Data Protection and Data Security Issues Related to Cloud Computing in the EU

Author(s):  
Paolo Balboni
2021 ◽  
Vol 2021 ◽  
pp. 1-11
Author(s):  
Amr M. Sauber ◽  
Passent M. El-Kafrawy ◽  
Amr F. Shawish ◽  
Mohamed A. Amin ◽  
Ismail M. Hagag

The main goal of any data storage model on the cloud is accessing data in an easy way without risking its security. A security consideration is a major aspect in any cloud data storage model to provide safety and efficiency. In this paper, we propose a secure data protection model over the cloud. The proposed model presents a solution to some security issues of cloud such as data protection from any violations and protection from a fake authorized identity user, which adversely affects the security of the cloud. This paper includes multiple issues and challenges with cloud computing that impairs security and privacy of data. It presents the threats and attacks that affect data residing in the cloud. Our proposed model provides the benefits and effectiveness of security in cloud computing such as enhancement of the encryption of data in the cloud. It provides security and scalability of data sharing for users on the cloud computing. Our model achieves the security functions over cloud computing such as identification and authentication, authorization, and encryption. Also, this model protects the system from any fake data owner who enters malicious information that may destroy the main goal of cloud services. We develop the one-time password (OTP) as a logging technique and uploading technique to protect users and data owners from any fake unauthorized access to the cloud. We implement our model using a simulation of the model called Next Generation Secure Cloud Server (NG-Cloud). These results increase the security protection techniques for end user and data owner from fake user and fake data owner in the cloud.


Author(s):  
Navin Jambhekar ◽  
Chitra Anil Dhawale

Information security is a prime goal for every individual and organization. The travelling from client to cloud server can be prone to security issues. The big data storages are available through cloud computing system to facilitate mobile client. The information security can be provided to mobile client and cloud technology with the help of integrated parallel and distributed encryption and decryption mechanism. The traditional technologies include the plaintext stored across cloud and can be prone to security issues. The solution provided by applying the encrypted data upload and encrypted search. The clouds can work in collaboration; therefore, the encryption can also be done in collaboration. Some part of encryption handle by client and other part handled by cloud system. This chapter presents the security scenario of different security algorithms and the concept of mobile and cloud computing. This chapter precisely defines the security features of existing cloud and big data system and provides the new framework that helps to improve the data security over cloud computing and big data security system.


2016 ◽  
pp. 2076-2095
Author(s):  
Abhishek Majumder ◽  
Sudipta Roy ◽  
Satarupa Biswas

Cloud is considered as future of Information Technology. User can utilized the cloud on pay-as-you use basis. But many organizations are stringent about the adoption of cloud computing due to their concern regarding the security of the stored data. Therefore, issues related to security of data in the cloud have become very vital. Data security involves encrypting the data and ensuring that suitable policies are imposed for sharing those data. There are several data security issues which need to be addressed. These issues are: data integrity, data intrusion, service availability, confidentiality and non-repudiation. Many schemes have been proposed for ensuring data security in cloud environment. But the existing schemes lag in fulfilling all these data security issues. In this chapter, a new Third Party Auditor based scheme has been proposed for secured storage and retrieval of client's data to and from the cloud service provider. The scheme has been analysed and compared with some of the existing schemes with respect to the security issues. From the analysis and comparison it can be observed that the proposed scheme performs better than the existing schemes.


2016 ◽  
pp. 1162-1190
Author(s):  
Peter Sasvari ◽  
Zoltán Nagymate

Innovation capability has increasingly been searched by the ICT sector in cloud computing applications recently. This chapter describes the economic potentials of cloud computing and explores the characteristics of its usage among Hungarian enterprises. Although enterprises are aware of the basic concept of cloud computing, they have concerns about its application mainly due to data security issues and the lack of education. The chance of using cloud computing services is mainly facilitated by the creation of easier application and consultation would positively affect their usage. According to microenterprises and corporations, faster information flow and remote access are the key benefits of cloud usage. In the case of small-sized enterprises, the two main advantages are easier system recoverability and a higher level of mobility in case of a system breakdown. For the medium-sized enterprises, remote access and greater data security were the key benefits of using cloud computing services in 2014.


2014 ◽  
Vol 701-702 ◽  
pp. 1106-1111 ◽  
Author(s):  
Xin Zheng Zhang ◽  
Ya Juan Zhang

As information and processes are migrating to the cloud, Cloud Computing is drastically changing IT professionals’ working environment. Cloud Computing solves many problems of conventional computing. However, the new technology has also created new challenges such as data security, data ownership and trans-code data storage. We discussed about Cloud computing security issues, mechanism, challenges that Cloud service providers and consumers face during Cloud engineering. Based on concerning of security issues and challenges, we proposed several encryption algorithms to make cloud data secure and invulnerable. We made comparisons among DES, AES, RSA and ECC algorithms to find combinatorial optimization solutions, which fit Cloud environment well for making cloud data secure and not to be hacked by attackers.


2017 ◽  
Vol 16 (3) ◽  
pp. 6219-6224
Author(s):  
Jaspreet Kaur ◽  
Navdeep Kaler

Cloud computing is a way to increase the capacity or add capabilities dynamically without investing in new infrastructure, training new personnel, or licensing new software. As information exchange plays an important role in today’s life, information security becomes more important. This paper is focused on the security issues of cloud computing and techniques to overcome the data security issue. Before analyzing the security issues, the definition of cloud computing and brief discussion to under cloud computing is presented. The various components that affect the security of the cloud and the problems faced by cloud service provider have been discussed in this paper.


MaRBLe ◽  
2018 ◽  
Vol 4 ◽  
Author(s):  
Carolyn Gaumet

With the Internet growing in importance in our daily lives, concerns about privacy and data protection have emerged. While people worry about where they data may end up, they continue making themselves openly transparent by sharing information about themselves and their lives online. This study aims to understand the paradoxes between privacy considerations – mainly, the wish to keep individual data private and secure – and the actions that people undertake in reality. More specifically, it focuses on three paradoxes and dilemmas of privacy: age, perceived usefulness, and rewards. These will be studied by analyzing the results of a survey, in which respondents from the EU, North America and East Asia were asked about their online habits and their opinions on various security issues and privacy measures. The analysis ultimately aims to further the understanding of privacy paradoxes, and what hinders people from protecting their data sufficiently.


Author(s):  
Hussam Alddin Shihab Ahmed ◽  
◽  
Mohamad Fadli Zolkipli ◽  

2019 ◽  
Vol 8 (1) ◽  
pp. 53-61
Author(s):  
S. Hendry Leo Kanickam ◽  
L. Jayasimman

Cloud computing is ensuring the security of stored data in cloud computing servers is one of the mainly demanding issues. In Cloud numerous security issues arises such as authentication, integrity and confidentiality. Different encryption techniques attempt to overcome these data security issues to an enormous extent. Hashing algorithm plays an important role in data integrity, message authentication, and digital signature in modern information security. For security purpose using encryption algorithm like ECC (Elliptic Curve Cryptography) and Authentication of data integrity using hashing algorithms like MD5, and SHA-512. This combination method provides data security, authentication and verification for secure cloud computing.


Cloud computing is an engineering discipline which is concerned with all aspect of storing and sharing useful data. Today, millions of users are able to upload and download useful information on cloud environment from anywhere at any time. Recently, many security issues are encountered in real time applications with a great loss of data and information. Subsequently, many research works have been done to highjack the security issues of cloud computing. Still, all feasible solutions may not applicable at all time and some practical situations. In this paper, we designed and implemented an ASCII based encryption technique that securely uploads, sharing the data on cloud framework with a minimum computational overhead and entropy. The proposed technique will increase the throughput of the system and it can be deployed on a cloud environment for sharing and securing useful data information


Sign in / Sign up

Export Citation Format

Share Document