Data Storage Security Issues and Solutions in Cloud Computing

  • Tapendra Singh RathoreEmail author
  • Rejo Mathew
Conference paper
Part of the Lecture Notes on Data Engineering and Communications Technologies book series (LNDECT, volume 49)


Cloud computing is the backbone of most of the modern technological functioning employed across the globe. It‘s primary concern is to store data in an efficient and secured manner. In cloud computing, users can access their data from server on which their data is stored. User access data from servers when required via the cloud service providers. The server is most vulnerable to threats as it is the main hub where the data is stored, not only server is vulnerable to attacks but also the channels via which the user access data hence everywhere precautions has to be taken. In order to provide a secure access of data to the users various measures have to be made. Cloud computing is vulnerable to various threats as the data is accessed from remote server that are away from users, this also make users doubtful to prefer cloud over traditional storage. This paper reviews various security issues being faced with data storage in cloud computing.


Cloud storage Coprocessors cloud storage Searchable encryption Kerberos Data obfuscation Steganography 


  1. 1.
    Venkatesh, A., Eastaff, M.S.: A study of data storage security issues in cloud computing. IJSRCSEIT 3(1) (2018)Google Scholar
  2. 2.
    Patel, F.: Community cloud computing with association of cloud computing paradigm: a study. IJARCSSE 4(5) (2014)Google Scholar
  3. 3.
    Sugumar, R., Raja, K.: Enhanced data security methodology for cloud computing environment. IJSRCSEIT (2018)Google Scholar
  4. 4.
    Shinde, S., Wanaskar, U.H.: Keylogging: a malicious attack. IJARCCE 5(6) (2016)Google Scholar
  5. 5.
    Babu, V.S., Kumar, M.M.V.M.: An efficient and secure data storage operations in mobile cloud computing. IJSRSET 4(1) (2018)Google Scholar
  6. 6.
    Purushothaman, D., Abburu, S.: An approach for data storage security in cloud computing. IJCSI 9(2) (2012)Google Scholar
  7. 7.
    Singh, A., Shrivastava, M.: Overview of attacks on cloud computing. IJEIT 1(4) (2012)Google Scholar
  8. 8.
    Sevak, B.: Security against side channel attack in cloud computing. IJEAT 2(2) (2012)Google Scholar
  9. 9.
    Gairola, T., Singh, K.: A review on DOS and DDOS attacks in cloud environment & security solutions. IJCSMC 5(7) (2016)Google Scholar
  10. 10.
    Rao, R.K., Vasudha, S.B.: A review on malware injection in cloud computing. IJIRCCE 6(4) (2018)Google Scholar
  11. 11.
    Vaudenay, S.: A Classical Introduction to Cryptography Applications for Communications Security. Springer, Boston (2006)zbMATHGoogle Scholar
  12. 12.
    Stallings, W.: Cryptography and Network Security - Principles and Practice, 5th edn. Pearson Education, Inc., London (2011)Google Scholar
  13. 13.
    Amalarethinam, D.I.G., Mary, B.F.: Data security enhancement in public cloud storage using data obfuscation and steganography. In: WCCCT (2017)Google Scholar
  14. 14.
    Amalarethinam, D.I.G., Mary, B.F.: Data security enhancement in public cloud storage using data obfuscation. Perspect. Sci. (2016). (communicated)Google Scholar
  15. 15.
    Smys, S.: DDOS attack detection in telecommunication network using machine learning. J. Ubiquitous Comput. Commun. Technol. (UCCT) 1(01), 33–44 (2019)Google Scholar
  16. 16.

Copyright information

© Springer Nature Switzerland AG 2020

Authors and Affiliations

  1. 1.Department of Information TechnologyNMIMS (Deemed-to-be) UniversityMumbaiIndia

Personalised recommendations