International Journal of Wireless and Ad Hoc Communication

Journal DOI

https://doi.org/10.54216/IJWAC

Submit Your Paper

2692-4056ISSN (Online)

Volume 7 , Issue 1 , PP: 50-61, 2023 | Cite this article as | XML | Html | PDF | Full Length Article

Data Security in Cloud Computing

Faya Safar 1 , Raddad Al King 2

  • 1 Master of Web Science (MWS) Program, Syrian Virtual University Syria - (faya_243029@svuonline.org)
  • 2 Master of Web Science (MWS) Program, Syrian Virtual University Syria - (t_ralking@svuonline.org)
  • Doi: https://doi.org/10.54216/IJWAC.070105

    Received: January 28, 2023 Revised: April 26, 2023 Accepted: May 24, 2023
    Abstract

    In recent years, cloud computing was and still is one of the most pragmatic and popular topics of research because of its advantages. Cloud storage allows organizations to store information of service providers at remote sites. However, cloud computing has encountered challenges, notably security issues and scheduling problems, primarily stemming from concerns related to data confidentiality and efficient resource allocation among users. These challenges are inherent to cloud computing, where data and computational resources are shared among multiple users and often hosted on remote servers operated by third-party providers. Hence, our objective is to identify and analyze the challenges associated with cloud computing, with a particular focus on data security. in addition to conduct scientific review and compare multiple recent research studies. The focus will be on identify challenges and advantages of cloud computing and data security when going through various data security measures that are currently employed in cloud computing. eventually we will come up with valid recommendations based on the findings.

    Keywords :

    Cloud computing , Data security , Data leakage , Confidentiality , Privacy , Cryptography ,   , Data integrity

    References

    [1]          Li Yibin, Keke Gai, Longfei Qiu, Meikang Qiu, Zhao Hui, “(Intelligent cryptography approach for secure distributed big data storage in cloud computing) 3 September 2016. Published by Science Direct journal. https://www.sciencedirect.com/science/article/abs/pii/S0020025516307319

    [2]          Jaydip Sen “Security and Privacy Issues in Cloud Computing” Innovation Labs, Tata Consultancy Services Ltd., Kolkata, INDIA.

    [3]          Rajeev Kumar “DATA SECURITY IN CLOUD COMPUTING AND COST ANALYSIS: REVIEW” International Journal of Technical Research and Applications e-ISSN: 2320-8163, www.ijtra.com Volume 1, Issue 3 (July-August 2013), PP. 40-46.

    [4]          S. Sakr, A. Liu, D. M. Batista, and M. Alomari, "A Survey of Large-Scale Data Management Approaches in Cloud Environments," Communications Surveys & Tutorials, IEEE, vol. 13, pp. 311- 336.

    [5]          Dr. C. Krishna Priya, Dr. JVN Ramesh, Dr V Srinivas, Dr. S. Kalaimagal “Data Security Analysis in Cloud Environment: A Review” National Conference on Advances in Computer Science, Engineering and Technology (NACET)-2017.

    [6]          W. Cong, R. Kui, L. Wenjing, and L. Jin, "Toward publicly auditable secure cloud data storage services" Network, IEEE, vol. 24, pp. 19-24

    [7]          Mai Rady , Tamer Abdelkader, Rasha Ismail “Integrity and Confidentiality in Cloud Outsourced Data” Ain Shams Engineering Journal 10 (2019) 275–285.

    [8]          T. Hsin-Yi, M. Siebenhaar, A. Miede, H. Yu-Lun, and R. Steinmetz, "Threat as a Service?: Virtualization's Impact on Cloud Security," IT Professional, vol. 14, pp. 32-37.

    [9]          P. You, P. Yuxing, W. Liu, and S. Xue, "Security Issues and Solutions in Cloud Computing," in 32nd International Conference on Distributed Computing Systems Workshops (ICDCSW), 2012, pp. 573-577.

    [10]       Abi Tyas Tunggal “What Are Cloud Leaks?” Cybersecurity journal, Feb 23, 2023.

    [11]       S. Subashini and V. Kavitha, "Review: A survey on security issues in service delivery models of cloud computing," J. Netw. Comput. Appl., vol. 34, pp. 1- 11.

    [12]       Mr. Avinash Ganne “CLOUD DATA SECURITY METHODS: KUBERNETES VS DOCKER SWARM” e-ISSN: 2582-5208 International Research Journal of Modernization in Engineering Technology and Science (Peer-Reviewed, Open Access, Fully Refereed International Journal) Volume:04/Issue:12/December-2022 Impact Factor- 6.752  WWW.irjmets.com.

    [13]       Rishabh Gupta, Deepika Saxena, and Ashutosh Kumar Singh “DATA SECURITY & PRIVACY IN CLOUD COMPUTING: CONCEPTS AND EMERGING TRENDS” Department of Computer Applications National Institute of Technology Kurukshetra, India deepika_6180096@nitkkr. August 24, 2021.

    [14]       Sajid Habib Gill, Mirza Abdur Razzaq, Muneer Ahmad, Fahad M. Almansour, Ikram Ul Haq, NZ Jhanjhi, Malik Zaib Alam, and Mehedi Masud “Security and Privacy Aspects of Cloud Computing: A Smart Campus Case Study” Intelligent Automation & Soft Computing DOI:10.32604/IASC.2022.016597, Received: 06 January 2021; Accepted: 05 May 2021.

    [15]       Bayan A. Alenizi, Mamoona Humayun, NZ Jhanjhi “Security and Privacy Issues in Cloud Computing” International Conference on Recent Trends in Computing (ICRTCE-2021) Journal of Physics: Conference Series 1979 (2021) 012038 IOP Publishing doi: 10.1088/1742- 6596/1979/1/012038.

    [16]       Bader Alouffi, Muhammad Hasan, Abdullah Alharbi, Wael Alosaimi, Hashem Alyami, and Muhammad Ayaz, “A Systematic Literature Review on Cloud Computing Security: Threats and Mitigation Strategies” Published by IEEE Access. Received March 17, 2021, accepted April 9, 2021,

    [17]       Date of publication April 14, 2021, date of current version April 21, 2021. Digital Object Identifier 10.1109/ACCESS.2021.3073203.

    [18]       Isma Zulifqar, Sadia Anayat, Imtiaz Kharal “A Review of Data Security Challenges and their Solutions in Cloud Computing” Govt College Women University Sialkot, Pakistan Received: 12 August 2020; Accepted: 17 November 2020; Published: 08 June 2021.

    [19]       Lynda Kacha and Abdelhafid Zitouni “An Overview on Data Security in Cloud Computing” Lire Labs, Abdelhamid Mehri Constantine 2 University, Ali Mendjli, 25000 Constantine, Algeria (2018).

    [20]       Eman M.Mohamed, Hatem S. Abdelkader, and Sherif EI-Etriby “Enhanced Data Security Model for Cloud Computing” The 8th International Conference on INFOrmatics and Systems (INFOS2012) - 14-16 May 2012 Cloud and Mobile Computing Track.

    [21]    Zahra Ghanbari “A Literature Review on Cloud Computing Security Issues” Department of Information Technology-Computer Network Engineering, Electronic Branch Islamic Azad University Tehran, Iran. 

    Cite This Article As :
    Safar, Faya. , Al, Raddad. Data Security in Cloud Computing. International Journal of Wireless and Ad Hoc Communication, vol. , no. , 2023, pp. 50-61. DOI: https://doi.org/10.54216/IJWAC.070105
    Safar, F. Al, R. (2023). Data Security in Cloud Computing. International Journal of Wireless and Ad Hoc Communication, (), 50-61. DOI: https://doi.org/10.54216/IJWAC.070105
    Safar, Faya. Al, Raddad. Data Security in Cloud Computing. International Journal of Wireless and Ad Hoc Communication , no. (2023): 50-61. DOI: https://doi.org/10.54216/IJWAC.070105
    Safar, F. , Al, R. (2023) . Data Security in Cloud Computing. International Journal of Wireless and Ad Hoc Communication , () , 50-61 . DOI: https://doi.org/10.54216/IJWAC.070105
    Safar F. , Al R. [2023]. Data Security in Cloud Computing. International Journal of Wireless and Ad Hoc Communication. (): 50-61. DOI: https://doi.org/10.54216/IJWAC.070105
    Safar, F. Al, R. "Data Security in Cloud Computing," International Journal of Wireless and Ad Hoc Communication, vol. , no. , pp. 50-61, 2023. DOI: https://doi.org/10.54216/IJWAC.070105