Cloud Privacy and Security- A Review Paper

Cloud Privacy and Security- A Review Paper

Authors

  • Rajan Jha
  • Nikita Kumari
  • Chidera Carol Omeribe

Keywords:

Review, data security, cloud data hiding, security in the cloud

Abstract

Distributed computing has revolutionized the way people use cloud resources to host and deliver various services through the internet. The benefits of cloud resources are many, and with the rapid development of cloud technology, it has become more accessible to users. However, one major issue that needs attention is cloud security. Many users are still unaware of the risks associated with cloud storage, and there is a lack of mass awareness on this issue.  As cloud technology continues to gain traction in the corporate world, clients need to be aware of the standards of cloud utilization. However, many clients may lack knowledge about IT security, which can be a major risk. It is crucial to measure the level of their understanding and develop a training framework to promote security awareness. This is where new measurements and calculations for assessing security familiarity come in. By incorporating emerging cloud security requirements, we can better equip corporate clients and workers with the necessary knowledge to use cloud resources safely and securely.

Downloads

Download data is not yet available.

References

NIST SP 800-145, “A NIST definition of cloud computing”, [online] 2012, http://csrc.nist.gov/publications/drafts/800-145/Draft-SP- 800-145_cloud-definition.pdf (Accessed: 23 December 2013).

Gartner, “What you need to know about cloud computing security and compliance” (Heiser J), [online] 2009, https://www.gartner.com/doc/1071415/-need-knowcloud-computing- Security (Accessed 23 December 2013).

IDG Cloud Computing Survey: “Security, Integration Challenge Growth”, [online]http://www.forbes.com/sites/louiscolumbus/2013/08 /13/idg- cloud-computing-survey- (Accessed: 28 December 2013).

Ricadela, “Cloud security is looking overcast” [online] http://www.businessweek.com/magazine/cloudsecurity-is-lookin g-overcast-09012011.html. (Accessd: 29December 2013).

Nguyen, “Only seven percent of UK its services in the cloud, says survey, Computerworld” [online] http://www.itworld.com/ cloudcomputing/200657/only- seven-percent-uk-itservices-cloud-says- surveyS. (Accessed: 29 December 2013).

Elahi, T., & Pearson, S. (2007). Privacy Assurance: Bridging the Gap Between Preference and Practice. In C. Lambrinoudakis, G. Pernul & A. Tjoa (Eds.), Trust, Privacy and Security in Digital Business (Vol. 4657, pp. 65-74): Springer Berlin Heidelberg.

Siani Pearson, “Taking Account of Privacy when Designing Cloud Computing Services,” CLOUD’09, May 23, 2009, Vancouver, Canada, pp. 44-52.

European Network and Information Security Agency (ENISA) “Benefits, risks and recommendations for information security” [online] http://www.enisa.europa.eu/-activities/riskmanagement/files/deliverables/cloud-computing-riskassessment.-(Accessed: 28. December 2013).

Cloud Security Alliance, “Security Guidance for Critical Areas of Focus in Cloud Computing” [online]https://cloudsecurityalliance.org/csaguide.pdf (Accessed 26 December2013)

J. Archer et al., “Top Threats to Cloud Computing,” in Cloud Security Alliance [online] https://cloudsecurityalliance.org/topthreats/csathreat s.v1.0.pdf (Accessed: 26 December 2013).

Crampton, J., Martin, K., & Wild, P. (2006, 0-0 0). On key assignment for hierarchical access control. Paper presented at the Computer Security Foundations Workshop, 2006. 19th IEEE.

D.Feng, et al. "Study on cloud computing security." Journal of Software 22.1 (2011): pp.71-83.

R. Chow, et al., "Controlling data in the cloud: Outsourcing computation without outsourcing control," presented at the Proceedings of the 2009 ACM workshop on Cloud computing security, Chicago, Illinois, USA, 2009.

S. Dawn Xiaoding, et al., "Practical techniques for searches on encrypted data," in Security and Privacy, 2000. S&P 2000. Proceedings. 2000 IEEE Symposium on, 2000, pp. 44-55.

Michael Annbrust etc., Above the Clouds: A Berkeley View of Cloud Computing, http: //eecs.berkeley.edu/Pubs/TechRpts/2009 /EECS 2009-28.pdf:2009.2.

Deyan, C., & Hong, Z. (2012, 23-25 March 2012). Data Security and Privacy Protection Issues in Cloud Computing. Paper presented at the Computer Science and Electronics Engineering (ICCSEE), 2012 International Conference on.

Seccombe, A., Hutton, A., Meisel, A., Windel, A., Mohammed, A., & Licciardi, A. (2009). Security guidance for critical areas of focus in cloud computing, v2. 1. Cloud Security Alliance.

T. Mather and S. Latif, “Cloud Security and Privacy, [online] 2009, http://www.slideshare.net/USFstudent1980/cloud- computing security-concerns (Accessed: 4 September 2013)

IBM, “what is cloud computing” [online] http://www.ibm.com/cloud- computing/in/en/what- is-cloud-computing.html (Accessed: 14 December 2013)

Mell Peter and Grance Tim, “Effectively and securely using the cloud computing paradigm” [online] 2011, http://csrc.nist.gov/groups/SNS/cloud-computing/cloud-computing-v26.ppt (Accessed 18 August 2013).

Subashini, S., & Kavitha, V. (2011). A survey on security issues in service delivery models of cloud computing. Journal of Network and Computer Applications, 34(1), 1- 11.

Sarwar, A., & Khan, M. N. (2013). A Review of Trust Aspects in Cloud Computing Security. International Journal of Cloud Computing and Services Science (IJ-CLOSER), 2(2), 116-122.

Sun, D., Chang, G., Sun, L., & Wang, X. (2011). Surveying and Analyzing Security, Privacy and Trust Issues in Cloud Computing Environments. Procedia Engineering, 15(0), 2852-2856.

Brereton, P., Kitchenham, B. A., Budgen, D., Turner, M., & Khalil, M. (2007). Lessons from applying the systematic literature review process within the software engineering domain. Journal of Systems and Software, 80(4), 571-583.

Fazal-e-Amin, A. K. M., & Oxley, A. (2010). A review on aspect-oriented implementation of software product lines components. Information Technology Journal, 9(6), 1262-1269.

Fazal-e-Amin, A. K. M., & Oxley, A. (2011). A Review of Software Component Reusability Assessment Approaches. Research Journal of Information Technology, 3(1), 1-11.

Somani, U., Lakhani, K., & Mundra, M. (2010, 2830 Oct. 2010). Implementing digital signature with RSA ncryption algorithm to enhance the Data Security of cloud in Cloud Computing. Paper presented at the Parallel Distributed and Grid Computing (PDGC), 2010 1st International Conference on.

Vamsee k and sriram r, (2011) “Data Security in Cloud Computing,”in Journal of Computer and Mathematical Sciences Vol. 2, pp.1-169.

Shuai, H., & Jianchuan, X. (2011, 15-17 Sept. 2011). Ensuring data storage security through a novel third-party auditor scheme in cloud computing. Paper presented at the Cloud Computing and Intelligence Systems (CCIS), 2011 IEEE International Conference on.

Sood, S. K. (2012). A combined approach to ensure data security in cloud computing. Journal of Network and Computer Applications, 35(6), 18311838.

Additional Files

Published

30-05-2023

How to Cite

Rajan Jha, Nikita Kumari, & Chidera Carol Omeribe. (2023). Cloud Privacy and Security- A Review Paper. Vidhyayana - An International Multidisciplinary Peer-Reviewed E-Journal - ISSN 2454-8596, 8(si7), 333–351. Retrieved from http://vidhyayanaejournal.org/journal/article/view/828
Loading...