Data Control in Public Cloud Computing: Issues and Challenges

Author(s):  
Pranay Jha ◽  
Sartaj Singh ◽  
Ashok Sharma

Background: : The Advancement in the Hardware and Progress in IoT based devices has led to significant transformation in digitalization and globalization of business models in the IT World. In fact Cloud Computing has attracted many companies to expand their business by providing IT infrastructure with very less budget in pay per use model. The Expansion and Migration of Companies to Cloud Computing facilities has really brought many pros and cons and opened new area of Research. The Management of IT infrastructure as per business requirement is a great challenge for the IT Infrastructure managers because of complex business models which needs to be updated with market trends and it requires huge and updated infrastructure to accelerate their business requirements. No doubt there are many benefits of moving to Cloud but several vulnerabilities and potential threats related to security is a major concern for any business sensitive data. These security challenges place restrictions on moving on-premises workloads to the Cloud. This paper has discussed key differences in cloud models and existing various Cloud Security Architectures and challenges in cloud computing related to Data Security at Rest and in Transit. Also data controlling mechanism need to be adopted by IT Industry along with end to end security mechanism has been explained. Objective:: The main objective of this paper is to discuss about the prevailing issues in cloud in terms of data security which is discouraging the Industry and organizations to move their data into public cloud and also to discuss how to enhance security mechanism in cloud during data migration and multitenant environment. Methods:: Based on different reports and analysis, it has been pointed that data breach and data security are most challenging and concerning factor for any customer when someone think to migrate the workloads from On-Premises datacenter to Cloud Computing. It needs more attention in every consideration. All criteria and considerations to secure and protect the customer’s information and data have been classified and discussed. Data-at-rest and Data-in-transit are transmission method for storing and moving the data from one source to destination. Different encryption methods for protecting and security data-at-rest and data-in-transit have been identity. However, there are still more areas need to work in for filling gaps for Cloud data control and security which is still a serious concern and on top of attackers every day. Conclusion:: Since, cyber-attacks occurring very frequently and causing a huge amount of investment on re-establishing the environment, it needs more control with effective usages of technology. All those concerns related to security are very reasonable concerns that needs to be addressed.

Kybernetes ◽  
2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Shurui Gao ◽  
Weidong Meng

PurposeCloud-based technologies are reliably improving Information Technology (IT) environment incorporating changes and modifications to the present business structure. Cloud computing enables small and medium-sized businesses (SMBs) to organize and exchange pertinent data and information in real time. This study checks out the influence of cloud-based services (IT infrastructure, expenses of cloud services, cloud data security and IT knowledge of human resources) on customers' satisfaction in SMBs.Design/methodology/approachCloud computing offers a way to coordinate and share organizational and personal information and data. The adoption of cloud services is one of the most emerging technological advances in the current competitive business environment. Cloud-based services allow start-ups or SMBs to take advantage of technological advancements and respond more quickly to changing consumer demands. In the available literature, cloud computing has received a lot of attention. However, there is also a research gap in creating a paradigm that links the value development drivers in the electronic industry with the leveraging impact of cloud and intercloud computing resources for start-ups and SMBs. A hypothetical model was constructed based on a literature review, and the associations between the latent variables were investigated utilizing structural equations.FindingsFindings from the study confirmed the validity of the proposed model for customer satisfaction assessment. Besides, the results showed that customer satisfaction is affected by cloud-based services in SMBs. The results illustrated that IT infrastructure influences customer satisfaction significantly and positively, with a T-value of 2.42. Also, the results confirmed that the cost of cloud services with a T-value of 2.68 affects customer satisfaction significantly and positively. Cloud data security also impacts customer satisfaction with a T-value of 5.20. The results also showed that the IT knowledge of human resources affects customer satisfaction with a T-value of 3.01.Originality/valueThe main originality of this research is proposing a new conceptual model to assess the impact of cloud-based services on the satisfaction of the customers in SMBs.


2019 ◽  
Vol 8 (2) ◽  
pp. 40-43
Author(s):  
Sheik Saidhbi

Internet working security has become one of the biggest uprising points of concern now days. People are getting attached more and more to the internet in order to fulfill their demands. Not only customers but also the IT based companies are also getting themselves relying on up growing technology called as cloud computing. Cloud is a branch of computer science that provides the services on lease. In this paper we will make a comparative analysis of various technical security issues towards cloud computing, cloud deployment based security and model based security issues. A comparative analysis has been made at the end of the paper.


2020 ◽  
Vol 5 (19) ◽  
pp. 26-31
Author(s):  
Md. Farooque ◽  
Kailash Patidar ◽  
Rishi Kushwah ◽  
Gaurav Saxena

In this paper an efficient security mechanism has been adopted for the cloud computing environment. It also provides an extendibility of cloud computing environment with big data and Internet of Things. AES-256 and RC6 with two round key generation have been applied for data and application security. Three-way security mechanism has been adopted and implemented. It is user to user (U to U) for data sharing and inter cloud communication. Then user to cloud (U to C) for data security management for application level hierarchy of cloud. Finally, cloud to user (C to U) for the cloud data protection. The security analysis has been tested with different iterations and rounds and it is found to be satisfactory.


Author(s):  
István Mezgár ◽  
Gianfranco Pedone

Cloud computing (CC) is generating new computing and business models because of its service-based nature, which enables collaboration and data exchange at higher level, more flexibility with better efficiency and parallel decreasing costs. Manufacturing environments can also benefit from cloud technology and follow fast changes in market demands. In these new scenarios, interoperability has vital importance in the operation and in the interaction among industrial realizations of cyber-physical systems. The chapter introduces the different cloud models and the interoperability issues concerning connected enterprise information systems. Various standardization frameworks have been developed for homogeneous integration of IT models in industrial environments: the IIRA and the RAMI 4.0 are the best-known ones. The chapter introduces both architectures; their methodological approach to industrial integration efforts and how integration can be realized through the OPC Unified Architecture. Finally, the authors propose a basic conceptual model for cloud manufacturing.


Author(s):  
K. Deepa, Et. al.

Cloud computing has become a reality with new IT infrastructure based on several techniques such as distributed computing, virtualization, etc. Besides the many benefits that they can offer, cloud computing also comes with the difficulty of protecting data security. This paper first explores the basic concepts and analyzes the main aspects of data security about cloud computing. We then look at each problem, discussing its nature and existing solutions, if any. In particular, we will pay special attention to protecting data confidentiality/integrity/availability, data access, and monitoring, and complying with rules and obligations to ensure data security and confidentiality. With the fast advancement of organizing and portable gadgets, we are confronting a dangerous incensement of swarm sourced information. Existing frameworks as a rule depend on a confided in server to total the spatio fleeting publicly supported information and after that apply differential security component to bother the total insights previously distributing to give solid protection ensure. We propose a Modified appropriated specialist based protection saving structure, called MDADP that presents another dimension of various operators between the clients and the untrusted server.  


2021 ◽  
Vol 2083 (4) ◽  
pp. 042077
Author(s):  
Tongtong Xu ◽  
Lei Shi

Abstract Cloud computing is a new way of computing and storage. Users do not need to master professional skills, but can enjoy convenient network services as long as they pay according to their own needs. When we use cloud services, we need to upload data to cloud servers. As the cloud is an open environment, it is easy for attackers to use cloud computing to conduct excessive computational analysis on big data, which is bound to infringe on others’ privacy. In this process, we inevitably face the challenge of data security. How to ensure data privacy security in the cloud environment has become an urgent problem to be solved. This paper studies the big data security privacy protection based on cloud computing platform. This paper starts from two aspects: implicit security mechanism and display security mechanism (encryption mechanism), so as to protect the security privacy of cloud big data platform in data storage and data computing processing.


2018 ◽  
Vol 19 (4) ◽  
pp. 351-360
Author(s):  
Prabu S ◽  
Gpinath Ganapathy ◽  
Ranjan Goyal

Cloud computing is an evolving computing technology that provides many services such as software and storage. With the introduction of cloud storage, the security of outsourced data has become a major issue in cloud computing. Data storage in cloud computing environment needs to be secured in order to provide a safe and foolproof security for data outsourcing of the cloud service users. This paper presents a model for security of data in public cloud storage environment which successfully detects the unauthenticated access or any anomaly in the data. The proposed authentication model along with the data security model presented in this paper shows that this model is the best model suitable for securing the data in cloud computing environment


2019 ◽  
Vol 8 (2) ◽  
pp. 6544-6548

The cloud computing paradigm is being used because there is no need to setup additional IT infrastructure such as hardware and software, its low up-front cost. Security and privacy of data is important in day to today life especially for applications that uses cloud computing such as social media. Customer information that is stored at Cloud is crucial that needs to be protected against potential intruders. There is threat to maintain the data in transit and data at cloud due to different possible attacks. Due to this there is growing need of privacy and security of data. In this paper, the privacy and issues, privacy preservation techniques are addressed. In addition to this, in order to protect the data, the secret sharing algorithm is implemented and analyzed. The shamir’s secret sharing (k,n) algorithm is used to split the data into n partial shares which can be distributed in cloud. The user collects at least k partial shares to reconstruct the complete data. It is observed that if the file size is increased, the data recovery time is also increased. The paper concludes with privacy preservation guidelines.


2016 ◽  
pp. 451-470
Author(s):  
Mohamed Fazil Mohamed Firdhous

This chapter takes a comprehensive look at the strategies and mechanisms developed for evaluating cloud services during business transformation. During business transformation, enterprises need to make decisions that would have long lasting impacts on the performance and profitability of the businesses. One of the important decisions business leaders are required to make is whether to own and manage their own IT infrastructure or outsource them from a public cloud provider. Due to the attractiveness of cloud computing, there are many cloud providers in the market creating a confusion in the minds of the customers who to select. Hence it is necessary to use proper strategies and mechanisms to evaluate the performance and the suitability of the service providers in meeting the customer requirements. This chapter takes an in depth look at some of the strategies, frameworks, mechanisms and tools proposed by researchers for evaluating cloud services in the literature with reference to their applicability, suitability, advantages and disadvantages.


2014 ◽  
Vol 2014 ◽  
pp. 1-8
Author(s):  
Wenfeng Wang ◽  
Peiwu Li ◽  
Longzhe Han ◽  
Shuqiang Huang ◽  
Kefu Xu ◽  
...  

Cloud computing offers a wide range of luxuries, such as high performance, rapid elasticity, on-demand self-service, and low cost. However, data security continues to be a significant impediment in the promotion and popularization of cloud computing. To address the problem of data leakage caused by unreliable service providers and external cyber attacks, an enhanced erasure code-based security mechanism is proposed and elaborated in terms of four aspects: data encoding, data transmission, data placement, and data reconstruction, which ensure data security throughout the whole traversing into cloud storage. Based on the mechanism, we implement a secure cloud storage system (SCSS). The key design issues, including data division, construction of generator matrix, data encoding, fragment naming, and data decoding, are also described in detail. Finally, we conduct an analysis of data availability and security and performance evaluation. Experimental results and analysis demonstrate that SCSS achieves high availability, strong security, and excellent performance.


Sign in / Sign up

Export Citation Format

Share Document