Data Security in Cloud Computing

Authors

  • Kumar Kishan Chandra PhD Scholar, YBN University, Ranchi, Jharkhand, India Author
  • Dr. Manisha Kumari Deep Professor, YBN University, Ranchi, Jharkhand, India Author

DOI:

https://doi.org/10.32628/IJSRSET2411418

Keywords:

Data Security, Cloud Computing, Data Protection, Privacy, Risks, Threats

Abstract

This article discusses data security issues in cloud computing. It is the study of data in the cloud and its associated security issues. This article will introduce data protection procedures and global practices to insure that data are protected as much as possible by reducing risks and threats. Keeping data in the cloud has been beneficial for many applications, but it creates risks by exposing data to applications that are already weakly secured. Similarly, if the reliability of the guest process (which may have a vulnerability) is unknown when running on a hypervisor, using cloud computing virtualization can lead to the exposure of dangerous information. The white paper will also provide insights into security information in transit and at rest. Learn all levels based on SaaS (Software as a Service), PaaS (Platform as a Service) and IaaS (Infrastructure as a Service)

Downloads

Download data is not yet available.

References

J. Srinivas, K. Reddy, and A. Qyser, “Cloud Computing Basics,” Build. Infrastruct. Cloud Secur., vol. 1, no. September 2011, pp. 3–22, 2014.

M. A. Vouk, “Cloud computing - Issues, research and implementations,” Proc. Int. Conf. Inf. Technol. Interfaces, ITI, pp. 31–40, 2008. DOI: https://doi.org/10.1109/ITI.2008.4588381

P. S. Wooley, “Identifying Cloud Computing Security Risks,” Contin. Educ., vol. 1277, no. February, 2011.

A. Alharthi, F. Yahya, R. J. Walters, and G. B. Wills, “An Overview of Cloud Services Adoption Challenges in Higher Education Institutions,” 2015. DOI: https://doi.org/10.5220/0005529701020109

S. Subashini and V. Kavitha, “A survey on security issues in service delivery models of cloud computing,” J. Netw. Comput. Appl., vol. 34, no. 1, pp. 1–11, Jan. 2011. DOI: https://doi.org/10.1016/j.jnca.2010.07.006

F. Zhang and H. Chen, “Security-Preserving Live Migration of Virtual Machines in the Cloud,” J. Netw. Syst. Manag., pp. 562–587, 2012. DOI: https://doi.org/10.1007/s10922-012-9253-1

J. Hu and A. Klein, “A benchmark of transparent data encryption for migration of web applications in the cloud,” 8th IEEE Int. Symp. Dependable, Auton. Secur. Comput. DASC 2009, pp. 735–740, 2009. DOI: https://doi.org/10.1109/DASC.2009.85

D. Descher, M., Masser, P., Feilhauer, T., Tjoa, A.M. and Huemer, “Retaining data control to the client in infrastructure clouds,” Int. Conf. Availability, Reliab. Secur. (pp. 9-16). IEEE., pp. pp. 9–16, 2009. DOI: https://doi.org/10.1109/ARES.2009.78

E. Mohamed, “Enhanced data security model for cloud computing,” Informatics Syst. (INFOS), 2012 8th Int. Conf., pp. 12–17, 2012.

C. Modi, D. Patel, B. Borisaniya, A. Patel, and M. Rajarajan, “A survey on security issues and solutions at different layers of Cloud computing,” J. Supercomput., vol. 63, no. 2, pp. 561–592, 2013. DOI: https://doi.org/10.1007/s11227-012-0831-5

V. J. Winkler, “Securing the Cloud,” Cloud Comput. Secur. Tech. tactics. Elsevier., 2011. [12]. F. Sabahi, “Virtualization-level security in cloud computing,” 2011 IEEE 3rd Int. Conf. Commun. Softw. Networks, pp. 250–254, 2011. DOI: https://doi.org/10.1109/ICCSN.2011.6014716

Cloud Security Alliance, “The Notorious Nine. Cloud Computing Top Threats in 2013,” Security, no. February, pp. 1–14, 2013.

L. Rodero-Merino, L. M. Vaquero, E. Caron, A. Muresan, and F. Desprez, “Building safe PaaS clouds: A survey on security in multitenant software platforms,” Comput. Secur., vol. 31, no. 1, pp. 96–108, 2012. DOI: https://doi.org/10.1016/j.cose.2011.10.006

A. U. Khan, M. Oriol, M. Kiran, M. Jiang, and K. Djemame, “Security risks and their management in cloud computing,” 4th IEEE Int. Conf. Cloud Comput. Technol. Sci. Proc., pp. 121–128, 2012. DOI: https://doi.org/10.1109/CloudCom.2012.6427574

Downloads

Published

20-09-2024

Issue

Section

Research Articles

How to Cite

[1]
Kumar Kishan Chandra and Dr. Manisha Kumari Deep, “Data Security in Cloud Computing”, Int J Sci Res Sci Eng Technol, vol. 11, no. 5, pp. 76–80, Sep. 2024, doi: 10.32628/IJSRSET2411418.

Similar Articles

1-10 of 82

You may also start an advanced similarity search for this article.