A survey on data breach challenges in cloud computing security: Issues and threats

Cloud computing is an innovation methodology for giving pay per utilize access to a gathering of shared resources for specific systems, stockpiling, servers, administration and applications, without physically getting them. So it spares overseeing expense and time for organizations. Numerous businesses, for example, keeping money, social insurance and instruction are moving towards the cloud because of the productivity of administrations gave by the compensation per-use design in view of the assets, for example, preparing influence utilized, exchanges completed, storage capacity devoured, information exchanged, or storage room possessed and so on. Cloud computing is a totally web based innovation where customer information is put away and kept in the server farm of a cloud supplier like Google, Amazon, Salesforce.com and Microsoft and so on. Constrained control over the information may acquire different security issues and threats which incorporate data breach, unreliable connectivity, sharing of resources, data accessibility and inside attacks. A breach of security may lead to the accidental or unlawful destruction, loss, alteration, unauthorized disclosure of, or access to, personal data transmitted, stored or otherwise processed. There are different research challenges likewise there for embracing data breaches on cloud computing. This paper examines about cloud computing, different cloud models and primary security threats and data breach issues that are right now exploring in the cloud computing framework. This paper investigates the noteworthy research and difficulties that presents data breach in cloud computing and provides best practices to service providers and additionally endeavors plan to influence cloud servers to enhance their main concern in this serious economic scenario.

[1]  Raouf Boutaba,et al.  Cloud computing: state-of-the-art and research challenges , 2010, Journal of Internet Services and Applications.

[2]  Alexander Lazovik,et al.  IEEE International Conference on Cloud Computing , 2010 .

[3]  Farzad Sabahi,et al.  Cloud computing security threats and responses , 2011, 2011 IEEE 3rd International Conference on Communication Software and Networks.

[4]  Martin Gilje Jaatun,et al.  Monitoring Intrusions and Security Breaches in Highly Distributed Cloud Environments , 2011, 2011 IEEE Third International Conference on Cloud Computing Technology and Science.

[5]  Ida Madieha bt. Abdul Ghani Azmi,et al.  Data breach on the critical information infrastructures: Lessons from the Wikileaks , 2012, Proceedings Title: 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec).

[6]  P. Dhavachelvan,et al.  A privacy breach preventing and mitigation methodology for cloud service data storage , 2013, 2013 3rd IEEE International Advance Computing Conference (IACC).

[7]  V. Suganya,et al.  Secure service to prevent data breaches in cloud , 2014, 2014 International Conference on Computer Communication and Informatics.

[8]  Mohit Sharma,et al.  Cloud computing and its security issues — A review , 2014, Fifth International Conference on Computing, Communications and Networking Technologies (ICCCNT).

[9]  Latifa Ben Arfa Rabai,et al.  Surveying and Analyzing Security Problems in Cloud Computing Environments , 2014, 2014 Tenth International Conference on Computational Intelligence and Security.

[10]  Katina Michael,et al.  Cloud computing data breaches a socio-technical review of literature , 2015, 2015 International Conference on Green Computing and Internet of Things (ICGCIoT).

[11]  Muttukrishnan Rajarajan,et al.  Assessing Data Breach Risk in Cloud Systems , 2015, 2015 IEEE 7th International Conference on Cloud Computing Technology and Science (CloudCom).

[12]  Kuo-pao Yang,et al.  An algorithmic approach to improving cloud security: The MIST and Malachi algorithms , 2016, 2016 IEEE Aerospace Conference.

[13]  Yashwant K. Malaiya,et al.  A consolidated approach for estimation of data security breach costs , 2016, 2016 2nd International Conference on Information Management (ICIM).

[14]  Debasis Das,et al.  A framework for data security and storage in Cloud Computing , 2016, 2016 International Conference on Computational Techniques in Information and Communication Technologies (ICCTICT).

[15]  Barbara Hewitt,et al.  Would Increased Regulation Reduce the Number of Information Breaches? , 2016, 2016 49th Hawaii International Conference on System Sciences (HICSS).