Data Security and Privacy Concerns in Cloud Computing
Internet of Things and Cloud Computing
Volume 2, Issue 2, April 2014, Pages: 6-11
Received: Jun. 3, 2014; Accepted: Jun. 28, 2014; Published: Aug. 20, 2014
Views 4447      Downloads 440
Author
Masrat Yousuf Pandith, I.T Skills Department, King Saud University, Riyadh, Saudi Arabia
Article Tools
Follow on us
Abstract
Cloud is a latest computing paradigm. Cloud computing means storing and accessing data and programs over the internet instead of computer’s hard disk. Cloud storage makes it easy to access the software, resources and data anytime anywhere when connected to the internet. Now-a-days almost every organization is using cloud to store the data. There is a need to protect that data .Cloud data security goal aims at three main things: Availability, Confidentiality, and Integrity. Cryptography is used to achieve confidentiality. Three types of algorithms are used in Cryptography (1) Symmetric-key algorithms (2) Asymmetric-key algorithms and (3) Hashing. Hashing algorithms ensure integrity of data. Cloud provides three types of services to its users: SaaS – enables users to run applications online through cloud computing techniques PaaS – enables the users to build their own cloud applications using supplier-specific tools and languages through cloud computing techniques.IaaS – enables the users to run any application on supplier’s cloud hardware. This paper discusses the types, service model, deployment methods, data security and privacy concerns in cloud.
Keywords
Cloud Computing, Cryptography, IaaS, PaaS , SaaS, Symmetric-Key, Asymmetric-Key, Hashing
To cite this article
Masrat Yousuf Pandith, Data Security and Privacy Concerns in Cloud Computing, Internet of Things and Cloud Computing. Vol. 2, No. 2, 2014, pp. 6-11. doi: 10.11648/j.iotcc.20140202.11
References
[1]
Private Cloud Computing Essentials- 2 X Software white papers available at: http://www.2x.com/docs/en/whitepapers/pdf/Private_Cloud_Computing_Essentials.pdf
[2]
NIST Definition of Cloud Computing. Peter Mell Timothy Grance NIST Special Publication 800-145 computer security .Computer Security Division Information Technology Laboratory .National Institute of Standards and Technology Gaithersburg, MD 20899-8930 September 2011 U.S. Department of Commerce Rebecca M. Blank.
[3]
Security Guidance for Critical Areas of Focus in Cloud Computing V2.1Prepared by the Cloud Security Alliance December 2009
[4]
Cloud Computing basics available at: http://south.cattelecom.com/rtso/Technologies/CloudComputing/0071626948_chap01.pdf
[5]
A survey of cryptographic algorithms for cloud computing Rashmi Nigori, Manoj Jhuria, Dr. Shailendra Singh. International Journal of Emerging Technologies in computational and Applied Sciences (IJETCAS). ISSn (print): 2279-0047, ISSN (online) : 2279-0055.
[6]
Efficiency of Modern Encyrption Algorithm in cloud computing.Omer k jasmine, Safia Abbas, El-Sayed M.Horbaty and Abdel-Badeeh M. Salem International Journal of Emerging Trends of Technology in computer science (IJETICS) ISSN 2278-6856.
[7]
Analyzing Data Security for cloud computing using cryptographic Algorithms. Gurpreet Kaur, Manish Mahajan Gurpreet kaur et al.int Journal of Engineering Research and Applications. ISSN : 2248-9622, Vol. 3, Issue 5, Sep-Oct 2013, pp.782-786
[8]
Implementing Encryption Algorithms to Enhance Data Security of Cloud in Cloud Computing Manpreet Kaur, Rajbir Singh. International Journal of Computer Applications (0975 – 8887) Volume 70– No.18, May 2013
[9]
Cloud Computing A collection of working papers Thomas B Winans John Seely Brown
[10]
Armbrust, M., Fox, A., Griffith, R., Joseph, A., Katz, R., Konwinski, A., et al. (2009). Above the clouds: A berkeley view of cloud computing. EECS Department, University of California, Berkeley, Tech. Rep. UCB/EECS-2009-28.
[11]
Boniface, M., Nasser, B., Papay, J., Phillips, S., Servin, A., Yang, X., et al. (2009). Platform-as-a-Service Architecture for Real-time Quality of Service Management in Clouds.
[12]
Murphy, M., Abraham, L., Fenn, M., & Goasguen, S. (2009). Autonomic Clouds on the Grid. Journal of Grid Computing, 1-18
[13]
Cryptography and Cloud Security Challenges Nitin Singh Chauhan and Ashutosh Saxena.CSI Communications
[14]
Ronald L. Krutz and Russell Dean Vines, Cloud Security: A Comprehensive Guide to Secure Cloud Computing Wiley Publishing, Inc. Indianapolis, Indiana 2010.
[15]
Cloud Security and privacy An Enterprise perspective on risks and compliance.O’Reilly Tim Mather, Subra Kumaraswamy, Shahed Latif
[16]
Security and Privacy Issues in Cloud Computing Jaydip Sen Innovation Labs, Tata Consultancy Services Ltd., Kolkata, INDIA.
[17]
Introduction to Cloud Computing.office of the privacy commissioner of Canada.Fact Sheet available at: http://www.priv.gc.ca/resource/fs-fi/02_05_d_51_cc_e.pdf .
[18]
US-CERT united states computer Emergency Readiness Team The Basics of Cloud Computing Alexa Huth and James Cebula Available at: http://www.uscert.gov/sites/default/files/publications/CloudComputingHuthCebula.pdf.
[19]
Cloud Computing Security Issues and Challenges Kuyoro S. O., Ibikunle F. & Awodele O. International Journal of Computer Networks (IJCN), Volume (3) : Issue (5) : 2011
[20]
Privacy, Security and Trust in Cloud Computing Siani Pearson HP Laboratories HPL-2012-80R1
[21]
Bisong and S M Rahman, “An overview of the security concerns in enterprise cloud computing,” CoRR, vol. abs/1101.5613, 2011.
[22]
Cloud Computing Security and Privacy Issues: The Council of European Professional Informatics Societies LSI SIN (10)02 Source: Marko Hölbl Version: V17/15.032011Available at: http://www.cepis.org/media/CEPIS_Cloud_Computing_Security_v17.11.pdf
[23]
Data Security In The Cloud Protecting Business-Critical Information In Public, Private and Hybrid Cloud Environments available at: http://www.vormetric.com/sites/default/files/wp-data-security-in-the-cloud.pdf
[24]
Addressing Data Security Challenges In he Cloud The Need for Cloud Computing Security A Trend Micro White Paper | July 2010. available at: http://www.trendmicro.com/cloud-content/us/pdfs/business/white-papers/wp_addressing-security-challenges-in-the-cloud.pdf
[25]
NIST National Institute of Standards and Technology U.S department of commerce. Guidelines on Security and Privacy in Public Cloud Computing .Draft Special Publication 800-144.Wayne Jansen Timothy Grance.available at: https://cloudsecurityalliance.org/wp-content/uploads/2011/07/NIST-Draft-SP-800-144_cloud-computing.pdf
[26]
zenith international journal of multidisciplinary research vol.2 issue 4, april 2012, issn 2231 5780.Security and privacy issues of cloud computing; solutions and secure framework prof: asha mathew assistant professor (research), welingkar institute of management development and research banglore.
[27]
Securing the Cloud: Addressing Cloud Computing Security Concerns with Private Cloud .Available at: http://www.rackspace.com/knowledge_center/article/securing-the-cloud-addressing-cloud-computing-security-concerns-with-private-cloud
[28]
Public Cloud Security Concerns Remain after Recent Study Available at: http://www.jurinnov.com/cloud-security/
[29]
S. Arnold (2009, Jul.). “Cloud computing and the issue of privacy.” KM World, pp14-22.Available at: www.kmworld.com [Aug. 19, 2009].
[30]
Private clouds Krishnan Subramanian Analyst & Researcher Krishworld.com.A whitepaper sponsored by Trend Micro Inc.
[31]
Review A survey on security issues in service delivery models of cloud computing. S. Subashini n, V. Kavitha. Journal of Network and Computer Applications.
ADDRESS
Science Publishing Group
1 Rockefeller Plaza,
10th and 11th Floors,
New York, NY 10020
U.S.A.
Tel: (001)347-983-5186