A Study on Data Storage Security Issues in Cloud Computing

Abstract Cloud computing is a revolutionary mechanism that changing way to enterprise hardware and software design and procurements. Because of cloud simplicity everyone is moving data and application software to cloud data centers. The Cloud service provider (CSP) should ensure integrity, availability, privacy and confidentiality but CSP is not providing reliable data services to customer and to stored customer data. This study identifies the issues related to the cloud data storage such as data breaches, data theft, and unavailability of cloud data. Finally, we are providing possible solutions to respective issues in cloud.

[1]  Zahir Tari,et al.  Security and Privacy in Cloud Computing , 2014, IEEE Cloud Computing.

[2]  K. S. Naidu,et al.  Decentralized Access Control with Anonymous Authentication of Data Stored in Clouds , 2017 .

[3]  Ramaswamy Chandramouli,et al.  Cryptographic Key Management Issues and Challenges in Cloud Services , 2014, Secure Cloud Computing.

[4]  Jianhua Che,et al.  Study on the Security Models and Strategies of Cloud Computing , 2011 .

[5]  Athanasios V. Vasilakos,et al.  A survey on trust management for Internet of Things , 2014, J. Netw. Comput. Appl..

[6]  Matthew K. Franklin,et al.  Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.

[7]  Neeraj Suri,et al.  Security as a Service Using an SLA-Based Approach via SPECS , 2013, 2013 IEEE 5th International Conference on Cloud Computing Technology and Science.

[8]  Mats Björkman,et al.  Security and Trust Preserving VM Migrations in Public Clouds , 2012, 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications.

[9]  G. Manoj Someswar,et al.  Time-Based Proxy Re-encryption Scheme for Secure Data Sharing in a Cloud Environment , 2015 .

[10]  M V Patil,et al.  HASBE: A HIERARCHICAL ATTRIBUTE-BASED SOLUTION FOR FLEXIBLE AND SCALABLE ACCESS CONTROL IN CLOUD COMPUTING , 2006 .

[11]  Subhajyoti Bandyopadhyay,et al.  Cloud Computing - The Business Perspective , 2011, 2011 44th Hawaii International Conference on System Sciences.

[12]  Shin-Jer Yang,et al.  Design Role-Based Multi-tenancy Access Control Scheme for Cloud Services , 2013, 2013 International Symposium on Biometrics and Security Technologies.

[13]  Samee Ullah Khan,et al.  Future Generation Computer Systems ( ) – Future Generation Computer Systems a Cloud Based Health Insurance Plan Recommendation System: a User Centered Approach , 2022 .

[14]  Xiaolei Dong,et al.  Security and privacy for storage and computation in cloud computing , 2014, Inf. Sci..

[15]  Yang Tang,et al.  Secure Overlay Cloud Storage with Access Control and Assured Deletion , 2012, IEEE Transactions on Dependable and Secure Computing.

[16]  R. D. Dhungana,et al.  Identity management framework for cloud networking infrastructure , 2013, 2013 9th International Conference on Innovations in Information Technology (IIT).

[17]  Ahmed Patel,et al.  An intrusion detection and prevention system in cloud computing: A systematic review , 2013, J. Netw. Comput. Appl..

[18]  Alowolodu O.D,et al.  Elliptic Curve Cryptography for Securing Cloud Computing Applications , 2013 .

[19]  Sadie Creese,et al.  Insider Attacks in Cloud Computing , 2012, 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications.

[20]  O S Ogundele,et al.  Elliptic Curve Cryptography for Securing Cloud Computing Applications , 2013 .

[21]  Rose F. Gamble,et al.  SecAgreement: Advancing Security Risk Calculations in Cloud Services , 2012, 2012 IEEE Eighth World Congress on Services.

[22]  Engin Kirda,et al.  A security analysis of Amazon's Elastic Compute Cloud service , 2012, IEEE/IFIP International Conference on Dependable Systems and Networks Workshops (DSN 2012).

[23]  S. Anandamurugan,et al.  Research Issues in Enterprise Cloud Computing , 2015 .

[24]  P. Mell,et al.  The NIST Definition of Cloud Computing , 2011 .

[25]  Matt Bishop,et al.  Storm Clouds Rising: Security Challenges for IaaS Cloud Computing , 2011, 2011 44th Hawaii International Conference on System Sciences.

[26]  A. B. M. Shawkat Ali,et al.  A survey on gaps, threat remediation challenges and some thoughts for proactive attack detection in cloud computing , 2012, Future Gener. Comput. Syst..

[27]  Yangchun Fu,et al.  EXTERIOR: using a dual-VM based external shell for guest-OS introspection, configuration, and recovery , 2013, VEE '13.

[28]  Rose F. Gamble,et al.  Risk propagation of security SLAs in the cloud , 2012, 2012 IEEE Globecom Workshops.

[29]  Cong Wang,et al.  Toward Secure and Dependable Storage Services in Cloud Computing , 2012, IEEE Transactions on Services Computing.

[30]  Siu-Ming Yiu,et al.  SPICE - Simple Privacy-Preserving Identity-Management for Cloud Environment , 2012, ACNS.