Exploring Data Security Issues and Solutions in Cloud Computing

被引:106
作者
Kumar, P. Ravi [1 ]
Raj, P. Herbert [2 ]
Jelciana, P. [3 ]
机构
[1] MOE, Sch ICT, IBTE JB Campus, Kuala Belait, Brunei
[2] MOE, Sch ICT, IBTE SB Campus, Seria, Brunei
[3] Laksamana Coll Business, Bandar Seri Begawan, Brunei
来源
6TH INTERNATIONAL CONFERENCE ON SMART COMPUTING AND COMMUNICATIONS | 2018年 / 125卷
关键词
Cloud Computing; Data Security; Cloud Services; Confidentiality; Integrity; Availability; Authentication and Access Control;
D O I
10.1016/j.procs.2017.12.089
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Cloud computing is one of the fastest emerging technologies in computing. There are many advantages as well few security issues in cloud computing. This paper explores the different data security issues in cloud computing in a multi-tenant environment and proposes methods to overcome the security issues. This paper also describes Cloud computing models such as the deployment models and the service delivery models. In any business or Cloud Computing data are exceptionally important, data leaking or corruption can shatter the confidence of the people and can lead to the collapse of that business. Currently cloud computing is used directly or indirectly in many businesses and if any data breaching has happened in cloud computing, that will affect the cloud computing as well as the company's business. This is one of the main reasons for cloud computing companies to give more attention to data security. (C) 2018 The Authors. Published by Elsevier B.V.
引用
收藏
页码:691 / 697
页数:7
相关论文
共 30 条
[1]  
Aldossary S., 2016, INT J ADV COMPUTER S, V7
[2]  
[Anonymous], CUST CLOUD ARCH MOB
[3]  
[Anonymous], 2010, OWASP top 10 application security risks -
[4]  
Ateniese G, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P598
[5]   Remote Data Checking Using Provable Data Possession [J].
Ateniese, Giuseppe ;
Burns, Randal ;
Curtmola, Reza ;
Herring, Joseph ;
Khan, Osama ;
Kissner, Lea ;
Peterson, Zachary ;
Song, Dawn .
ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2011, 14 (01)
[6]  
Atieniese G., 2008, P 4 INT C SEC PRIV C
[7]   Enhanced Security Framework for Data Integrity Using Third-party Auditing in the Cloud System [J].
Balusamy, Balamurugan ;
Venkatakrishna, P. ;
Vaidhyanathan, Abinaya ;
Ravikumar, Meenakshi ;
Munisamy, Nirmala Devi .
ARTIFICIAL INTELLIGENCE AND EVOLUTIONARY ALGORITHMS IN ENGINEERING SYSTEMS, VOL 2, 2015, 325 :25-31
[8]  
Bhadauria Rohit., 2012, INT J COMPUTER APPL, V47, P47, DOI DOI 10.5120/7292-0578
[9]  
Brunette G., 2009, Cloud Security Alliance, P1
[10]  
Catteddu D., 2009, INFORM SECURITY, V51273, P1