A Review on Data Security in Cloud Computing

@article{Soofi2014ARO,
  title={A Review on Data Security in Cloud Computing},
  author={Aized Amin Soofi and M. Irfan Khan and Fazal-e-Amin},
  journal={International Journal of Computer Applications},
  year={2014},
  volume={94},
  pages={12-20}
}
Cloud computing is an Internet-based computing and next stage in evolution of the internet. It has received significant attention in recent years but security issue is one of the major inhibitor in decreasing the growth of cloud computing. It essentially shifts the user data and application software to large datacenters i.e, cloud, which is remotely located, at which user does not have any control and the management of data may not be completely secure. However, this sole feature of the cloud… 

Figures and Tables from this paper

EMPLOYING SECURITY TECHNIQUES IN THE CURRENT WORLD OF CLOUD COMPUTING ENVIRONMENT: A STUDY
TLDR
This research paper discusses security techniques that will be used for data confidentiality in cloud computing environment and lots of authentication and authorization techniques are being used.
A New Cloud Security and Confidentiality Model by Encryption and Data Monitoring
TLDR
In this study, an effort is made to review the encryption techniques used for the data confidentiality and the results are classified on the basis of type of approach and the type of validation used to validate the approach.
Encryption Techniques for Cloud Data Confidentiality
TLDR
An attempt is made to review the encryption techniques used for the data confidentiality in cloud environment and the results are classified on the basis of type of approach and the type of validation used to validate the approach.
Encryption Technique for a Trusted Cloud Computing Environment
TLDR
A schema that ensures encryption of data using Advanced Encryption Standards is described that can help in further enhancement of the cloud computing standards.
Security on Cloud Computing
TLDR
There are two methods described for data storage security in cloud using range and knn query and MuteDB, where SQL operations can perform on encrypted data and access control policies to cloud provider are compared.
The Use of Biometrics in Multifactor Authentication (MFA) for Cloud Computing Data Storage
TLDR
There is a need to enhance the current authentication schemes in use and how to enhance multifactor authentication using fingerprint biometrics in cloud computing data storage to assure confidentiality and integrity of user data.
DEBTDS-A DOUBLE ENCRYPTION BASED ON TOKENS FOR DATA SECURITY IN CLOUD COMPUTING
TLDR
A double encryption method based on tokens is proposed to strengthen security in cloud data transfer between Cloud Client (CC) and Cloud Service Provider (CSP).
Balancing theft and corruption threats by data partition in cloud system with independent server protection
Security of Separated Data in Cloud Systems with Competing Attack Detection and Data Theft Processes
TLDR
This article models and analyzes the attack success probability (complement of data security) in cloud systems subject to competing attack detection process ( by EWAs), and data theft process (by co‐residence attackers) and determines the optimal data partition and protection policy.
...
...

References

SHOWING 1-10 OF 62 REFERENCES
A combined approach to ensure data security in cloud computing
  • S. Sood
  • Computer Science
    J. Netw. Comput. Appl.
  • 2012
Study on Data Security of Cloud Computing
TLDR
Nine key data security principles were analyzed in depth on the basis of a comprehensive summary of the data need to be protected and six key technologies of data security were proposed.
A survey on security issues in service delivery models of cloud computing
Enhancement for data security in cloud computing environment
  • M. B. Gawali, R. B. Wagh
  • Computer Science
    2012 Nirma University International Conference on Engineering (NUiCONE)
  • 2012
TLDR
This system provides the environment for the user to perform his tasks, but with very high security, and by using further facilities provided in this system user fill secure about his data and his account.
A study in data security in cloud computing
The vision of 21st century computing is that users can access Internet services over lightweight portable devices rather than via variants of the traditional desktop computer. Consequently, users
Ensuring data storage security in Cloud Computing
TLDR
This work proposes an effective and flexible distributed scheme with two salient features, opposing to its predecessors, that achieves the integration of storage correctness insurance and data error localization, i.e., the identification of misbehaving server(s).
Secure User Data in Cloud Computing Using Encryption Algorithms
TLDR
This paper has discussed about cloud computing security issues, mechanism, challenges that cloud service provider face during cloud engineering and presented the metaphoric study of various security algorithms.
A privacy preserving repository for securing data across the cloud
TLDR
This paper aims at simultaneously achieving data confidentiality while still keeping the harmonizing relations intact in the cloud by constructing a privacy preserving repository that enables the data owner to delegate most of computation intensive tasks to cloud servers without disclosing data contents or user access privilege information.
Ensuring data storage security in cloud computing using Sobol Sequence
TLDR
This paper proposes an effective and flexible distribution verification protocol to address data storage security in cloud computing and relies on erasure code for the availability, reliability of data and utilize token pre-computation using Sobol Sequence to verify the integrity of erasure coded data rather than Pseudorandom Data in existing system.
Improving stored data security in Cloud using Rc5 algorithm
TLDR
Here Work is focuses on RC5 Encryption Algorithm for stored data in cloud, secure and easy to use; it is fulfilling the needs of cloud users and providers.
...
...