing, Data Security, Artificial Intelligence as a Service (AIaaS), Cloud Storage, Data Access Control, Data Privacy.

Abstract

People used to carry their documents about on CDs only a few years ago. Many people have recently turned to memory sticks. Cloud computing, in this case, refers to the capacity to access and edit data stored on remote servers from any Internet-connected platform. Cloud computing is a self-service Internet infrastructure that allows people to access computing resources at any location worldwide. The world has altered as a result of cloud computing. Cloud computing can be thought of as a new computing typology that can provide on-demand services at a low cost. By increasing the capacity and flexibility of data storage and providing scalable compute and processing power that fits the dynamic data requirements, cloud computing has aided the advancement of IT to higher heights. In the field of information technology, privacy and data security have long been a serious concern. It becomes more severe in the cloud computing environment because data is stored in multiple locations, often across the globe. Users' primary challenges regarding the cloud technology revolve around data security and privacy. We conduct a thorough assessment of the literature on data security and privacy issues, data encryption technologies, and related countermeasures in cloud storage systems in this study. Ubiquitous network connectivity, location-independent resource pooling, quick resource flexibility, usage-based pricing, and risk transference are all features of cloud computing.

References

  1. Yusuf Perwej, “An Experiential Study of the Big Data,” for published in the International Transaction of Electrical and Computer Engineers System (ITECES), USA, Vol. 4, No. 1, page 14-25, March 2017, DOI:10.12691/iteces-4-1-3.
  2. L. Catarinucci, D. De Donno, L. Mainetti, L. Palano, L. Patrono, M.L. Stefanizzi, et al., "An iot-aware architecture for smart healthcare systems", IEEE Internet of Things Journal, vol. 2, no. 6, pp. 515-526, 2015
  3. Nikhat Akhtar, Firoj Parwej, Yusuf Perwej, “A Perusal of Big Data Classification and Hadoop Technology”, International Transaction of Electrical and Computer Engineers System (ITECES), USA, Volume 4, No. 1, Pages 26-38, 2017, DOI: 10.12691/iteces-4-1-4
  4. Y. Zhang, "Research on the security mechanism of cloud computing service model," Autom. Control Comput. Sci., vol. 50, no. 2, pp. 98-106, Mar. 2016
  5. P. G. Shynu and K. J. Singh, "A comprehensive survey and analysis on access control schemes in cloud environment," Inf. Technol., vol. 16, no. 1, pp. 19-38, 2016
  6. R. K. Aluvalu and L. Muddana, "A survey on access control models in cloud computing," in Proc. 49th Annu. Conv. Comput. Soc. India (CSI), vol. 1, pp. 653-664, 2015
  7. J. Li, Y. Zhang, X. Chen, and Y. Xiang, "Secure attribute-based data sharing for resource-limited users in cloud computing," Comput. Secur., vol. 72, pp. 1_2, Jan. 2018
  8. Z. Xiao andY.Xiao, “Security and privacy in cloud computing,” IEEE Communications Surveys & Tutorials, vol. 15, no. 2, pp. 843–859, 2013
  9. Yusuf Perwej, M. K. Omer, O. E. Sheta, Hani Ali M. Harb, M. S. Adrees, “The Future of Internet of Things (IoT) and Its Empowering Technology”, International Journal of Engineering Science and Computing (IJESC), Vol. 9, Iss., No.3, Pages 20192– 20203, 2019
  10. D. Sun, G. Chang, L. Sun, and X. Wang, “Surveying and analyzingsecurity, privacy and trust issues in cloud computing environments,” in Proceedings of the International Conference on Advanced in Control Engineering and Information Science (CEIS'11), pp. 2852–2856, chn, August 2011
  11. M. Y. A. Younis and K. Kifayat, “Secure cloud computing for critical infrastructure: a survey,” Tech. Rep., Liverpool John Moores University, Liverpool, UK, 2013
  12. J. Yang and Z. Chen, “Cloud computing research and security issues,” in Computational Intelligence and Software Engineering (CiSE), 2010 International Conference on. IEEE, pp. 1–3, 2010
  13. E. Aguiar, Y. Zhang, and M. Blanton, “An overview of issues and recent developments in cloud computing and storage security,” in High Performance Cloud Auditing and Applications. Springer, pp. 3–33, 2014
  14. L. Wei, H. Zhu, Z. Cao, X. Dong, W. Jia, Y. Chen, and A. V. Vasilakos, “Security and privacy for storage and computation in cloud computing,” Information Sciences, vol. 258, pp. 371–386, 2014
  15. A. Behl, “Emerging security challenges in cloud computing: an insight to cloud security challenges and their mitigation”, Proceedings of the World Congress on Information and Communication Technologies (WICT '11), pp. 217–222, IEEE, 2011
  16. Z. Zhou and D. Huang, “Efficient and secure data storage operations for mobile cloud computing,” in Proceedings of the 8th International Conference on Network and Service Management. International Federation for Information Processing, pp. 37–45, 2012
  17. D. Chen and H. Zhao, “Data security and privacy protection issues in cloud computing,” in Proceeding of the International Conference on Computer Science and Electronics Engineering (ICCSEE '12), vol. 1, pp. 647–651,Hangzhou, China, March 2012
  18. S. Pearson, “Privacy, security and trust in cloud computing,” in Privacy and Security for Cloud Computing, Computer Communications and Networks, pp. 3–42, Springer London, 2013
  19. R. Latif, H. Abbas, S. Assar, and Q. Ali, “Cloud computing risk assessment: a systematic literature review,” in Future Information Technology, pp. 285–295, Springer, Berlin, Germany, 2014
  20. Jemal, H., Kechaou, Z., Ayed, M.B., Alimi, A.M., “Mobile cloud computing in healthcare system.”, Computational Collective Intelligence. Springer International Publishing, Cham, pp. 408–417, 2015
  21. P. G. Shynu and K. J. Singh, "A comprehensive survey and analysis on access control schemes in cloud environment," Inf. Technol., vol. 16, no. 1, pp. 19-38, 2016.
  22. Lo'ai, A.T., Bakhader, W., Mehmood, R., Song, H., 2016. Cloudlet-based mobile cloud computing for healthcare applications. In: 2016 IEEE Global Communications Conference (GLOBECOM). IEEE, pp. 1–6.
  23. Yusuf Perwej, S. A. Hannan, Firoj Parwej, Nikhat Akhtar ,“A Posteriori Perusal of Mobile Computing”, International Journal of Computer Applications Technology and Research, ATS (Association of Technology and Science), Vol. 3, Issue 9, pp. 569 - 578, 2014, DOI: 10.7753/IJCATR0309.1008
  24. Johanna Ullrich, Tanja Zseby. Network-Based Secret Communication in Clouds: A Survey. IEEE communications surveys & tutorials, vol. 19, no. 2, second quarter 2017
  25. D. Zhe,W. Qinghong, S. Naizheng, and Z.Yuhan, "Study on data security policy based on cloud storage," in Proc. IEEE IEEE 3rd Int. Conf. Big Data Secur. Cloud (BigDataSecurity) Int. Conf. High Perform. Smart Comput., (HPSC) IEEE Int. Conf. Intell. Data Secur. (IDS), China, pp. 145-149, 2017
  26. Al-Mushayt O, Haq K and Yusuf P., “Electronic-Government in Saudi Arabia; a Positive Revolution in the Peninsula”, International Transactions in Applied Sciences, India, 1(1), 87-98, 2009
  27. Oussous, Ahmed, Benjelloun, Fatima-Zahra, Lahcen, Ayoub Ait, Belfkih, Samir, “Big data technologies: a survey”, J. King Saud Univ.-Comput. Inf. Sci. 30 (4), 431– 448, 2018
  28. R. Zhang, R. Xue, and L. Liu, "Searchable encryption for healthcare clouds: A survey," IEEE Trans. Service Comput., vol. 11, no. 6, pp. 978_996, Nov./Dec. 2018.
  29. Zhang Jie. Fu, Xinle. Wu. Toward Efficient Multi-keyword Fuzzy Search over Encrypted Out sourced Data with Accuracy Improvement. IEEE Transactions on Information Forensics and Security, vol. 11, no. 12, pp. 2706-2716, Dec. 2016
  30. Yusuf Perwej, “ The Hadoop Security in Big Data: A Technological Viewpoint and Analysis ”, International Journal of Scientific Research in Computer Science and Engineering, E-ISSN: 2320-7639, Volume 7, Issue 3, Pages 1- 14, 2019, DOI: 10.26438/ijsrcse/v7i3.1014
  31. Firoj Parwej, Nikhat Akhtar, Yusuf Perwej, “A Close-Up View About Spark in Big Data Jurisdiction”, International Journal of Engineering Research and Application, Vol. 8, Issue 1, PP. 26-41, 2018 DOI: 10.9790/9622-0801022641
  32. Nikhat Akhtar, Yusuf Perwej, “The Internet of Nano Things (IoNT) Existing State and Future Prospects”, GSC Advanced Research and Reviews, Volume 5, Issue 2, Pages 131-150, 2020, DOI: 10.30574/gscarr.2020.5.2.0110
  33. Yusuf Perwej, “A Pervasive Review of Blockchain Technology and Its Potential Applications”, Open Science Journal of Electrical and Electronic Engineering (OSJEEE), New York, USA, Volume 5, No. 4, Pages 30 - 43, 2018
  34. K. Edemacu, H. K. Park, B. Jang, and J. W. Kim, “Privacy provision in collaborative Ehealth with attribute-based encryption: Survey, challenges and future directions”, IEEE Access, vol. 7, pp. 89614-89636, 2019
  35. Yusuf Perwej, Firoj Parwej, Mumdouh Mirghani Mohamed Hassan, Nikhat Akhtar, “The Internet-of-Things (IoT) Security: A Technological Perspective and Review”, International Journal of Scientific Research in Computer Science Engineering and Information Technology (IJSRCSEIT), Volume 5, Issue 1, Pages 462-482, February 2019, DOI: 10.32628/CSEIT195193
  36. Tara Salman, Maede Zolanvari. Security Services Using Blockchains: A State-of-the-Art Survey. IEEE communications surveys & tutorials, vol. 21, no. 1, 2019
  37. Yusuf Perwej, Nikhat Akhtar, Firoj Parwej, “A Technological Perspective of Blockchain Security”, International Journal of Recent Scientific Research (IJRSR), ISSN: 0976-3031, Volume 9, Issue 11, (A), Pages 29472 – 29493, 2018, DOI: 10.24327/ijrsr.2018.0911.2869
  38. J. Cha, S. K. Singh, T. W. Kim, and J. H. Park, "Blockchain-empowered cloud architecture based on secret sharing for smart city," J. Inf. Secur. Appl., vol. 57, Mar. 2021, Art. no. 102686
  39. Nikhat Akhtar, Saima Rahman, Halima Sadia, Yusuf Perwej, “A Holistic Analysis of Medical Internet of Things (MIoT)”, Journal of Information and Computational Science (JOICS), ISSN: 1548 - 7741, Volume 11, Issue 4, Pages 209 - 222, 2021, DOI:10.12733/JICS.2021/V11I3.535569.31023
  40. Jeffrey C. Kimmell at.al.,”Recurrent Neural Networks Based Online Behavioural Malware Detection Techniques for Cloud Infrastructure”,IEEE, PP. 68066 – 68080, Vol. 9, 2021
  41. Yusuf Perwej, “Recurrent Neural Network Method in Arabic Words Recognition System”, International Journal of Computer Science and Telecommunications, Sysbase Solution (Ltd), UK, London, Vol. 3, Issue 11, Pages 43-48, 2012
  42. Yusuf Perwej, “The Bidirectional Long-Short-Term Memory Neural Network based Word Retrieval for Arabic Documents” Transactions on Machine Learning and Artificial Intelligence (TMLAI), Society for Science and Education, Manchester, United Kingdom (UK), Vol. 03, No.01, Pages 16 – 27, 2015, DOI : 10.14738/tmlai.31.863
  43. Bader Alouffi at. al.,” A Systematic Literature Review on Cloud Computing Security: Threats and Mitigation Strategies”,IEEE, VOLUME 9, 2021
  44. Yusuf Perwej, Kashiful Haq, Firoj Parwej, M. M. Mohamed Hassan, “The Internet of Things (IoT) and its Application Domains”, International Journal of Computer Applications (IJCA) , USA , Volume 182, No.49, Pages 36- 49, 2019, DOI: 10.5120/ijca2019918763
  45. Y.-Y. Teing, A. Dehghantanha, K.-K.-R. Choo, and L. T. Yang, "Forensic investigation of P2P cloud storage services and backbone for IoT networks: BitTorrent sync as a case study," Comput. Electr. Eng., vol. 58, pp. 350_363, Feb. 2017
  46. Ferrer, A.J., Marques, J.M., Jorba, J.,. Towards the decentralized cloud. ACM Comput. Surv. 51 (6), 1–36, 2019
  47. Firoj Parwej, Nikhat Akhtar, Yusuf Perwej, “An Empirical Analysis of Web of Things (WoT)”, International Journal of Advanced Research in Computer Science, Vol. 10, No. 3, PP. 32-40, 2019, DOI: 10.26483/ijarcs.v10i3.6434
  48. Kameswara Rao Poranki, Yusuf Perwej, Nikhat Akhtar,”Integration of SCM and ERP for Competitive Advantage”, TIJ's Research Journal of Science & IT Management RJSITM, International Journal Research Journal of Science & IT Management of Singapore, ISSN:2251-1563, Singapore, Volume 04, Number 05, Pages 17-24, 2015
  49. Kameswara Rao Poranki, Asif Perwej,"The buying Attitudes of Consumers of Cosmetic Products in Saudi Arabia", TIJ's Research Journal of Social Science & Management RJSSM, International Journal Research Journal of Social Science & Management of Singapore, Volume: 04, Number: 08, December 2014 Page 138-145, 2014
  50. J. W. Rittinghouse and J. F. Ransome, Cloud computing: implementation management and security, CRC press, 2016
  51. Ning Cao, Cong Wang, Ming Li, Kui Ren and Wenjing Lou, "Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data", IEEE Transactions on Parallel and Distributed Systems, vol. 25, no. 1, 2014
  52. N. Abbas, A. Zhang, Y. Taherkordi and T. Skeie, "Mobile edge computing: A survey", IEEE Int. Things J., vol. 5, no. 1, pp. 450-465, Feb. 2018
  53. Cristian Chilipirea at.al.,” A Comparison of Private Cloud Systems”, 30th International Conference on Advanced Information Networking and Applications Workshops (WAINA),IEEE, Switzerland, 2016
  54. J. Chase and D. Niyato, "Joint optimization of resource provisioning in cloud computing", IEEE Transactions on Services Computing, vol. 10, pp. 396-409, 2017
  55. Kyriakos Kritikos at. al.,” Towards the Modelling of Hybrid Cloud Applications”, IEEE 12th International Conference on Cloud Computing (CLOUD), IEEE, Italy, 2019
  56. X. L. Xingong and X. Lv, "Distributed Cloud Storage and Parallel Topology Processing of Power Network", Third International Conference on Trustworthy Systems and Their Applications pages 18-22 Wuhan China, Sept. 2016
  57. M. K. Skadsem, R. Karlsen, G. Blair and K. Mitchell, "Community Cloud – Cloud Computing for the Community", Proceedings of the 1st International Conference on Cloud Computing and Services Science, pp. 418-423, 2011
  58. Mohamed M. M., "Current Services in Cloud Computing: A Survey", International Journal of Computer Science Engineering and Information Technology, vol. 3, no. 5, 2013
  59. M. Bist, M. Wariya and A. Agarwal, "Comparing delta open stack and xen cloud platforms: A survey on open source iaas", Advance Computing Conference (IACC) 2013 IEEE 3rd International, pp. 96-100, 2013
  60. Yucong Duan at. al.,” Everything as a Service (XaaS) on the Cloud: Origins, Current and Future Trends ”, IEEE 8th International Con. on Cloud Computing, IEEE, USA, 2015
  61. Yusuf Perwej, M. A. AbouGhaly, Bedine Kerim, Hani Ali Mahmoud Harb. “An Extended Review on Internet of Things (IoT) and its Promising Applications”, Communications on Applied Electronics (CAE), New York, USA, Volume 9, Number 26, Pages 8– 22, 2019, DOI: 10.5120/cae2019652812
  62. Gabriella Laatikainen and Arto Ojala, "saas architecture andx pricing models", IEEE international conf. on services computing, pp. 597-604, 2014
  63. Asif Perwej, “Effective Management of Customer Relationship Management (CRM) In Banking Industry”. YOJNA The Management Journal of KITE Group, Vol. No. 2 & 3, No. 1, 2010
  64. T. F. M. Pasquier, J. Singh and J. Bacon, "Information flow control for strong protection with flexible sharing in paas", Cloud Engineering (IC2E) 2015 IEEE International Conference on, pp. 279-282, 2015
  65. Yusuf Perwej, “An Evaluation of Deep Learning Miniature Concerning in Soft Computing”, the International Journal of Advanced Research in Computer and Communication Engineering (IJARCCE), Volume 4, Issue 2, Pages 10 - 16, 2015, DOI: 10.17148/IJARCCE.2015.4203
  66. Asif Perwej, Kashiful Haq, Yusuf Perwej, “ Blockchain and its Influence on Market”, International Journal of Computer Science Trends and Technology (IJCST), Volume 7, Issue 5, Pages 82- 91, Sep – Oct 2019, DOI: 10.33144/23478578/IJCST-V7I5P10
  67. Nikhat Akhtar, Yusuf Perwej, “ The Internet of Nano Things (IoNT) Existing State and Future Prospects” , GSC Advanced Research and Reviews, Volume 5, Issue 2, Pages 131-150, 2020, DOI: 10.30574/gscarr.2020.5.2.0110
  68. Yusuf Perwej, Md. Husamuddin, Fokrul Alom Mazarbhuiya,“An Extensive Investigate the MapReduce Technology”, International Journal of Computer Sciences and Engineering (IJCSE), Volume-5, Issue-10, Page No. 218-225, 2017, DOI: 10.26438/ijcse/v5i10.218225
  69. T. Lynn et al., "A Preliminary Review of Enterprise Serverless Cloud Computing (Function-as-a-Service) Platforms", Proc. CloudCom, 2017
  70. Lins, S., Pandl, K.D., T., H. et al. “Artificial Intelligence as a Service”, Bus Inf Syst Eng 63, PP. 441–456, 2021
  71. Yusuf Perwej , Firoj Parwej, “A Neuroplasticity (Brain Plasticity) Approach to Use in Artificial Neural Network”, International Journal of Scientific & Engineering Research (IJSER), France , ISSN 2229 – 5518, Volume 3, Issue 6, Pages 1- 9, 2012, DOI: 10.13140/2.1.1693.2808
  72. Nikhat Akhtar, Dr. Yusuf Perwej, Firoj Parwej, Jai Pratap Dixit, “A Review of Solving Real Domain Problems in Engineering for Computational Intelligence Using Soft Computing” Proceedings of the 11th INDIACom; INDIACom-2017; IEEE Conference, 4th International Conference on “Computing for Sustainable Global Development”, ISSN 0973-7529; ISBN 978-93-80544-24-3, Pages 706–711, Bharati Vidyapeeth's Institute of Computer Applications and Management (BVICAM), Delhi, 2017
  73. S. Kibe, T. Koyama and M. Uehara, "The Evaluations of Desktop as a Service in an Educational Cloud", 15th International Conference on Network-Based Information Systems, 2015
  74. T. Wood, E. Cecchet, K. K. Ramakrishnan, P. Shenoy, J. Van der Merwe and A. Venkataramani, "Disaster recovery as a cloud service: Economic benefits & deployment challenges", 2nd USENIX Work. on Hot Topics in Cloud Computing, 2010
  75. Shicong Meng at.al., “Enhanced Monitoring-as-a-Service for Effective Cloud Management”, IEEE Transactions on Computers, Volume: 62, Issue 9, PP. 1705 – 1720, 2013
  76. C. Wang, Q. Wang, K. Ren, N. Cao and W. Lou, "Towards Secure and Dependable Storage Services in Cloud Computing", IEEE Transactions on Cloud Computing Date of Publication, vol. 5, no. 2, April-June 2012
  77. Y. Cao, C. Chen, F. Guo, D. Jiang, Y. Lin, B. Ooi, et al., ES2: A Cloud Data Storage System for Supporting Both OLTP and OLAP, PP 34-46, 2018
  78. Wassim Itani Ayman Kayssi Ali Chehab, "Privacy as a Service: Privacy-Aware Data Storage and Processing in Cloud Computing Architectures", Eighth IEEE International Conference on Dependable, 2009
  79. H. Abu-Libdeh, L. Princehouse, and H. Weatherspoon. RACS: A Case for Cloud Storage Diversity. In Proceedings of the 1st ACM symposium on Cloud computing (SoCC 2010), Indianapolis, IN, June 10-11 2010
  80. M. Wajahat, A. Yele, T. Estro, A. Gandhi and E. Zadok, "Distribution fitting and performance modeling for storage traces", Proc. of IEEE Mascots, pp. 138-151, 2019
  81. Chang Guo, Ying Li and Zhonghai Wu, "SLA-DO: A SLA-based Data Distribution Strategy on Multiple Cloud Storage Systems", IEEE 22nd Int. Conference on Parallel and Distributed Systems (ICPADS), pp. 602-609, 2016
  82. N. Cao, C. Wang, M. Li, K. Ren and W. Lou, "Privacy preserving Multi keyword Ranked Search over Encrypted Cloud Data", 30thIEEE Conference on Computer Communications, pp. 829-837, 2011
  83. Xiaotong Sun, "Critical Security Issues in Cloud Computing: A Survey", 4th IEEE International Conference on Big Data Security on Cloud, 2018
  84. C. Wang, K. Ren, W. Lou, and J. Li, “Toward publicly auditable secure cloud data storage services,” Network, IEEE, vol. 24, no. 4, pp. 19–24, 2010
  85. L. Wei, H. Zhu, Z. Cao, X. Dong, W. Jia, Y. Chen, and A. V. Vasilakos, “Security and privacy for storage and computation in cloud computing,” Information Sciences, vol. 258, pp. 371–386, 2014
  86. United Nations, “The Universal Declaration of Human Rights.” http://www.un.org/en/documents/udhr/index.shtml, 1948. Retrieved August 2021
  87. D. Bigo, G. Boulet, C. Bowden, S. Carrera, J. Jeandesboz, and A. Scherrer, “Fighting cybercrime and protecting privacy in the cloud.” European Parliament, Policy Department C: Citizens' Rights and Constitutional Affairs, 2012
  88. Wei Nie, Xiangfei Xiao, Zhaohui Wu, Yuanhui Wu, Fang Shen and Xionglan Luo, "The Research of Information Security for The Education Cloud Platform Based on AppScan Technology", 5th IEEE International Conference on Cyber Security and Cloud Computing (CSCloud), 2018
  89. Z. Zhou and D. Huang, “Efficient and secure data storage operations for mobile cloud computing,” in Proceedings of the 8th International Conference on Network and Service Management. International Federation for Information Processing, pp. 37–45, 2012
  90. A. M. Farooqi at.al.,“The notorious nine: top cloud computing security challenges in 2017”, International Journal of Advanced Research in Computer Science, Vol. 8, No. 5, PP. 2804 – 2808, 2017
  91. Hongwei Li, Yuanshun Dai1, Ling Tian, “Identity based authentication for cloud computing”, Springer-Verlag Berlin Heidelberg, pp 157- 166, 2009
  92. Priya anand, jungwoo ryoo, hyoungshick kim "addressing security challenges in cloud computing a pattern-based approach”, first international conference on software security and assurance, 2016, doi 10.1109/icssa.2015.1113
  93. Z. Zhang, C. Wu and D. W. L. Cheung, "A survey on cloud interoperability: taxonomies standards and practice", SIGMETRICS Perform. Eval. Rev., vol. 40, pp. 13-22, 2013
  94. S. T. Zargar, J. Joshi and D. Tipper, "A Survey of Defense Mechanisms Against Distributed Denial of Service (DDoS) Flooding Attacks", IEEE Communications Surveys & Tutorials, vol. 15, no. 4, pp. 2046-2069
  95. K. Hashizume, D. G. Rosado, E. Fern´andez-Medina, and E. B. Fernandez, “An analysis of security issues for cloud computing,” Journal of Internet Services and Applications, vol. 4, no. 1, pp. 1–13, 2013
  96. Kiattikul Treseangrat, Samad Salehi Kolahi and Bahman Sarrafpour, "Analysis of UDP DDoS cyber Flood Attack and Defence Mechanism on Windows Serevr 2012 and Linux Ubuntu 13", IEEE, 2015
  97. Istvan Kiss, Piroska Haller and Adela Beres, "Denial of Service attack Detection in case of Tennessee Eastman challenge process" in 8th INTER-ENG 2014, Romania, vol. 19, pp. 835-841, 2015
  98. G. Rydstedt, E. Bursztein, D. Boneh and C. Jackson, "Busting frame busting: a study of clickjacking vulnerabilities at popular sites", IEEE SSP, vol. 2, 2010
  99. H. Hlavacs, T. Treutner, J.-P. Gelas, L. Lefevre, and A.-C. Orgerie, “Energy consumption side-channel attack at virtual machines in a cloud,” in Dependable, Autonomic and Secure Computing (DASC), 2011 IEEE Ninth International Conference on. IEEE, pp. 605–612, 2011
  100. B. C. Neuman and T. Ts'o, "Kerberos: An Authentication Service for Computer Networks", IEEE Communicaion, vol. 32, no. 9, pp. 33-38, 1994
  101. Garbarino S, Holland J,”Quantitative and Qualitative Methods in Impact Evaluation and Measuring Results”, GSDRC Emerging Issues Research Service, pp: 1-59, 2009
  102. Nakouri, I.; Hamdi, M.; Kim, T.H. A new biometric-based security framework for cloud storage. In Proceedings of the 13th International Wireless Communications and Mobile Computing Conference (IWCMC), Valencia, Spain, 26–30, pp. 390–395, 2017
  103. Liang, X.,Shetty, S.; Zhang, L. Kamhoua, C., Kwiat, K. Man in the Cloud (MITC) Defender: SGX-Based User Credential Protection for Synchronization Applications in Cloud Computing Platform. In Proceedings of the IEEE 10th International Conference on Cloud Computing (CLOUD), Honolulu, CA, USA, 25–30, pp. 302–309, 2017 
  104. Yusuf Perwej, Md. Husamuddin, Majzoob K.Omer, Bedine Kerim, “A Comprehend the Apache Flink in Big Data Environments” , IOSR Journal of Computer Engineering (IOSR-JCE), Volume 20, Issue 1, Ver. IV, Pages 48-58, 2018, DOI: 10.9790/0661-2001044858
  105. L. A. Gordon, M. P. Loeb and W. Lucyshyn, "Sharing information on computer systems security: An economic analysis", Journal of Accounting and Public Policy, vol. 22, no. 6, pp. 461-485, 2003
  106. Balogh, Z., Tur?áni, M.”Modeling of data security in cloud computing”, In IEEE Annual Systems Conference, pp. 1–6. IEEE, 2016
  107. Meng, D.” Data security in cloud computing”, In IEEE International Conference on Computer Science & Education, pp. 810–813. IEEE, 2013
  108. An, Y.Z., Zaaba, Z.F., Samsudin, N.F.”Reviews on security issues and challenges in cloud computing”, In IOP Conference Series: Materials Science and Engineering, vol. 160, p. 012106. IOP Publishing, 2016
  109. H. Takabi, J.B.D. Joshi and G. Ahn, "Security and privacy challenges in cloud computing environments", IEEE security privacy magazine, vol. 8, pp. 24-31, 2010
  110. lbugmi, A.A., Alassafi, M.O., Walters, R., Wills, G.” Data security in cloud computing”, In IEEE Fifth International Conference on Future Generation Communication Technologies, pp. 55–59, IEEE, 2016
  111. A. Sahai and B. Waters, "Fuzzy identity-based encryption," in Proc. 24th Annu. Int. Conf. Theory Appl. Cryptograph. Techn. Berlin, Germany: Springer, pp. 457- 473, 2005
  112. R. L. Rivest, L. Adleman, andM. L.Dertouzos, “On data banks and privacy homomorphisms,” Foundations of Secure Computation, vol. 4, no. 11, pp. 169–180, 1978
  113. C. Gentry, A fully homomorphic encryption scheme Ph.D. thesis], Stanford University, 2009
  114. Y. Rouselakis and B. Waters, "Ef_cient statically-secure large-universe multi-authority attribute-based encryption," in Proc. Int. Conf. Financial Cryptogr. Data Secur., pp. 315-332, 2015
  115. Q. Li, J. Ma, R. Li, X. Liu, J. Xiong, and D. Chen, "Secure, efficient and revocable multi-authority access control system in cloud storage," Comput. Secur., vol. 59, pp. 45_59, 2016
  116. X. Liu, Y. Xia, S. Jiang, F. Xia, and Y. Wang, "Hierarchical attributebased access control with authentication for outsourced data in cloud computing," in Proc. 12th IEEE Int. Conf. Trust Secur. Privacy Comput. Commun., pp. 477-484, 2013
  117. F. Pagano and D. Pagano, “Using in-memory encrypted databases on the cloud,” in Proceedings of the 1st IEEE International Workshop on Securing Services on the Cloud (IWSSC '11), pp. 30–37, 2011
  118. K.Huang and R. Tso, “A commutative encryption scheme based on ElGamal encryption,” in Proceedings of the 3rd International Conference on Information Security and Intelligent Control (ISIC'12), pp. 156–159, IEEE, 2012
  119. D. H. Rachel and S. Prathiba, "An enhanced Hasbe for cloud computing environment," Int. J. Comput. Sci. Mobile Comput., vol. 2, no. 4, pp. 396_401, 2013
  120. Z.Wan, J. Liu, and R. H. Deng, "HASBE: A hierarchical attribute-based solution for flexible and scalable access control in cloud computing," IEEE Trans. Inf. Forensics Security, vol. 7, no. 2, pp. 743_754, Apr. 2012
  121. Q. Huang, Y. Yang, and M. Shen, "Secure and ef_cient data collaboration with hierarchical attribute-based encryption in cloud computing," Future Gener. Comput. Syst., vol. 72, pp. 239_249, Jul. 2017
  122. S. Gokuldev and S. Leelavathi, "HASBE: A hierarchical attribute-based solution for flexible and scalable access control by separate encryption/ decryption in cloud computing," Int. J. Eng. Sci. Innov. Technol.,vol. 2, no. 3, pp. 1_7, 2013
  123. A. Rao, “Centralized database security in cloud,” International Journal of Advanced Research in Computer and Communication Engineering, vol. 1, pp. 544–549, 2012
  124. E. M.Mohamed, H. S. Abdelkader, and S. El-Etriby, “Enhanced data security model for cloud computing,” in Proceedings of the 8th International Conference on Informatics and Systems (INFOS '12), pp. CC-12–CC-17, IEEE, 2012
  125. W. Sun, B.Wang, N. Cao, M. Li,W. Lou, Y. T. Hou, and H. Li, "Privacy preserving multi-keyword text search in the cloud supporting similarity based ranking," in Proc. 8th ACM SIGSAC Symp. Inf. Comput. Comm. Secur., pp. 71_82, 2013
  126. N. Cao, C. Wang, M. Li, K. Ren, and W. Lou, "Privacy-preserving multi-keyword ranked search over encrypted cloud data," in Proc. IEEE INFOCOM, Apr., pp. 829_837, 2011
  127. C. Wang, N. Cao, K. Ren, and W. Lou, "Enabling secure and ef_cient ranked keyword search over outsourced cloud data," IEEE Trans. Parallel Distrib. Syst., vol. 23, no. 8, pp. 1467_1479, Aug. 2012
  128. N. Cao, C.Wang, M. Li, K. Ren, andW. Lou, "Privacy-preserving multikeyword ranked search over encrypted cloud data," IEEE Trans. Parallel Distrib. Syst., vol. 25, no. 1, pp. 222_233, Nov. 2013
  129. M. Fujimoto at.al.,” Detecting Abuse of Domain Administrator Privilege Using Windows Event Log”, IEEE Conference on Application, Information and Network Security (AINS),IEEE, Malaysia, 2019
  130. C. Delettre, K. Boudaoud, and M. Riveill, “Cloud computing, security and data concealment,” in Proceedings of the 16th IEEE Symposium on Computers and Comm. (ISCC '11), pp. 424–431, Kerkyra, Greece, July 2011
  131. Yusuf Perwej, Asif Perwej, Firoj Parwej, “An Adaptive Watermarking Technique for the copyright of digital images and Digital Image Protection”, International Journal of Multimedia & Its Applications (IJMA), Academy & Industry Research Collaboration Center (AIRCC) , USA , Volume 4, No.2, Pages 21- 38, 2012, DOI: 10.5121/ijma.2012.4202
  132. A. Ra_que, D. V. Landuyt, B. Lagaisse, and W. Joosen, "Policy-driven data management middleware for multi-cloud storage in multi-tenant SaaS," in Proc. IEEE Int. Symp. Big Data Comput. (BDC), pp. 78_84, Dec. 2015
  133. C. Ngo, Y. Demchenko, and C. de Laat, "Multi-tenant attribute-based access control for cloud infrastructure services," J. Inf. Secur. Appl., vol. 27, pp. 65_84, Apr. 2016
  134. D. Gonzales, J. M. Kaplan, E. Saltzman, Z. Winkelman, and D. Woods, "Cloud-trust_A security assessment model for infrastructure as a service (IaaS) clouds," IEEE Trans. Cloud Comput., vol. 5, no. 3, pp. 523_536, Jul./Sep. 2017
  135. J. Zhou et al., "Security and privacy for cloud-based IoT: Challenges", IEEE Communications Magazine, vol. 55, no. 1, pp. 26-33, 2017
  136. C. Stergiou et al., "Secure integration of IoT and cloud computing", Future Generation Computer Systems, vol. 78, pp. 964-975, 2018
  137. S. Kianoush et al., "A cloud-IoT platform for passive radio sensing: Challenges and application case studies", IEEE Internet of Things Journal, vol. 5, no. 5, pp. 3624-3636, 2018
  138. E. Pinheiro, W.-D.Weber, and L. A. Barroso, “Failure trends in a large disk drive population,” in Proceedings of the 5th USENIX conference on File and Storage Technologies (FAST '07), vol. 7, pp. 17–23, 2007
  139. C. Cachin and M. Schunter, “A cloud you can trust,” IEEE Spectrum, vol. 48, no. 12, pp. 28–51, 2011
  140. J. Idziorek, M. Tannian, and D. Jacobson, “Attribution of Fraudulent Resource Consumption in the cloud,” in Proceedings of the IEEE 5th International Conference on Cloud Computing (CLOUD '12), pp. 99–106, June 2012
  141. D. Wang, D. He, P. Wang and C.-H. Chu, "Anonymous two-factor authentication in distributed systems: certain goals are beyond attainment", IEEE Trans. Dependable Secur. Comput., vol. 12, no. 4, pp. 428-442, 2015
  142. T. Galibus, V. V. Krasnoproshin, R. Albuquerque and E. Freitas, Elements of Cloud Storage Security: Concepts Designs and Optimized Practices, Berlin:Springer, 2016
  143. S. M. Riazul, Islam, Daehan Kwak, M.D. Humaun Kabir and Mahmud Hossain, "The Internet of Things for Health Care: A Comprehensive Survey", IEEE, vol. 3, pp. 678-708, 2015
  144. T. S. Az-Zahra, "The Advantages from Cloud Computing Application Towards SMME (UMKM)", Journal Online Informatika, vol. 4, pp. 28-32, 2019
  145. C. T. S. Xue and F. T. W. Xin, "Benefits and challenges of the adoption of cloud computing in business", International Journal on Cloud Computing: Services and Architecture, vol. 6, pp. 01-15, 2016
  146. Y. Al-Dhuraibi, F. Paraiso, N. Djarallah and P. Merle, "Elasticity in cloud computing: state of the art and research challenges", IEEE Transactions on Services Computing, vol. 11, pp. 430-447, 2017
  147. Yusuf Perwej, Faiyaz Ahamad, Mohammad Zunnun Khan, Nikhat Akhtar, “An Empirical Study on the Current State of Internet of Multimedia Things (IoMT)”, International Journal of Engineering Research in Computer Science and Engineering (IJERCSE), Volume 8, Issue 3, Pages 25 - 42, March 2021, DOI: 10.1617/vol8/iss3/pid85026
  148. Sultan Aldossary, William Allen, “Data Security, Privacy, Availability and Integrity in Cloud Computing: Issues and Current Solutions”, International Journal of Advanced Computer Science and Applications, Vol. 7, 2016
  149. I. Nwobodo, "Cloud computing: models services utility advantages security issues and prototype", Wireless Communications Networking and Applications, pp. 1207-1222, 2016
  150. P. A. Abdalla and A. Varol, "Advantages to Disadvantages of Cloud Computing for Small-Sized Business", 7th International Symposium on Digital Forensics and Security (ISDFS), 2019

Downloads

Published

2021-10-30

Issue

Section

Research Articles

How to Cite

[1]
Dr. Nikhat Akhtar, Dr. Bedine Kerim, Dr. Yusuf Perwej, Dr. Anurag Tiwari, Dr. Sheeba Praveen, " A Comprehensive Overview of Privacy and Data Security for Cloud Storage, International Journal of Scientific Research in Science, Engineering and Technology(IJSRSET), Print ISSN : 2395-1990, Online ISSN : 2394-4099, Volume 8, Issue 5, pp.113-152, September-October-2021. Available at doi : https://doi.org/10.32628/IJSRSET21852