AN OVERVIEW OF PRIVACY SCHEME IN CLOUD COMPUTING

Cloud computing provides a virtualized pool of computing resources. Cloud computing is categorized in three different broad service models: Software as a Service (SaaS); Platform as a Service (PaaS); Infrastructure  as a Service (IaaS).An example  is  the  accessing  ofservices from remote databases through the use of Internet. This means  users cannot physically or directly access data from the cloud server, without  a  client’s knowledge. Therefore, there is no need for users to know the exact location of the server; but there is a need for securing the data and information especially in public cloud computing. The aim of this study was to investigate the security challenges or vulnerabilities of cloud computing and propose a conceptual solution. In this regard, a systematic literature search was conducted. Descriptive statistics was used to analyse the data. The researcher found that there are  a  lot of research issues within the area of security in cloud computing. Furthermore, through this overview study the researcher  found that most policies of cloud computing providers allow them to modify or delete data which is not used or that occupy a chunk of the storage space without consulting the  clients.  This  is another security vulnerability issue which creates a research platform.

[1]  Brian Hayes,et al.  What Is Cloud Computing? , 2019, Cloud Technologies.

[2]  Rahul Malhotra,et al.  Study and Comparison of Various Cloud Simulators Available in the Cloud Computing , 2013 .

[3]  John Kim,et al.  High Performance Datacenter Networks: Architectures, Algorithms, and Opportunities , 2011, High Performance Datacenter Networks: Architectures, Algorithms, and Opportunities.

[4]  Gregory R. Andrews,et al.  Binary Obfuscation Using Signals , 2007, USENIX Security Symposium.

[5]  Andrew Charlesworth,et al.  Accountability as a Way Forward for Privacy Protection in the Cloud , 2009, CloudCom.

[6]  Hai Jin,et al.  A Practical Privacy-preserving Password Authentication Scheme for Cloud Computing , 2012, 2012 IEEE 26th International Parallel and Distributed Processing Symposium Workshops & PhD Forum.

[7]  César Augusto Biancolino,et al.  Cloud Computing and Information Technology Strategy , 2013 .

[8]  K. Govinda,et al.  Agent Based Security for Cloud Computing using Obfuscation , 2012 .

[9]  Abdul Ghafoor Abbasi,et al.  Cloud Based Secure and Privacy Enhanced Authentication & Authorization Protocol , 2013, KES.

[10]  Rajkumar Buyya,et al.  Article in Press Future Generation Computer Systems ( ) – Future Generation Computer Systems Cloud Computing and Emerging It Platforms: Vision, Hype, and Reality for Delivering Computing as the 5th Utility , 2022 .

[11]  P. Dhavachelvan,et al.  A privacy breach preventing and mitigation methodology for cloud service data storage , 2013, 2013 3rd IEEE International Advance Computing Conference (IACC).

[12]  Jie Wu,et al.  An Efficient Privacy Preserving Keyword Search Scheme in Cloud Computing , 2009, 2009 International Conference on Computational Science and Engineering.