Data Security and Data Privacy in Cloud Computing

2014 ◽  
Vol 905 ◽  
pp. 687-692
Author(s):  
Waleed Al-Museelem ◽  
Chun Lin Li

Cloud computing has led to the development of IT to more sophisticated levels by improving the capacity and flexibility of data storage and by providing a scalable computation and processing power which matches the dynamic data requirements. Cloud computing has many benefits which has led to the transfer of many enterprise applications and data to public and hybrid clouds. However, many organizations refer to the protection of privacy and the security of data as the major issues which prevent them from adopting cloud computing. The only way successful implementation of clouds can be achieved is through effective enhancement and management of data security and privacy in clouds. This research paper analyzes the privacy and protection of data in cloud computing through all data lifecycle stages providing an overall perspective of cloud computing while highlighting key security issues and concerns which should be addressed. It also discusses several current solutions and further proposes more solutions which can enhance the privacy and security of data in clouds. Finally, the research paper describes future research work on the protection of data privacy and security in clouds.

Author(s):  
Kayalvili S ◽  
Sowmitha V

Cloud computing enables users to accumulate their sensitive data into cloud service providers to achieve scalable services on-demand. Outstanding security requirements arising from this means of data storage and management include data security and privacy. Attribute-based Encryption (ABE) is an efficient encryption system with fine-grained access control for encrypting out-sourced data in cloud computing. Since data outsourcing systems require flexible access control approach Problems arises when sharing confidential corporate data in cloud computing. User-Identity needs to be managed globally and access policies can be defined by several authorities. Data is dual encrypted for more security and to maintain De-Centralization in Multi-Authority environment.


Cloud Computing is a very viable data storage structure where the users can store and access the data from anywhere. Cloud computing use is increasing at a very rapid pace nowadays. But as cloud allows us data accessibility quite easily data security is a major concern and is an emerging area of study. Other issues related to cloud computing are data privacy and internet dependency. On the other cloud computing also has wide range of benefits over traditional storage and accessibility environment such as scalability, flexibility and resource utilization. We have worked in the area of mobile cloud computing to analyse and solve the problems of anomaly attacks. Our work focuses on preventing the adaptive anomaly attacks and some other security issues of cloud computing


Author(s):  
Varun G. Menon ◽  
Joe Prathap

In recent years Vehicular Ad Hoc Networks (VANETs) have received increased attention due to its numerous applications in cooperative collision warning and traffic alert broadcasting. VANETs have been depending on cloud computing for networking, computing and data storage services. Emergence of advanced vehicular applications has led to the increased demand for powerful communication and computation facilities with low latency. With cloud computing unable to satisfy these demands, the focus has shifted to bring computation and communication facilities nearer to the vehicles, leading to the emergence of Vehicular Fog Computing (VFC). VFC installs highly virtualized computing and storage facilities at the proximity of these vehicles. The integration of fog computing into VANETs comes with a number of challenges that range from improved quality of service, security and privacy of data to efficient resource management. This paper presents an overview of this promising technology and discusses the issues and challenges in its implementation with future research directions.


2019 ◽  
pp. 1440-1459
Author(s):  
Sara Usmani ◽  
Faiza Rehman ◽  
Sajid Umair ◽  
Safdar Abbas Khan

The novel advances in the field of Information Technology presented the people pleasure, luxuries and ease. One of the latest expansions in the Information Technology (IT) industry is Cloud Computing, a technology that uses the internet for storage and access of data. It is also known as on-demand computing. The end user can access personal data and applications anywhere any time with a device having internet. Cloud Computing has gained an enormous attention but it results in the issues of data security and privacy as the data is scattered on different machines in different places across the globe which is a serious threat to the technology. It has many advantages like flexibility, efficiency and scalability but many of the companies are hesitant to invest in it due to privacy concerns. In this chapter, the objective is to review the privacy and security issues in cloud storage of Big Data and to enhance the security in cloud environment so that end users can enjoy a trustworthy and reliable data storage and access.


2021 ◽  
Vol 2083 (4) ◽  
pp. 042077
Author(s):  
Tongtong Xu ◽  
Lei Shi

Abstract Cloud computing is a new way of computing and storage. Users do not need to master professional skills, but can enjoy convenient network services as long as they pay according to their own needs. When we use cloud services, we need to upload data to cloud servers. As the cloud is an open environment, it is easy for attackers to use cloud computing to conduct excessive computational analysis on big data, which is bound to infringe on others’ privacy. In this process, we inevitably face the challenge of data security. How to ensure data privacy security in the cloud environment has become an urgent problem to be solved. This paper studies the big data security privacy protection based on cloud computing platform. This paper starts from two aspects: implicit security mechanism and display security mechanism (encryption mechanism), so as to protect the security privacy of cloud big data platform in data storage and data computing processing.


Author(s):  
Seada Abdu Wakene ◽  
Sisay Muleta Hababa ◽  
Gutema Seboka Daba ◽  
K S Ananda Kumar

Mobile cloud computing (MCC) combines cloud computing and mobile computing to deliver vast computational resources to mobile consumers, network operators, and cloud computing providers. You may access your data from anywhere in the globe using any mobile device that is linked to the Internet. Cloud computing provides access to data in real-time whenever and wherever want. Any conventional mobile device can benefit from MCC's infrastructure, computational capacity, software, and platform services. Network security, web application security, data access, authentication, authorization, data confidentiality, and data breach are all concerns of MCC's security. Because mobile devices lack sufficient storage and processing power, their data storage capacity is limited. Users of mobile devices may inadvertently provide sensitive information over the network or through the application. Therefore, data security is the main concern for mobile device users. The objective of this paper is to find a solution that can enhance technical requirements with relation to user’s data security and privacy in mobile cloud computing. To achieve this improved blowfish encryption algorithm is used to encrypt each user’s data security and where the shared secret key is hash down using message digest called secured hash function. Hashing can increase the integrity and privacy of user data. The proposed algorithm is evaluated with a normal blowfish algorithm and 3DES with different parameters. Improved blowfish algorithm shows better performance than normal blowfish algorithm and 3DES. In this work, we have developed web-based application where the Amazon MySQL RDS database is used for data storage.


Author(s):  
Jayapandian N.

The main objectives of this chapter are to discuss the basics of IoT and its applications and to solve data security and privacy issues in Industry 4.0. Industry 4.0 is mainly focus on IoT technology. The IIoT is generating digital data, and that data is stored in cloud server. There are two major issues in this IIoT. The first one is data storage, and the second one is data security. Industry 4.0 is not only involved in the manufacturing industry. It is also in the transportation and automobile industries. Electrical, electronic, mechanical, and computer technology fields are involved in Industry 4.0. This chapter enhances the hybrid security protocol in Industrial IoT. This hybrid mechanism combines lightweight protocol and the probabilistic encryption (LPP) algorithm.


2015 ◽  
Vol 15 (1) ◽  
pp. 46-54
Author(s):  
K. Govinda ◽  
E. Sathiyamoorthy

Abstract Cloud computing has become a victorious archetype for data storage, as well as for computation purposes. Greater than ever it concerns user’s privacy, so that data security in a cloud is increasing day by day. Ensuring security and privacy for data organization and query dispensation in the cloud is important for superior and extended uses of cloud based technologies. Cloud users can barely have the full benefits of cloud computing if we can ensure the real user’s privacy and his data security concerns this approach along with storing thin-skinned personal information in databases and software spread around the cloud. There are numerous service suppliers in WWW (World Wide Web), who can supply each service as a cloud. These cloud services will switch over data with a supplementary cloud, so that when the data is exchanged between the clouds, the problem of confidentiality revelation exists. So the privacy revelation problem concerning a person or a corporation is unavoidably open when releasing or data distributing in the cloud service. Confidentiality is a significant issue in any cloud computing environment. In this paper we propose and implement a mechanism to maintain privacy and secure data storage for group members or a community in cloud environment.


Author(s):  
Chhaya S Dule ◽  
Girijamma H. A.

The sucesssive growth of collabrative applications prodcuing Bigdata on timeline leads new opprutinity to setup commodities on cloud infrastructure. Mnay organizations will have demand of an efficient data storage mechanism and also the efficient data analysis. The Big Data (BD) also faces some of the security issues for the important data or information which is shared or transferred over the cloud. These issues include the tampering, losing control over the data, etc. This survey work offers some of the interesting, important aspects of big data including the high security and privacy issue. In this, the survey of existing research works for the preservation of privacy and security mechanism and also the existing tools for it are stated. The discussions for upcoming tools which are needed to be focused on performance improvement are discussed. With the survey analysis, a research gap is illustrated, and a future research idea is presented


Author(s):  
Dr. Nikhat Akhtar ◽  
Dr. Bedine Kerim ◽  
Dr. Yusuf Perwej ◽  
Dr. Anurag Tiwari ◽  
Dr. Sheeba Praveen

People used to carry their documents about on CDs only a few years ago. Many people have recently turned to memory sticks. Cloud computing, in this case, refers to the capacity to access and edit data stored on remote servers from any Internet-connected platform. Cloud computing is a self-service Internet infrastructure that allows people to access computing resources at any location worldwide. The world has altered as a result of cloud computing. Cloud computing can be thought of as a new computing typology that can provide on-demand services at a low cost. By increasing the capacity and flexibility of data storage and providing scalable compute and processing power that fits the dynamic data requirements, cloud computing has aided the advancement of IT to higher heights. In the field of information technology, privacy and data security have long been a serious concern. It becomes more severe in the cloud computing environment because data is stored in multiple locations, often across the globe. Users' primary challenges regarding the cloud technology revolve around data security and privacy. We conduct a thorough assessment of the literature on data security and privacy issues, data encryption technologies, and related countermeasures in cloud storage systems in this study. Ubiquitous network connectivity, location-independent resource pooling, quick resource flexibility, usage-based pricing, and risk transference are all features of cloud computing.


Sign in / Sign up

Export Citation Format

Share Document