Data security in cloud computing

This paper discusses the security of data in cloud computing. It is a study of data in the cloud and aspects related to it concerning security. The paper will go in to details of data protection methods and approaches used throughout the world to ensure maximum data protection by reducing risks and threats. Availability of data in the cloud is beneficial for many applications but it poses risks by exposing data to applications which might already have security loopholes in them. Similarly, use of virtualization for cloud computing might risk data when a guest OS is run over a hypervisor without knowing the reliability of the guest OS which might have a security loophole in it. The paper will also provide an insight on data security aspects for Data-in-Transit and Data-at-Rest. The study is based on all the levels of SaaS (Software as a Service), PaaS (Platform as a Service) and IaaS (Infrastructure as a Service).

[1]  Paul S. Wooley Identifying Cloud Computing Security Risks , 2011 .

[2]  Vic Winkler Securing the Cloud: Key Strategies and Best Practices , 2011 .

[3]  Srdjan Capkun,et al.  Home is safer than the cloud!: privacy concerns for consumer cloud storage , 2011, SOUPS.

[4]  S. Srinivasan Cloud Computing Basics , 2014 .

[5]  Gary B. Wills,et al.  An Overview of Cloud Services Adoption Challenges in Higher Education Institutions , 2015, ESaaSA@CLOSER.

[6]  Manuel Oriol,et al.  Security risks and their management in cloud computing , 2012, 4th IEEE International Conference on Cloud Computing Technology and Science Proceedings.

[7]  E. M. Mohamed,et al.  Enhanced data security model for cloud computing , 2012, 2012 8th International Conference on Informatics and Systems (INFOS).

[8]  Farzad Sabahi,et al.  Virtualization-level security in cloud computing , 2011, 2011 IEEE 3rd International Conference on Communication Software and Networks.

[9]  Victor I. Chang,et al.  Security Challenges in Cloud Storages , 2014, 2014 IEEE 6th International Conference on Cloud Computing Technology and Science.

[10]  Mladen A. Vouk,et al.  Cloud Computing – Issues, Research and Implementations , 2008, CIT 2008.

[11]  Andreas Klein,et al.  A Benchmark of Transparent Data Encryption for Migration of Web Applications in the Cloud , 2009, 2009 Eighth IEEE International Conference on Dependable, Autonomic and Secure Computing.

[12]  Luis Miguel Vaquero Gonzalez,et al.  Building safe PaaS clouds: A survey on security in multitenant software platforms , 2012, Comput. Secur..

[13]  Tim Mather,et al.  Cloud Security and Privacy , 2023, International Journal for Research in Applied Science and Engineering Technology.

[14]  Mukesh Singhal,et al.  A limited-trust capacity model for mitigating threats of internal malicious services in cloud computing , 2016, Cluster Computing.

[15]  Zhi Li,et al.  Cloud computing risk assessment method based on game theory , 2015 .

[16]  Tomas A. Lipinski Click Here to Cloud: End User Issues in Cloud Computing Terms of Service Agreements , 2013 .

[17]  A Min Tjoa,et al.  Retaining Data Control to the Client in Infrastructure Clouds , 2009, 2009 International Conference on Availability, Reliability and Security.

[18]  Raghu Yeluri,et al.  Cloud Computing Basics , 2014 .

[19]  Muttukrishnan Rajarajan,et al.  A survey on security issues and solutions at different layers of Cloud computing , 2012, The Journal of Supercomputing.

[20]  Yuan Zhou,et al.  Cryptanalysis and Improvement of a Block Cipher Based on Multiple Chaotic Systems , 2010 .

[21]  Tzonelih Hwang,et al.  Untraceable Sensor Movement in Distributed IoT Infrastructure , 2015, IEEE Sensors Journal.

[22]  V. Kavitha,et al.  A survey on security issues in service delivery models of cloud computing , 2011, J. Netw. Comput. Appl..

[23]  Harit Shah,et al.  Security Issues on Cloud Computing , 2013, ArXiv.

[24]  Jörg Schwenk,et al.  On Technical Security Issues in Cloud Computing , 2009, 2009 IEEE International Conference on Cloud Computing.

[25]  Haibo Chen,et al.  Security-Preserving Live Migration of Virtual Machines in the Cloud , 2012, Journal of Network and Systems Management.

[26]  D. M. Hutton,et al.  Securing the Cloud: Cloud Computer Security Techniques and Tactics , 2012 .