Open Access Open Access  Restricted Access Subscription Access

A Review Paper on Cyber Security with Data Security in Cloud Computing

Gopal Krishn Tholambia, Neeraj Bhardwaj

Abstract


In cloud computing, security is a core concern because an organization or users trust for their critical information on cloud which is geographically dispersed and not under control of that user. Therefore security procedures and design of security architecture must be specific for cloud environment different to conventional technical system. Data security very important part of our life and it became a broad issue for information technology. In the cloud computing network environment, security more serious for the user’s information is available in various locations and worldwide. Data security protection is main concerns of the user about cloud technology. Although many cloud computing strategies have been investigated in both industry, academia and data protection privacy protection have been central to the development of cloud computing technologies in government, industry and business. In cloud Architecture, Data security and privacy protection are useful both Hardware and software. This study of reviews paper to have different strategies and challenges from both software and Hardware aspects of data protection in the cloud and aims to improve data security and environmental protection in a trusted cloud environment. In this paper, we perform a comparable empirical comparative study of existing research on data security and privacy protection techniques used in computer in the cloud. In this paper I discuss about general data security issues and brief about cloud computing.


Keywords


Cloud computing, data security, Information technology, hardware and software, environmental protection.

Full Text:

PDF

References


Ahmadi, M. and Moghaddam, F.F.; Jam, A.J.; Gholizadeh, S.; Eslami, M. A 3-level re-encryption model to ensure data protection in cloud computing environments. In Proceedings of the IEEE Conference on System, Process & Control , Kuala Lumpur, Malaysia, 12–14 December 2014.

Anitha Y, ―Security Issues in cloud computing‖, ―International Journal of Thesis Projects and Dissertations ―(IJTPD) Vol. 1, Issue 1, PP :( 1-6), Month: October 2013.

Oluyinka. I. Omotosho -- A Review on Cloud Computing

Arockiam, L. and Monikandan, S. Efficient cloud storage confidentiality to ensure data security. In Proceedings of the International Conference on Computer Communication and Informatics, Coimbatore, India, 3–5 January 2014; pp. 1–5.

Balamurugan, S.; Sathyanarayana, S. and Manikandasaran, S.S. ESSAO: Enhanced security service algorithm using data obfuscation technique to protect data in public cloud storage. Indian J. Sci. Technol. 2016.

Cloud Computing. Available online: https://en.wikipedia.org/wiki/Cloud_computing#Security_and _privacy (accessed on 8 February 2017).

Abdul D. S. and Elminaam, H. M. Abdul Kader and M. M. Hadhoud, ―Performance Evaluation of Symmetric Encryption Algorithms‖, Communications of the IBIMA Volume 8, 2009.

Gurpreet S. and Supriya K. ―Integrating AES, DES, and 3-DES Encryption Algorithms for Enhanced Data Security‖ International Journal of Scientific & Engineering Research, Volume 4, Issue 7, July-2013.

Garima S. and Gurgaon N. S., ―Triple Security of Data in Cloud Computing‖. Garima Saini et al, / (IJCSIT) International Journal of Computer Science and Information Technologies, Vol.5 (4).2014,

Jaeger, B. Security as a Service Working Group, Defined Categories of Security as a Service (Preview)—Continuous Monitoring as a Service. Cloud Security Alliance 2016. Available online: https://downloads.cloudsecurityalliance.org/assets/research/security-as-a-service/csa-categoriessecurities-prep.pdf (accessed on 10 August 2016).

Li, M. On the Confidentiality of Information Dispersal Algorithms and Their Erasure Codes. arXiv 2013, arXiv:1206.4123v2.

Mar, K. K.; Law, C. Y. and Chin, V. Secure personal cloud storage. InProceedingsofthe10thInternationalConference for Internet Technology and Secured Transactions (ICITST-2015), London, UK,14–16December2015.

Mask Sensitive Data. Available online: https://dataapps.io/redact.html (accessed on 12 January 2017).

Dropbox - your stuff, anywhere. https://www.dropbox.com/; 2013.

Varia, J., Mathew, S. Overview of amazon web services. http://aws.amazon.com/whitepapers; March 2013.

Amazon web services: Overview of security processes. http://aws.amazon.com/security/; June 2013.

Google, “Browser security handbook,” 2009. [Online].Available: http://code.google.com/p/browsersec/

P. Karl Rexer. 2010 data miner survey highlights the views of 735 data miners, 2010.




DOI: https://doi.org/10.37591/jons.v9i3.831

Refbacks

  • There are currently no refbacks.


Copyright (c) 2022 Journal of Network Security

  • eISSN: 2395–6739
  • ISSN: 2321–8517