Data Security in Cloud Computing
DOI:
https://doi.org/10.32628/IJSRSET2411418Keywords:
Data Security, Cloud Computing, Data Protection, Privacy, Risks, ThreatsAbstract
This article discusses data security issues in cloud computing. It is the study of data in the cloud and its associated security issues. This article will introduce data protection procedures and global practices to insure that data are protected as much as possible by reducing risks and threats. Keeping data in the cloud has been beneficial for many applications, but it creates risks by exposing data to applications that are already weakly secured. Similarly, if the reliability of the guest process (which may have a vulnerability) is unknown when running on a hypervisor, using cloud computing virtualization can lead to the exposure of dangerous information. The white paper will also provide insights into security information in transit and at rest. Learn all levels based on SaaS (Software as a Service), PaaS (Platform as a Service) and IaaS (Infrastructure as a Service)
Downloads
References
J. Srinivas, K. Reddy, and A. Qyser, “Cloud Computing Basics,” Build. Infrastruct. Cloud Secur., vol. 1, no. September 2011, pp. 3–22, 2014.
M. A. Vouk, “Cloud computing - Issues, research and implementations,” Proc. Int. Conf. Inf. Technol. Interfaces, ITI, pp. 31–40, 2008. DOI: https://doi.org/10.1109/ITI.2008.4588381
P. S. Wooley, “Identifying Cloud Computing Security Risks,” Contin. Educ., vol. 1277, no. February, 2011.
A. Alharthi, F. Yahya, R. J. Walters, and G. B. Wills, “An Overview of Cloud Services Adoption Challenges in Higher Education Institutions,” 2015. DOI: https://doi.org/10.5220/0005529701020109
S. Subashini and V. Kavitha, “A survey on security issues in service delivery models of cloud computing,” J. Netw. Comput. Appl., vol. 34, no. 1, pp. 1–11, Jan. 2011. DOI: https://doi.org/10.1016/j.jnca.2010.07.006
F. Zhang and H. Chen, “Security-Preserving Live Migration of Virtual Machines in the Cloud,” J. Netw. Syst. Manag., pp. 562–587, 2012. DOI: https://doi.org/10.1007/s10922-012-9253-1
J. Hu and A. Klein, “A benchmark of transparent data encryption for migration of web applications in the cloud,” 8th IEEE Int. Symp. Dependable, Auton. Secur. Comput. DASC 2009, pp. 735–740, 2009. DOI: https://doi.org/10.1109/DASC.2009.85
D. Descher, M., Masser, P., Feilhauer, T., Tjoa, A.M. and Huemer, “Retaining data control to the client in infrastructure clouds,” Int. Conf. Availability, Reliab. Secur. (pp. 9-16). IEEE., pp. pp. 9–16, 2009. DOI: https://doi.org/10.1109/ARES.2009.78
E. Mohamed, “Enhanced data security model for cloud computing,” Informatics Syst. (INFOS), 2012 8th Int. Conf., pp. 12–17, 2012.
C. Modi, D. Patel, B. Borisaniya, A. Patel, and M. Rajarajan, “A survey on security issues and solutions at different layers of Cloud computing,” J. Supercomput., vol. 63, no. 2, pp. 561–592, 2013. DOI: https://doi.org/10.1007/s11227-012-0831-5
V. J. Winkler, “Securing the Cloud,” Cloud Comput. Secur. Tech. tactics. Elsevier., 2011. [12]. F. Sabahi, “Virtualization-level security in cloud computing,” 2011 IEEE 3rd Int. Conf. Commun. Softw. Networks, pp. 250–254, 2011. DOI: https://doi.org/10.1109/ICCSN.2011.6014716
Cloud Security Alliance, “The Notorious Nine. Cloud Computing Top Threats in 2013,” Security, no. February, pp. 1–14, 2013.
L. Rodero-Merino, L. M. Vaquero, E. Caron, A. Muresan, and F. Desprez, “Building safe PaaS clouds: A survey on security in multitenant software platforms,” Comput. Secur., vol. 31, no. 1, pp. 96–108, 2012. DOI: https://doi.org/10.1016/j.cose.2011.10.006
A. U. Khan, M. Oriol, M. Kiran, M. Jiang, and K. Djemame, “Security risks and their management in cloud computing,” 4th IEEE Int. Conf. Cloud Comput. Technol. Sci. Proc., pp. 121–128, 2012. DOI: https://doi.org/10.1109/CloudCom.2012.6427574
Downloads
Published
Issue
Section
License
Copyright (c) 2024 International Journal of Scientific Research in Science, Engineering and Technology
This work is licensed under a Creative Commons Attribution 4.0 International License.