Abstract :
Cloud computing is the on-demand usage of computer resources through the internet, allowing us to relocate application software and databases. Its purpose is to deliver IT services that enable clients to benefit from the pay-per-use model’s substantial cost advantages and the ability to flexibly scale up or down without having to make significant investments in new hardware. On the other hand, the provider manages the data and services under this cloud architecture. Consequently, cloud clients have less control over their outsourced data and depend on cloud service providers to safeguard their data and infrastructure from both external and internal threats. In this study, we look at information security in cloud computing. It is the consideration of information on the cloud, considering security concerns. This article will go through data protection strategies utilized all around the globe to provide optimum data security by lowering risks and threats. Information accessibility is beneficial for various cloud applications, but it poses risks by exposing data to apps that already have security escape clauses. In addition, the presentation will outline information security highlights for Data in Transit and Data at Rest.
Keywords :
Cloud Computing, Data Security, Hardware Security, IaaS, PaaS, SaaS.References :
- W.K.Chan, Lijun Mei, T.HTse : “A Tale of Clouds- Paradigm Comparisons and Some Thoughts on Research Issues”, IEEE Asia-Pacific Services Computing Confer- ence pg: 464-469 2008.
- Siani Pearson, Yun Shen and Miranda Mowbray.: “A Privacy Manager for Cloud Computing”, HP Labs, Long Down Avenue, Stoke Gifford, Bristol BS34 8QZ, UK.
- Dean J. Ghemawat S.: “Map Reduce: Simplified data processing on large clusters” in Communications of the ACM, Vol. 51, No. 1 2008.
- ICICES2014 – S.A.Engineering College, Chennai, Tamil Nadu, India, Mr. Krunal Patel M.Tech CSE-SCSE Vel- lore Institute of Technology Vellore India, Prof. Sendhil Kumar K.S Assistant Professor(Sr)- SCSE Vellore In- stitute of Technology Vellore India, Mr. Navneet Singh, Mr.Kushang Parikh M.Tech CSE-SCSE Vellore Institute of Technology Vellore India, Dr. Jaisankar N. Professor SCSE Vellore Institute of Technology Vellore India.: “Data Security and Privacy using Data Partition and Centric key management in Cloud”.
- Dharmendra S. Raghuwanshi Cloud Security Group Centre for development of advanced computing, Chennai, India E-mail: dharmendrar@cdac.in, M.R.Rajagopalan Cloud Computing Group Centre for development of advanced computing, Chennai, India E-mail: mrambi53@gmail.com.: “MS2: Practical Data Privacy and Security Framework for Data at Rest in Cloud”.
- Wu Suyan, Li wenbo and Hu Xiangyi.: “Study of Digital Signature with Encryption Based on Combined Symmetric Key”, 2009 IEEE.
- Dripto Chatterjee, Joyshree Nath, Suvadeep Dasgupta and Asoke Nath.:“A new Symmetric key Cryptography Algorithm using extended MSA method: DJSA symmet- ric key algorithm”, 2011 IEEE.
- ThongponTeerakanok and SinchaiKamolphiwong.: “Accelerating Asymmetric-Key Cryptography using Parallel-key Cryptographic Algorithm (PCA)”, 2009 IEEE.
- Sunumol Cherian, Kavitha Murukezhan Department of computer Science, Vedavyasa Institute of Technology, Calicut ** Head of computer science De- partment, Vedavyasa Institute of Technology.: “Providing Data Protection as a Service in Cloud Computing”, International Journal of Scientific and Research Publi- cations, Volume 3, Issue 6, June 2013 1 ISSN 2250- 3153.
- Aejaz Ahmad Dar,School of Engineering and Technology, Islamic University of Science and Technology, Awantipora, Jammu and Kashmir, India: “Cloud Computing-Positive Impacts and Challenges in Business Perspective”.
- https://scholarworks.wmich.edu/cgi/viewcontent.cgi? article=1932context=masters theses
- Mohammad Sarosh Umar1, Mohammad Qasim Rafiq2 and Juned Ahmad Ansari3 Department of Computer Engineeing Aligarh Muslim University Aligarh, India.: “Graphical User Authentication: A Time Interval Based Approach”.
- Z. Gilani, A. Salam, and S. Ul Haq.: “Deploying and managing a cloud infrastructure: real world skills for the ComTIA cloud+ certification and beyond,” Wiley, Jan. 2015.
- S. Subashini and V. Kavitha.: “A survey on security issues in service delivery models of cloud computing,” J. Netw. Comput. Appl., vol. 34(1), Jan.2011, pp. 1–11.
- L. Wei et al.: “Security and privacy for storage and computation in cloud computing,” Inf. Sci. (Ny).,vol. 258, pp. 371386, Feb. 2014.
- https://www.researchgate.net/publication/341979640 Cloud Computing Security Challenges
- F. Howell and R. Mcnab. SimJava: A discrete event simulation library for java. In Proceedings of the first International Conference on Web-Based Modeling and Simulation, 1998.
- R. Buyya, C. S. Yeo, and S. Venugopal. Marketoriented cloud computing: Vision, hype, and reality for delivering IT services as computing utilities. In Proceedings of the 10th IEEE International Conference on High Performance Computing and Communications, 2008
- https://wheelhouse.solutions/what-are-the-advantages- of-infrastructure-as-a-service/
- https://www.ibm.com/cloud/blog/top-5-advantages-of- software-as-a-service
- https://www.nibusinessinfo.co.uk/content/advantages-and-disadvantages-software-servicesaas
- https://www.rswebsols.com/tutorials/softwaretutorials/saas–paas–iaas–advantagesdisadvantagescomparison
- https://www.guru99.com/cloud-computing-for-beginners.html
- M. Carroll, A. van der Merwe and P. Kotzé, “Secure cloud computing: Benefits, risks and controls,” 2011 Information Security for South Africa, 2011, pp. 1-9, doi: 10.1109/ISSA.2011.6027519.
- https://www.sciencedirect.com/science/article/pii/S0167739X10002554
- http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.640.1140rep=rep1type=pdf
- Lawrence, Dr. L. Arockiam & Donald, A. Cecil & Oli, S.. (2013). Mobile Cloud Security Issues and Challenges: A Perspective. International Journal of Engineering and Innovative Technology. 3. 401-406.
- M. Arfan, “Mobile cloud computing security using cryptographic hash function algorithm,” 2016 3rd International Conference on Information Technology, Computer, and Electrical Engineering (ICITACEE), 2016, pp. 1-5, doi: 10.1109/ICITACEE.2016.7892480.
- https://www.infoworld.com/article/3223434/what-is-paas-software-development-in-thecloud.html
- Sun, Yunchuan & Zhang 张均胜, Junsheng & Xiong, Yongping & Zhu, Guangyu. (2014). Data Security and Privacy in Cloud Computing. International Journal of Distributed Sensor Networks. 2014. 1-9. 10.1155/2014/190903.
- https://research.ijcaonline.org/volume94/number5/pxc3895625.pdf
- NIST SP 800-145, “A NIST definition of cloud computing”, [online] 2012, http://csrc.nist.gov/publications/drafts/800-45/Draft- SP-800-145 cloud-definition.pdf(Accessed: 23 December 2013)
- Elahi, T., Pearson,S.(2007). Privacy Assurance:Bridging the Gap Between Preference and Practice.In C.Labrinoudakis, G. Pernul A. Tjoa (Eds.),Trust, Privacy and Security in Digital Business(Vol. 4657, pp. 65-74): Spriner Berlin Heidelberg.
- Siani Pearson,: “Taking Account of Privacy when De-signing Cloud Computing Services,” CLOUD’09, May 23, 2009, Vancouver, Canada, pp. 44-52.
- 2018 2nd IEEE Advanced Information Management Communicates, Electronic and Automation Control Conference(IMCEC 2018): “The Research on SaaS Model Based on Cloud Computing”.
- Liu Yingjie, Wang Lunyan, Hu Fangyuan, Yuan Lu. Security Access Control in SaaS Mode Based on Improved RBAC Model [J] .Modern Computer, 2017 (15): 81-84.
- Huang Y. Pure design and implementation of RBAC system based on SaaS model [D]. Northeast Normal University, 2013.
- Huang Xiuli. Interpreting Cloud Cube Model [J]. Com- puter Technology and Development, 2012,22 (03): 245-248.
- Modak, G., Das, S. S., Miraj, M. A. I., & Morol, M. K. (2022, March). A Deep Learning Framework to Reconstruct Face under Mask. In 2022 7th International Conference on Data Science and Machine Learning Applications (CDMA) (pp. 200-205). IEEE.