A Comprehensive Overview of Privacy and Data Security for Cloud Storage
DOI:
https://doi.org/10.32628/IJSRSET21852Keywords:
Cloud Computing, Data Security, Artificial Intelligence as a Service (AIaaS), Cloud Storage, Data Access Control, Data Privacy.Abstract
People used to carry their documents about on CDs only a few years ago. Many people have recently turned to memory sticks. Cloud computing, in this case, refers to the capacity to access and edit data stored on remote servers from any Internet-connected platform. Cloud computing is a self-service Internet infrastructure that allows people to access computing resources at any location worldwide. The world has altered as a result of cloud computing. Cloud computing can be thought of as a new computing typology that can provide on-demand services at a low cost. By increasing the capacity and flexibility of data storage and providing scalable compute and processing power that fits the dynamic data requirements, cloud computing has aided the advancement of IT to higher heights. In the field of information technology, privacy and data security have long been a serious concern. It becomes more severe in the cloud computing environment because data is stored in multiple locations, often across the globe. Users' primary challenges regarding the cloud technology revolve around data security and privacy. We conduct a thorough assessment of the literature on data security and privacy issues, data encryption technologies, and related countermeasures in cloud storage systems in this study. Ubiquitous network connectivity, location-independent resource pooling, quick resource flexibility, usage-based pricing, and risk transference are all features of cloud computing.
References
- Yusuf Perwej, “An Experiential Study of the Big Data,” for published in the International Transaction of Electrical and Computer Engineers System (ITECES), USA, Vol. 4, No. 1, page 14-25, March 2017, DOI:10.12691/iteces-4-1-3.
- L. Catarinucci, D. De Donno, L. Mainetti, L. Palano, L. Patrono, M.L. Stefanizzi, et al., "An iot-aware architecture for smart healthcare systems", IEEE Internet of Things Journal, vol. 2, no. 6, pp. 515-526, 2015
- Nikhat Akhtar, Firoj Parwej, Yusuf Perwej, “A Perusal of Big Data Classification and Hadoop Technology”, International Transaction of Electrical and Computer Engineers System (ITECES), USA, Volume 4, No. 1, Pages 26-38, 2017, DOI: 10.12691/iteces-4-1-4
- Y. Zhang, "Research on the security mechanism of cloud computing service model," Autom. Control Comput. Sci., vol. 50, no. 2, pp. 98-106, Mar. 2016
- P. G. Shynu and K. J. Singh, "A comprehensive survey and analysis on access control schemes in cloud environment," Inf. Technol., vol. 16, no. 1, pp. 19-38, 2016
- R. K. Aluvalu and L. Muddana, "A survey on access control models in cloud computing," in Proc. 49th Annu. Conv. Comput. Soc. India (CSI), vol. 1, pp. 653-664, 2015
- J. Li, Y. Zhang, X. Chen, and Y. Xiang, "Secure attribute-based data sharing for resource-limited users in cloud computing," Comput. Secur., vol. 72, pp. 1_2, Jan. 2018
- Z. Xiao andY.Xiao, “Security and privacy in cloud computing,” IEEE Communications Surveys & Tutorials, vol. 15, no. 2, pp. 843–859, 2013
- Yusuf Perwej, M. K. Omer, O. E. Sheta, Hani Ali M. Harb, M. S. Adrees, “The Future of Internet of Things (IoT) and Its Empowering Technology”, International Journal of Engineering Science and Computing (IJESC), Vol. 9, Iss., No.3, Pages 20192– 20203, 2019
- D. Sun, G. Chang, L. Sun, and X. Wang, “Surveying and analyzingsecurity, privacy and trust issues in cloud computing environments,” in Proceedings of the International Conference on Advanced in Control Engineering and Information Science (CEIS'11), pp. 2852–2856, chn, August 2011
- M. Y. A. Younis and K. Kifayat, “Secure cloud computing for critical infrastructure: a survey,” Tech. Rep., Liverpool John Moores University, Liverpool, UK, 2013
- J. Yang and Z. Chen, “Cloud computing research and security issues,” in Computational Intelligence and Software Engineering (CiSE), 2010 International Conference on. IEEE, pp. 1–3, 2010
- E. Aguiar, Y. Zhang, and M. Blanton, “An overview of issues and recent developments in cloud computing and storage security,” in High Performance Cloud Auditing and Applications. Springer, pp. 3–33, 2014
- L. Wei, H. Zhu, Z. Cao, X. Dong, W. Jia, Y. Chen, and A. V. Vasilakos, “Security and privacy for storage and computation in cloud computing,” Information Sciences, vol. 258, pp. 371–386, 2014
- A. Behl, “Emerging security challenges in cloud computing: an insight to cloud security challenges and their mitigation”, Proceedings of the World Congress on Information and Communication Technologies (WICT '11), pp. 217–222, IEEE, 2011
- Z. Zhou and D. Huang, “Efficient and secure data storage operations for mobile cloud computing,” in Proceedings of the 8th International Conference on Network and Service Management. International Federation for Information Processing, pp. 37–45, 2012
- D. Chen and H. Zhao, “Data security and privacy protection issues in cloud computing,” in Proceeding of the International Conference on Computer Science and Electronics Engineering (ICCSEE '12), vol. 1, pp. 647–651,Hangzhou, China, March 2012
- S. Pearson, “Privacy, security and trust in cloud computing,” in Privacy and Security for Cloud Computing, Computer Communications and Networks, pp. 3–42, Springer London, 2013
- R. Latif, H. Abbas, S. Assar, and Q. Ali, “Cloud computing risk assessment: a systematic literature review,” in Future Information Technology, pp. 285–295, Springer, Berlin, Germany, 2014
- Jemal, H., Kechaou, Z., Ayed, M.B., Alimi, A.M., “Mobile cloud computing in healthcare system.”, Computational Collective Intelligence. Springer International Publishing, Cham, pp. 408–417, 2015
- P. G. Shynu and K. J. Singh, "A comprehensive survey and analysis on access control schemes in cloud environment," Inf. Technol., vol. 16, no. 1, pp. 19-38, 2016.
- Lo'ai, A.T., Bakhader, W., Mehmood, R., Song, H., 2016. Cloudlet-based mobile cloud computing for healthcare applications. In: 2016 IEEE Global Communications Conference (GLOBECOM). IEEE, pp. 1–6.
- Yusuf Perwej, S. A. Hannan, Firoj Parwej, Nikhat Akhtar ,“A Posteriori Perusal of Mobile Computing”, International Journal of Computer Applications Technology and Research, ATS (Association of Technology and Science), Vol. 3, Issue 9, pp. 569 - 578, 2014, DOI: 10.7753/IJCATR0309.1008
- Johanna Ullrich, Tanja Zseby. Network-Based Secret Communication in Clouds: A Survey. IEEE communications surveys & tutorials, vol. 19, no. 2, second quarter 2017
- D. Zhe,W. Qinghong, S. Naizheng, and Z.Yuhan, "Study on data security policy based on cloud storage," in Proc. IEEE IEEE 3rd Int. Conf. Big Data Secur. Cloud (BigDataSecurity) Int. Conf. High Perform. Smart Comput., (HPSC) IEEE Int. Conf. Intell. Data Secur. (IDS), China, pp. 145-149, 2017
- Al-Mushayt O, Haq K and Yusuf P., “Electronic-Government in Saudi Arabia; a Positive Revolution in the Peninsula”, International Transactions in Applied Sciences, India, 1(1), 87-98, 2009
- Oussous, Ahmed, Benjelloun, Fatima-Zahra, Lahcen, Ayoub Ait, Belfkih, Samir, “Big data technologies: a survey”, J. King Saud Univ.-Comput. Inf. Sci. 30 (4), 431– 448, 2018
- R. Zhang, R. Xue, and L. Liu, "Searchable encryption for healthcare clouds: A survey," IEEE Trans. Service Comput., vol. 11, no. 6, pp. 978_996, Nov./Dec. 2018.
- Zhang Jie. Fu, Xinle. Wu. Toward Efficient Multi-keyword Fuzzy Search over Encrypted Out sourced Data with Accuracy Improvement. IEEE Transactions on Information Forensics and Security, vol. 11, no. 12, pp. 2706-2716, Dec. 2016
- Yusuf Perwej, “ The Hadoop Security in Big Data: A Technological Viewpoint and Analysis ”, International Journal of Scientific Research in Computer Science and Engineering, E-ISSN: 2320-7639, Volume 7, Issue 3, Pages 1- 14, 2019, DOI: 10.26438/ijsrcse/v7i3.1014
- Firoj Parwej, Nikhat Akhtar, Yusuf Perwej, “A Close-Up View About Spark in Big Data Jurisdiction”, International Journal of Engineering Research and Application, Vol. 8, Issue 1, PP. 26-41, 2018 DOI: 10.9790/9622-0801022641
- Nikhat Akhtar, Yusuf Perwej, “The Internet of Nano Things (IoNT) Existing State and Future Prospects”, GSC Advanced Research and Reviews, Volume 5, Issue 2, Pages 131-150, 2020, DOI: 10.30574/gscarr.2020.5.2.0110
- Yusuf Perwej, “A Pervasive Review of Blockchain Technology and Its Potential Applications”, Open Science Journal of Electrical and Electronic Engineering (OSJEEE), New York, USA, Volume 5, No. 4, Pages 30 - 43, 2018
- K. Edemacu, H. K. Park, B. Jang, and J. W. Kim, “Privacy provision in collaborative Ehealth with attribute-based encryption: Survey, challenges and future directions”, IEEE Access, vol. 7, pp. 89614-89636, 2019
- Yusuf Perwej, Firoj Parwej, Mumdouh Mirghani Mohamed Hassan, Nikhat Akhtar, “The Internet-of-Things (IoT) Security: A Technological Perspective and Review”, International Journal of Scientific Research in Computer Science Engineering and Information Technology (IJSRCSEIT), Volume 5, Issue 1, Pages 462-482, February 2019, DOI: 10.32628/CSEIT195193
- Tara Salman, Maede Zolanvari. Security Services Using Blockchains: A State-of-the-Art Survey. IEEE communications surveys & tutorials, vol. 21, no. 1, 2019
- Yusuf Perwej, Nikhat Akhtar, Firoj Parwej, “A Technological Perspective of Blockchain Security”, International Journal of Recent Scientific Research (IJRSR), ISSN: 0976-3031, Volume 9, Issue 11, (A), Pages 29472 – 29493, 2018, DOI: 10.24327/ijrsr.2018.0911.2869
- J. Cha, S. K. Singh, T. W. Kim, and J. H. Park, "Blockchain-empowered cloud architecture based on secret sharing for smart city," J. Inf. Secur. Appl., vol. 57, Mar. 2021, Art. no. 102686
- Nikhat Akhtar, Saima Rahman, Halima Sadia, Yusuf Perwej, “A Holistic Analysis of Medical Internet of Things (MIoT)”, Journal of Information and Computational Science (JOICS), ISSN: 1548 - 7741, Volume 11, Issue 4, Pages 209 - 222, 2021, DOI:10.12733/JICS.2021/V11I3.535569.31023
- Jeffrey C. Kimmell at.al.,”Recurrent Neural Networks Based Online Behavioural Malware Detection Techniques for Cloud Infrastructure”,IEEE, PP. 68066 – 68080, Vol. 9, 2021
- Yusuf Perwej, “Recurrent Neural Network Method in Arabic Words Recognition System”, International Journal of Computer Science and Telecommunications, Sysbase Solution (Ltd), UK, London, Vol. 3, Issue 11, Pages 43-48, 2012
- Yusuf Perwej, “The Bidirectional Long-Short-Term Memory Neural Network based Word Retrieval for Arabic Documents” Transactions on Machine Learning and Artificial Intelligence (TMLAI), Society for Science and Education, Manchester, United Kingdom (UK), Vol. 03, No.01, Pages 16 – 27, 2015, DOI : 10.14738/tmlai.31.863
- Bader Alouffi at. al.,” A Systematic Literature Review on Cloud Computing Security: Threats and Mitigation Strategies”,IEEE, VOLUME 9, 2021
- Yusuf Perwej, Kashiful Haq, Firoj Parwej, M. M. Mohamed Hassan, “The Internet of Things (IoT) and its Application Domains”, International Journal of Computer Applications (IJCA) , USA , Volume 182, No.49, Pages 36- 49, 2019, DOI: 10.5120/ijca2019918763
- Y.-Y. Teing, A. Dehghantanha, K.-K.-R. Choo, and L. T. Yang, "Forensic investigation of P2P cloud storage services and backbone for IoT networks: BitTorrent sync as a case study," Comput. Electr. Eng., vol. 58, pp. 350_363, Feb. 2017
- Ferrer, A.J., Marques, J.M., Jorba, J.,. Towards the decentralized cloud. ACM Comput. Surv. 51 (6), 1–36, 2019
- Firoj Parwej, Nikhat Akhtar, Yusuf Perwej, “An Empirical Analysis of Web of Things (WoT)”, International Journal of Advanced Research in Computer Science, Vol. 10, No. 3, PP. 32-40, 2019, DOI: 10.26483/ijarcs.v10i3.6434
- Kameswara Rao Poranki, Yusuf Perwej, Nikhat Akhtar,”Integration of SCM and ERP for Competitive Advantage”, TIJ's Research Journal of Science & IT Management RJSITM, International Journal Research Journal of Science & IT Management of Singapore, ISSN:2251-1563, Singapore, Volume 04, Number 05, Pages 17-24, 2015
- Kameswara Rao Poranki, Asif Perwej,"The buying Attitudes of Consumers of Cosmetic Products in Saudi Arabia", TIJ's Research Journal of Social Science & Management RJSSM, International Journal Research Journal of Social Science & Management of Singapore, Volume: 04, Number: 08, December 2014 Page 138-145, 2014
- J. W. Rittinghouse and J. F. Ransome, Cloud computing: implementation management and security, CRC press, 2016
- Ning Cao, Cong Wang, Ming Li, Kui Ren and Wenjing Lou, "Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data", IEEE Transactions on Parallel and Distributed Systems, vol. 25, no. 1, 2014
- N. Abbas, A. Zhang, Y. Taherkordi and T. Skeie, "Mobile edge computing: A survey", IEEE Int. Things J., vol. 5, no. 1, pp. 450-465, Feb. 2018
- Cristian Chilipirea at.al.,” A Comparison of Private Cloud Systems”, 30th International Conference on Advanced Information Networking and Applications Workshops (WAINA),IEEE, Switzerland, 2016
- J. Chase and D. Niyato, "Joint optimization of resource provisioning in cloud computing", IEEE Transactions on Services Computing, vol. 10, pp. 396-409, 2017
- Kyriakos Kritikos at. al.,” Towards the Modelling of Hybrid Cloud Applications”, IEEE 12th International Conference on Cloud Computing (CLOUD), IEEE, Italy, 2019
- X. L. Xingong and X. Lv, "Distributed Cloud Storage and Parallel Topology Processing of Power Network", Third International Conference on Trustworthy Systems and Their Applications pages 18-22 Wuhan China, Sept. 2016
- M. K. Skadsem, R. Karlsen, G. Blair and K. Mitchell, "Community Cloud – Cloud Computing for the Community", Proceedings of the 1st International Conference on Cloud Computing and Services Science, pp. 418-423, 2011
- Mohamed M. M., "Current Services in Cloud Computing: A Survey", International Journal of Computer Science Engineering and Information Technology, vol. 3, no. 5, 2013
- M. Bist, M. Wariya and A. Agarwal, "Comparing delta open stack and xen cloud platforms: A survey on open source iaas", Advance Computing Conference (IACC) 2013 IEEE 3rd International, pp. 96-100, 2013
- Yucong Duan at. al.,” Everything as a Service (XaaS) on the Cloud: Origins, Current and Future Trends ”, IEEE 8th International Con. on Cloud Computing, IEEE, USA, 2015
- Yusuf Perwej, M. A. AbouGhaly, Bedine Kerim, Hani Ali Mahmoud Harb. “An Extended Review on Internet of Things (IoT) and its Promising Applications”, Communications on Applied Electronics (CAE), New York, USA, Volume 9, Number 26, Pages 8– 22, 2019, DOI: 10.5120/cae2019652812
- Gabriella Laatikainen and Arto Ojala, "saas architecture andx pricing models", IEEE international conf. on services computing, pp. 597-604, 2014
- Asif Perwej, “Effective Management of Customer Relationship Management (CRM) In Banking Industry”. YOJNA The Management Journal of KITE Group, Vol. No. 2 & 3, No. 1, 2010
- T. F. M. Pasquier, J. Singh and J. Bacon, "Information flow control for strong protection with flexible sharing in paas", Cloud Engineering (IC2E) 2015 IEEE International Conference on, pp. 279-282, 2015
- Yusuf Perwej, “An Evaluation of Deep Learning Miniature Concerning in Soft Computing”, the International Journal of Advanced Research in Computer and Communication Engineering (IJARCCE), Volume 4, Issue 2, Pages 10 - 16, 2015, DOI: 10.17148/IJARCCE.2015.4203
- Asif Perwej, Kashiful Haq, Yusuf Perwej, “ Blockchain and its Influence on Market”, International Journal of Computer Science Trends and Technology (IJCST), Volume 7, Issue 5, Pages 82- 91, Sep – Oct 2019, DOI: 10.33144/23478578/IJCST-V7I5P10
- Nikhat Akhtar, Yusuf Perwej, “ The Internet of Nano Things (IoNT) Existing State and Future Prospects” , GSC Advanced Research and Reviews, Volume 5, Issue 2, Pages 131-150, 2020, DOI: 10.30574/gscarr.2020.5.2.0110
- Yusuf Perwej, Md. Husamuddin, Fokrul Alom Mazarbhuiya,“An Extensive Investigate the MapReduce Technology”, International Journal of Computer Sciences and Engineering (IJCSE), Volume-5, Issue-10, Page No. 218-225, 2017, DOI: 10.26438/ijcse/v5i10.218225
- T. Lynn et al., "A Preliminary Review of Enterprise Serverless Cloud Computing (Function-as-a-Service) Platforms", Proc. CloudCom, 2017
- Lins, S., Pandl, K.D., T., H. et al. “Artificial Intelligence as a Service”, Bus Inf Syst Eng 63, PP. 441–456, 2021
- Yusuf Perwej , Firoj Parwej, “A Neuroplasticity (Brain Plasticity) Approach to Use in Artificial Neural Network”, International Journal of Scientific & Engineering Research (IJSER), France , ISSN 2229 – 5518, Volume 3, Issue 6, Pages 1- 9, 2012, DOI: 10.13140/2.1.1693.2808
- Nikhat Akhtar, Dr. Yusuf Perwej, Firoj Parwej, Jai Pratap Dixit, “A Review of Solving Real Domain Problems in Engineering for Computational Intelligence Using Soft Computing” Proceedings of the 11th INDIACom; INDIACom-2017; IEEE Conference, 4th International Conference on “Computing for Sustainable Global Development”, ISSN 0973-7529; ISBN 978-93-80544-24-3, Pages 706–711, Bharati Vidyapeeth's Institute of Computer Applications and Management (BVICAM), Delhi, 2017
- S. Kibe, T. Koyama and M. Uehara, "The Evaluations of Desktop as a Service in an Educational Cloud", 15th International Conference on Network-Based Information Systems, 2015
- T. Wood, E. Cecchet, K. K. Ramakrishnan, P. Shenoy, J. Van der Merwe and A. Venkataramani, "Disaster recovery as a cloud service: Economic benefits & deployment challenges", 2nd USENIX Work. on Hot Topics in Cloud Computing, 2010
- Shicong Meng at.al., “Enhanced Monitoring-as-a-Service for Effective Cloud Management”, IEEE Transactions on Computers, Volume: 62, Issue 9, PP. 1705 – 1720, 2013
- C. Wang, Q. Wang, K. Ren, N. Cao and W. Lou, "Towards Secure and Dependable Storage Services in Cloud Computing", IEEE Transactions on Cloud Computing Date of Publication, vol. 5, no. 2, April-June 2012
- Y. Cao, C. Chen, F. Guo, D. Jiang, Y. Lin, B. Ooi, et al., ES2: A Cloud Data Storage System for Supporting Both OLTP and OLAP, PP 34-46, 2018
- Wassim Itani Ayman Kayssi Ali Chehab, "Privacy as a Service: Privacy-Aware Data Storage and Processing in Cloud Computing Architectures", Eighth IEEE International Conference on Dependable, 2009
- H. Abu-Libdeh, L. Princehouse, and H. Weatherspoon. RACS: A Case for Cloud Storage Diversity. In Proceedings of the 1st ACM symposium on Cloud computing (SoCC 2010), Indianapolis, IN, June 10-11 2010
- M. Wajahat, A. Yele, T. Estro, A. Gandhi and E. Zadok, "Distribution fitting and performance modeling for storage traces", Proc. of IEEE Mascots, pp. 138-151, 2019
- Chang Guo, Ying Li and Zhonghai Wu, "SLA-DO: A SLA-based Data Distribution Strategy on Multiple Cloud Storage Systems", IEEE 22nd Int. Conference on Parallel and Distributed Systems (ICPADS), pp. 602-609, 2016
- N. Cao, C. Wang, M. Li, K. Ren and W. Lou, "Privacy preserving Multi keyword Ranked Search over Encrypted Cloud Data", 30thIEEE Conference on Computer Communications, pp. 829-837, 2011
- Xiaotong Sun, "Critical Security Issues in Cloud Computing: A Survey", 4th IEEE International Conference on Big Data Security on Cloud, 2018
- C. Wang, K. Ren, W. Lou, and J. Li, “Toward publicly auditable secure cloud data storage services,” Network, IEEE, vol. 24, no. 4, pp. 19–24, 2010
- L. Wei, H. Zhu, Z. Cao, X. Dong, W. Jia, Y. Chen, and A. V. Vasilakos, “Security and privacy for storage and computation in cloud computing,” Information Sciences, vol. 258, pp. 371–386, 2014
- United Nations, “The Universal Declaration of Human Rights.” http://www.un.org/en/documents/udhr/index.shtml, 1948. Retrieved August 2021
- D. Bigo, G. Boulet, C. Bowden, S. Carrera, J. Jeandesboz, and A. Scherrer, “Fighting cybercrime and protecting privacy in the cloud.” European Parliament, Policy Department C: Citizens' Rights and Constitutional Affairs, 2012
- Wei Nie, Xiangfei Xiao, Zhaohui Wu, Yuanhui Wu, Fang Shen and Xionglan Luo, "The Research of Information Security for The Education Cloud Platform Based on AppScan Technology", 5th IEEE International Conference on Cyber Security and Cloud Computing (CSCloud), 2018
- Z. Zhou and D. Huang, “Efficient and secure data storage operations for mobile cloud computing,” in Proceedings of the 8th International Conference on Network and Service Management. International Federation for Information Processing, pp. 37–45, 2012
- A. M. Farooqi at.al.,“The notorious nine: top cloud computing security challenges in 2017”, International Journal of Advanced Research in Computer Science, Vol. 8, No. 5, PP. 2804 – 2808, 2017
- Hongwei Li, Yuanshun Dai1, Ling Tian, “Identity based authentication for cloud computing”, Springer-Verlag Berlin Heidelberg, pp 157- 166, 2009
- Priya anand, jungwoo ryoo, hyoungshick kim "addressing security challenges in cloud computing a pattern-based approach”, first international conference on software security and assurance, 2016, doi 10.1109/icssa.2015.1113
- Z. Zhang, C. Wu and D. W. L. Cheung, "A survey on cloud interoperability: taxonomies standards and practice", SIGMETRICS Perform. Eval. Rev., vol. 40, pp. 13-22, 2013
- S. T. Zargar, J. Joshi and D. Tipper, "A Survey of Defense Mechanisms Against Distributed Denial of Service (DDoS) Flooding Attacks", IEEE Communications Surveys & Tutorials, vol. 15, no. 4, pp. 2046-2069
- K. Hashizume, D. G. Rosado, E. Fern´andez-Medina, and E. B. Fernandez, “An analysis of security issues for cloud computing,” Journal of Internet Services and Applications, vol. 4, no. 1, pp. 1–13, 2013
- Kiattikul Treseangrat, Samad Salehi Kolahi and Bahman Sarrafpour, "Analysis of UDP DDoS cyber Flood Attack and Defence Mechanism on Windows Serevr 2012 and Linux Ubuntu 13", IEEE, 2015
- Istvan Kiss, Piroska Haller and Adela Beres, "Denial of Service attack Detection in case of Tennessee Eastman challenge process" in 8th INTER-ENG 2014, Romania, vol. 19, pp. 835-841, 2015
- G. Rydstedt, E. Bursztein, D. Boneh and C. Jackson, "Busting frame busting: a study of clickjacking vulnerabilities at popular sites", IEEE SSP, vol. 2, 2010
- H. Hlavacs, T. Treutner, J.-P. Gelas, L. Lefevre, and A.-C. Orgerie, “Energy consumption side-channel attack at virtual machines in a cloud,” in Dependable, Autonomic and Secure Computing (DASC), 2011 IEEE Ninth International Conference on. IEEE, pp. 605–612, 2011
- B. C. Neuman and T. Ts'o, "Kerberos: An Authentication Service for Computer Networks", IEEE Communicaion, vol. 32, no. 9, pp. 33-38, 1994
- Garbarino S, Holland J,”Quantitative and Qualitative Methods in Impact Evaluation and Measuring Results”, GSDRC Emerging Issues Research Service, pp: 1-59, 2009
- Nakouri, I.; Hamdi, M.; Kim, T.H. A new biometric-based security framework for cloud storage. In Proceedings of the 13th International Wireless Communications and Mobile Computing Conference (IWCMC), Valencia, Spain, 26–30, pp. 390–395, 2017
- Liang, X.,Shetty, S.; Zhang, L. Kamhoua, C., Kwiat, K. Man in the Cloud (MITC) Defender: SGX-Based User Credential Protection for Synchronization Applications in Cloud Computing Platform. In Proceedings of the IEEE 10th International Conference on Cloud Computing (CLOUD), Honolulu, CA, USA, 25–30, pp. 302–309, 2017
- Yusuf Perwej, Md. Husamuddin, Majzoob K.Omer, Bedine Kerim, “A Comprehend the Apache Flink in Big Data Environments” , IOSR Journal of Computer Engineering (IOSR-JCE), Volume 20, Issue 1, Ver. IV, Pages 48-58, 2018, DOI: 10.9790/0661-2001044858
- L. A. Gordon, M. P. Loeb and W. Lucyshyn, "Sharing information on computer systems security: An economic analysis", Journal of Accounting and Public Policy, vol. 22, no. 6, pp. 461-485, 2003
- Balogh, Z., Tur?áni, M.”Modeling of data security in cloud computing”, In IEEE Annual Systems Conference, pp. 1–6. IEEE, 2016
- Meng, D.” Data security in cloud computing”, In IEEE International Conference on Computer Science & Education, pp. 810–813. IEEE, 2013
- An, Y.Z., Zaaba, Z.F., Samsudin, N.F.”Reviews on security issues and challenges in cloud computing”, In IOP Conference Series: Materials Science and Engineering, vol. 160, p. 012106. IOP Publishing, 2016
- H. Takabi, J.B.D. Joshi and G. Ahn, "Security and privacy challenges in cloud computing environments", IEEE security privacy magazine, vol. 8, pp. 24-31, 2010
- lbugmi, A.A., Alassafi, M.O., Walters, R., Wills, G.” Data security in cloud computing”, In IEEE Fifth International Conference on Future Generation Communication Technologies, pp. 55–59, IEEE, 2016
- A. Sahai and B. Waters, "Fuzzy identity-based encryption," in Proc. 24th Annu. Int. Conf. Theory Appl. Cryptograph. Techn. Berlin, Germany: Springer, pp. 457- 473, 2005
- R. L. Rivest, L. Adleman, andM. L.Dertouzos, “On data banks and privacy homomorphisms,” Foundations of Secure Computation, vol. 4, no. 11, pp. 169–180, 1978
- C. Gentry, A fully homomorphic encryption scheme Ph.D. thesis], Stanford University, 2009
- Y. Rouselakis and B. Waters, "Ef_cient statically-secure large-universe multi-authority attribute-based encryption," in Proc. Int. Conf. Financial Cryptogr. Data Secur., pp. 315-332, 2015
- Q. Li, J. Ma, R. Li, X. Liu, J. Xiong, and D. Chen, "Secure, efficient and revocable multi-authority access control system in cloud storage," Comput. Secur., vol. 59, pp. 45_59, 2016
- X. Liu, Y. Xia, S. Jiang, F. Xia, and Y. Wang, "Hierarchical attributebased access control with authentication for outsourced data in cloud computing," in Proc. 12th IEEE Int. Conf. Trust Secur. Privacy Comput. Commun., pp. 477-484, 2013
- F. Pagano and D. Pagano, “Using in-memory encrypted databases on the cloud,” in Proceedings of the 1st IEEE International Workshop on Securing Services on the Cloud (IWSSC '11), pp. 30–37, 2011
- K.Huang and R. Tso, “A commutative encryption scheme based on ElGamal encryption,” in Proceedings of the 3rd International Conference on Information Security and Intelligent Control (ISIC'12), pp. 156–159, IEEE, 2012
- D. H. Rachel and S. Prathiba, "An enhanced Hasbe for cloud computing environment," Int. J. Comput. Sci. Mobile Comput., vol. 2, no. 4, pp. 396_401, 2013
- Z.Wan, J. Liu, and R. H. Deng, "HASBE: A hierarchical attribute-based solution for flexible and scalable access control in cloud computing," IEEE Trans. Inf. Forensics Security, vol. 7, no. 2, pp. 743_754, Apr. 2012
- Q. Huang, Y. Yang, and M. Shen, "Secure and ef_cient data collaboration with hierarchical attribute-based encryption in cloud computing," Future Gener. Comput. Syst., vol. 72, pp. 239_249, Jul. 2017
- S. Gokuldev and S. Leelavathi, "HASBE: A hierarchical attribute-based solution for flexible and scalable access control by separate encryption/ decryption in cloud computing," Int. J. Eng. Sci. Innov. Technol.,vol. 2, no. 3, pp. 1_7, 2013
- A. Rao, “Centralized database security in cloud,” International Journal of Advanced Research in Computer and Communication Engineering, vol. 1, pp. 544–549, 2012
- E. M.Mohamed, H. S. Abdelkader, and S. El-Etriby, “Enhanced data security model for cloud computing,” in Proceedings of the 8th International Conference on Informatics and Systems (INFOS '12), pp. CC-12–CC-17, IEEE, 2012
- W. Sun, B.Wang, N. Cao, M. Li,W. Lou, Y. T. Hou, and H. Li, "Privacy preserving multi-keyword text search in the cloud supporting similarity based ranking," in Proc. 8th ACM SIGSAC Symp. Inf. Comput. Comm. Secur., pp. 71_82, 2013
- N. Cao, C. Wang, M. Li, K. Ren, and W. Lou, "Privacy-preserving multi-keyword ranked search over encrypted cloud data," in Proc. IEEE INFOCOM, Apr., pp. 829_837, 2011
- C. Wang, N. Cao, K. Ren, and W. Lou, "Enabling secure and ef_cient ranked keyword search over outsourced cloud data," IEEE Trans. Parallel Distrib. Syst., vol. 23, no. 8, pp. 1467_1479, Aug. 2012
- N. Cao, C.Wang, M. Li, K. Ren, andW. Lou, "Privacy-preserving multikeyword ranked search over encrypted cloud data," IEEE Trans. Parallel Distrib. Syst., vol. 25, no. 1, pp. 222_233, Nov. 2013
- M. Fujimoto at.al.,” Detecting Abuse of Domain Administrator Privilege Using Windows Event Log”, IEEE Conference on Application, Information and Network Security (AINS),IEEE, Malaysia, 2019
- C. Delettre, K. Boudaoud, and M. Riveill, “Cloud computing, security and data concealment,” in Proceedings of the 16th IEEE Symposium on Computers and Comm. (ISCC '11), pp. 424–431, Kerkyra, Greece, July 2011
- Yusuf Perwej, Asif Perwej, Firoj Parwej, “An Adaptive Watermarking Technique for the copyright of digital images and Digital Image Protection”, International Journal of Multimedia & Its Applications (IJMA), Academy & Industry Research Collaboration Center (AIRCC) , USA , Volume 4, No.2, Pages 21- 38, 2012, DOI: 10.5121/ijma.2012.4202
- A. Ra_que, D. V. Landuyt, B. Lagaisse, and W. Joosen, "Policy-driven data management middleware for multi-cloud storage in multi-tenant SaaS," in Proc. IEEE Int. Symp. Big Data Comput. (BDC), pp. 78_84, Dec. 2015
- C. Ngo, Y. Demchenko, and C. de Laat, "Multi-tenant attribute-based access control for cloud infrastructure services," J. Inf. Secur. Appl., vol. 27, pp. 65_84, Apr. 2016
- D. Gonzales, J. M. Kaplan, E. Saltzman, Z. Winkelman, and D. Woods, "Cloud-trust_A security assessment model for infrastructure as a service (IaaS) clouds," IEEE Trans. Cloud Comput., vol. 5, no. 3, pp. 523_536, Jul./Sep. 2017
- J. Zhou et al., "Security and privacy for cloud-based IoT: Challenges", IEEE Communications Magazine, vol. 55, no. 1, pp. 26-33, 2017
- C. Stergiou et al., "Secure integration of IoT and cloud computing", Future Generation Computer Systems, vol. 78, pp. 964-975, 2018
- S. Kianoush et al., "A cloud-IoT platform for passive radio sensing: Challenges and application case studies", IEEE Internet of Things Journal, vol. 5, no. 5, pp. 3624-3636, 2018
- E. Pinheiro, W.-D.Weber, and L. A. Barroso, “Failure trends in a large disk drive population,” in Proceedings of the 5th USENIX conference on File and Storage Technologies (FAST '07), vol. 7, pp. 17–23, 2007
- C. Cachin and M. Schunter, “A cloud you can trust,” IEEE Spectrum, vol. 48, no. 12, pp. 28–51, 2011
- J. Idziorek, M. Tannian, and D. Jacobson, “Attribution of Fraudulent Resource Consumption in the cloud,” in Proceedings of the IEEE 5th International Conference on Cloud Computing (CLOUD '12), pp. 99–106, June 2012
- D. Wang, D. He, P. Wang and C.-H. Chu, "Anonymous two-factor authentication in distributed systems: certain goals are beyond attainment", IEEE Trans. Dependable Secur. Comput., vol. 12, no. 4, pp. 428-442, 2015
- T. Galibus, V. V. Krasnoproshin, R. Albuquerque and E. Freitas, Elements of Cloud Storage Security: Concepts Designs and Optimized Practices, Berlin:Springer, 2016
- S. M. Riazul, Islam, Daehan Kwak, M.D. Humaun Kabir and Mahmud Hossain, "The Internet of Things for Health Care: A Comprehensive Survey", IEEE, vol. 3, pp. 678-708, 2015
- T. S. Az-Zahra, "The Advantages from Cloud Computing Application Towards SMME (UMKM)", Journal Online Informatika, vol. 4, pp. 28-32, 2019
- C. T. S. Xue and F. T. W. Xin, "Benefits and challenges of the adoption of cloud computing in business", International Journal on Cloud Computing: Services and Architecture, vol. 6, pp. 01-15, 2016
- Y. Al-Dhuraibi, F. Paraiso, N. Djarallah and P. Merle, "Elasticity in cloud computing: state of the art and research challenges", IEEE Transactions on Services Computing, vol. 11, pp. 430-447, 2017
- Yusuf Perwej, Faiyaz Ahamad, Mohammad Zunnun Khan, Nikhat Akhtar, “An Empirical Study on the Current State of Internet of Multimedia Things (IoMT)”, International Journal of Engineering Research in Computer Science and Engineering (IJERCSE), Volume 8, Issue 3, Pages 25 - 42, March 2021, DOI: 10.1617/vol8/iss3/pid85026
- Sultan Aldossary, William Allen, “Data Security, Privacy, Availability and Integrity in Cloud Computing: Issues and Current Solutions”, International Journal of Advanced Computer Science and Applications, Vol. 7, 2016
- I. Nwobodo, "Cloud computing: models services utility advantages security issues and prototype", Wireless Communications Networking and Applications, pp. 1207-1222, 2016
- P. A. Abdalla and A. Varol, "Advantages to Disadvantages of Cloud Computing for Small-Sized Business", 7th International Symposium on Digital Forensics and Security (ISDFS), 2019
Downloads
Published
Issue
Section
License
Copyright (c) IJSRSET

This work is licensed under a Creative Commons Attribution 4.0 International License.