Cloud Computing: Security and Privacy Issues
Abstract
Cloud computing has been considered a revolutionary approach towards the computing and a promising solution to increasing demand for using resources provisioned over the Internet which becomes more risky than ever. The cloud computing is a powerful technology in IT environment to provide cost effective, easy to manage, elastic, and powerful resources over the Internet. by eliminating the need to maintain expensive computing hardware, The cloud computing increases the capabilities of the hardware resources through optimal and shared utilization. Even though there are innumerable advantages to approaching the cloud computing, it also contains various problems lie in data security, data confidentiality, Authenticity and Privacy. The prominent barrier to adopt the cloud computing is security. This paper comprises the elaborated study on various security issues related to cloud storage in order to protect the data stored in the cloud.
Keywords
Cloud computing Cloud computing Encryption Data security Privacy issuesReferences
- 1.Murugesan, S., Bojanova, I.: Encyclopedia of Cloud Computing. Wiley, Chichester (2016)CrossRefGoogle Scholar
- 2.Pourabbas, E.: Geographical Information Systems: Trends and Technologies. CRC Press, Boca Raton (2014)CrossRefGoogle Scholar
- 3.Rafaels, R.: Cloud Computing: From Beginning to End. CreateSpace Independent Publishing Platform (2015)Google Scholar
- 4.Zheng, D.: Future Intelligent Information Systems, vol. 1. Springer, Heidelberg (2011)CrossRefGoogle Scholar
- 5.Vance, T.C., Merati, N., Yang, C., Yuan, M.: Cloud Computing in Ocean and Atmospheric Sciences. Elsevier, New York Google Scholar
- 6.Furht, B., Escalante, A.: Handbook of Cloud Computing. Springer Science & Business Media (2010)Google Scholar
- 7.Sehgal, N.K., Bhatt, P.C.P.: Cloud Computing: Concepts and Practices. Springer International Publishing (2018)Google Scholar
- 8.Peng, S., Wang, S., Balas, V.E., Zhao, M.: Security with Intelligent Computing and Big-data Services. Springer International Publishing (2018)Google Scholar
- 9.Turuk, A.K., Sahoo, B., Kanti, A.S.: Resource Management and Efficiency in Cloud Computing Environments. IGI Global (2016)Google Scholar
- 10.Gupta, P.K., Tyagi, V., Singh, S.K.: Predictive Computing and Information Security. Springer, Singapore (2017)CrossRefGoogle Scholar
- 11.Kumar, V., Chaisiri, S., Ko, R.: Data Security in Cloud Computing. Institution of Engineering and Technology (2017)Google Scholar
- 12.Peng, S., Wang, S., Balas, V.E., Zhao, M.: Security with Intelligent Computing and Big-data Services. Springer International Publishing (2018)Google Scholar
- 13.Krutz, R., Vines, R.: Cloud Security: A Comprehensive Guide to Secure Cloud Computing, p. 384. Wiley, Indianapolis (2010)Google Scholar
- 14.Mishra, B.S.P., Das, H., Dehuri, S., Jagadev, A.K.: Cloud Computing for Optimization: Foundations, Applications, and Challenges. Springer, Cham (2018)CrossRefGoogle Scholar
- 15.Le, D., Kumar, R., Nguyen, G., Chatterjee, J.M.: Cloud Computing and Virtualization. Wiley (2018)Google Scholar
- 16.Zhu, X.: GIS for Environmental Applications: A Practical Approach. Routledge, London (2016)Google Scholar
- 17.Mell, P., Grance, T.: The NIST Definition of Cloud Computing. NIST, USA (2011)CrossRefGoogle Scholar
- 18.Yang, C., Huang, Q.: Spatial Cloud Computing: A Practical Approach. CRC Press, Boca Raton (2013)CrossRefGoogle Scholar
- 19.Ziani, A., Medouri, A.: Use of Cloud Computing Technologies for Geographic Information Systems. In: Ezziyyani, M., Bahaj, M., Khoukhi, F. (eds.) Advanced Information Technology, Services and Systems. AIT2S 2017. Lecture Notes in Networks and Systems, vol 25, pp. 315–323. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-69137-4_28. 978-3-319-69136-7Google Scholar
- 20.Ivan, I., Singleton, A., Horák, J., Inspektor, T.: The Rise of Big Spatial Data. Springer (2016)Google Scholar
- 21.Bhat, M.A., Shah, R.M., Ahmad, B., Bhat, I.R.: Cloud computing: a solution to information support systems (ISS). Int. J. Comput. Appl. 11(5) (December 2010). (0975–8887)CrossRefGoogle Scholar