An Empirical Study of Security Challenges in Cloud Data Storages
Keywords:
Cloud Computing, Cloud Data Storage, Policies & Protocols, Security Issues.Abstract
A revolutionary process, cloud computing is transforming the way in which company hardware and software design and purchase are carried out. Because of the ease with which cloud data centers can be accessed, users are opting to transfer their data and application to cloud storages. However, the services and support expected from the cloud service providers to the users or towards the data stored by the users is not sufficient. Ease of access and round the clock availability of the data is not the only thing expected by the CSP. The integrity of the data, privacy of the data, and security of the data should be utmost responsibility of the CSP. According to this report, security rift, information theft, and unreliability of cloud-based data storage are all problems associated with the use of cloud storage. Finally, we are presenting potential cloud-based solutions to the difficulties that have been identified.
References
- A. Abbas, K. Bilal, L. Zhang, S.U. Khan, A cloud based health insurance plan recommen-dation system: a user centered approach, Future Gener. Comput. Syst. (2014)
- P. Mell, T. Grance, The NIST definition of cloud computing (draft), NIST Special Publ. 800 (145) (2011).
- Patel, Ahmed, et al. "An intrusion detection and prevention system in cloud computing: A systematic review." Journal of Network and Computer Applications 36.1 (2013): 25-41.
- R. Chandramouli, M. Iorga, S. Chokhani, Cryptographic key management issues and chal-lenges in cloud services, in: Secure Cloud Computing, Springer, New York, 2014, pp. 1–30.
- C. Wang, Q. Wang, K. Ren, N. Cao, W. Lou, Toward secure and dependable storage ser-vices in cloud computing, IEEE Trans. Services Comput. 5(2012) 220–232.
- M. Balduzzi, J. Zaddach, D. Balzarotti, E. Kirda, S. Loureiro, a security analysis of ama-zon’s elastic compute cloud service, in: Proceedings of the 27th Annual ACM Symposium on Applied Computing, 2012, pp. 1427–1434.
- Duncan, Adrian, Sadie Creese, and Michael Goldsmith. "Insider attacks in cloud compu-ting." Trust, Security and Privacy in Computing and Communications (TrustCom), 2012 IEEE 11th International Conference on. IEEE, 2012.
- Khorshed, Md Tanzim, ABM Shawkat Ali, and Saleh A. Wasimi. "A survey on gaps, threat remediation challenges and some thoughts for proactive attack detection in cloud com-puting." Future Generation computer systems 28.6 (2012): 833-851.
- A. Andrieux, K. Czajkowski, A. Dan, K. Keahey, H. Ludwig, T. Nakata, J. Pruyne, J. Rofrano, S. Tuecke, M. Xu, Web services agreement specification.
- S. Marston, Z. Li, S. Bandyopadhyay, J. Zhang, A. Ghalsasi, Cloud computing the busi-ness perspective, Decis. Support Syst. 51 (1) (2011) 176–189.
- B. Hay, K. Nance, M. Bishop, Storm clouds rising: security challenges for IaaS cloud computing, in: 44th Hawaii International Conference on System Sciences (HICSS), IEEE, 2011, pp. 1–7.
- S. Subashini and V. Kavitha, A survey on security issues in service delivery models of cloud computing, Journal of Network and Computer Applications, 34 (2011) 1-11.
- Varsha, Amit Wadhwa and Swati Gupta, Study of security issues in cloud computing, Inter-national Journal of Computer Science and Mobile Computing, 4 (6) (2015) 230 - 234.
- Lifei Wei, Haojin Zhu, Zhenfu Cao, Xiaolei Dong, Weiwei Jia, Yunlu Chen and Athanasios V. Vasilakos, Security and privacy for storage and computation in cloud computing, Infor-mation Sciences, 258 (2014) 371–386.
- K.Bhushan and B.B.Gupta, Security challenges in cloud computing: state-of-art, Int. J. Big Data Intelligence, 4 (2) (2017) 81-107.
- Shaireen Khan, Shadab Hasan, Shashank Singh, Sumera Zafar and Shobhit Joshi, Cloud computing: security issues and security standards, International Journal of Engineering and Management Research, Special Issue (ACEIT - 2018) 31-36.
- Z. Tari, Security and privacy in cloud computing, IEEE Cloud Comput. 1 (1) (2014) 54–57.
- Cloud security alliance, security guidelines for critical areas of focus in cloud computing v3.0, 2011.
- Y. Fu, Z. Lin, Exterior: using a dual-vm based external shell for guest-os introspection, configuration, and recovery, in: Proceedings of the 9th ACMSIGPLAN/SIGOPS Interna-tional Conference on Virtual Execution Environments, 2013, pp. 97–110.
- S.M.S. Chow, Y. He, L.C.K. Hui, S.M. Yiu, Spicesimple privacy-preserving identity-management for cloud environment, in: Applied Cryptography and Network Security, Springer, Berlin, Heidelberg, 2012, pp. 526–543.
- S. Yang, P. Lai, J. Lin, Design role-based multi-tenancy access control scheme for cloud services, in: IEEE International Symposium on Biometrics and Security Technologies (ISBAST), 2013, pp. 273–279.
- R.D. Dhungana, A. Mohammad, A. Sharma, I. Schoen, Identity management framework for cloud networking infrastructure, in: IEEE International Conference on Innovations in In-formation Technology (IIT), 2013, pp. 13–17.
- Boneh, Dan, and Matthew Franklin. "Identity-based encryption from the Weil pairing." SIAM Journal on Computing 32.3 (2003): 586-615.
- Z. Yan, P. Zhang, A.V. Vasilakos, A survey on trust management for Internet of things, J. Netw. Comput. Appl. 42 (2014) 120–134.
- S. Ruj, M. Stojmenovic, A. Nayak, Decentralized access control with anonymous authen-tication of data stored in clouds, IEEE Trans. Parallel Distrib. Syst. 25 (2) (2014) 384–394
- Z. Wan, J. Liu, R.H. Deng, HASBE: a hierarchical attribute-based solution for flexible and scalable access control in cloud computing, IEEE Trans. Inform. Forensics Sec. 7 (2) (2012) 743–754.
Downloads
Published
Issue
Section
License
Copyright (c) IJSRSET

This work is licensed under a Creative Commons Attribution 4.0 International License.