Security Issues and Challenges in Cloud Computing: A Review (original) (raw)

Multilevel Security in Cloud Computing

International journal of engineering research and technology, 2018

Cloud computing is the next big thing after internet in the field of information technology. It is an internet-based computing technology, in which software, shared resources and information, are provided to consumers and devices ondemand. Benefits of cloud storage are easy access, scalability, resilience, cost efficiency and high reliability of the data. Because of these benefits each and every organization is moving its data to the cloud, means it uses the storage service provided by the cloud provider. So there is a need to protect that data against unauthorized access, modification or denial of services etc. Privacy and security are the key issue for cloud storage. The proposed work plan is to eliminate the concerns regarding data privacy using cryptographic algorithms to enhance the security in cloud. In this paper, the proposed solution will be introduced to increase security in cloud computing. The multilevel encryption on cloud data is a method to secure data from access of ...

Implementing Multilevel Data Security in Cloud Computing

International Journal of Advanced Research in Computer Science, 2017

Cloud Computing is an information technology type which is used to access information and sharing of data on remote site. By using cloud computing one has not to worry about load of local data storage to store his data. Security And authentication of data is must while using this kind of services. Various factors are presents there which can affect security of data. This paper provide an idea about security and authentication operation .This paper explain some encryption scheme as well as RSA and how to improve security of a data using Symmetric Tokens. This paper proposes a multilevel authentication technique that helps us to enhance the security of data storage in the cloud computing systems. We provide combined approach DES and AES using RSA to protect clients' authentication data such as user name and password.

Security Concerns at Various Levels of Cloud Computing Paradigm: A Review

Cloud computing has become a buzzword in IT industry these days and organization are getting attracted towards this magnet for expanding their infrastructure at cheaper rates. However, with all flexibility offered by cloud there are concerns about security, integrity and availability of precious information of cloud users. Conventional protection mechanisms need to be reconsidered for their effectiveness, since cloud service model is distinctly different from other internet based service models. Recently, much research efforts are being done in cloud security but still more efforts are desired. Since cloud security is a sensitive dimension affecting its wide commercial acceptance. This work explores various levels of security concerns in cloud environment and lists available mechanism for addressing them.

Cloud Computing Security and Privacy Preservation: Using multi-level encryption

The International Journal of Engineering & Information Technology (IJEIT), 2021

Cloud computing has grown very quickly to become a promising business idea in the IT industry due to its characteristics such as cost reduction, flexibility, convenience, and scalability. The wide spread of Cloud Computing was accompanied by research fields in many aspects such as performance, storage, retrieval speed, backup and restore, security and privacy and other aspects related to it, which are still searched for today. Security and Privacy of data in Cloud Computing is of utmost importance to all its users, regardless of the nature of the stored data. In this paper, we propose a system that is secure and computationally efficient. The system focuses on three algorithms are AES (Advanced Encryption Algorithm), Blowfish algorithm and MD5 algorithm to build our proposed system. The principle goal guiding the design of any encryption algorithm must be security against unauthorized attacks and our proposed system is more security than any algorithm else. However, for all practical applications, cost of implementation and performance are also major concerns.

A Comparative Review on Data Security Challenges in Cloud Computing

Cloud computing is a model which provides on-demand delivery of Information Technology (IT) related capabilities or resources through the Internet to the outside world. Despite the advantages of cloud computing, the security of the data and resources is still doubtful which affect the cloud adoption. The raising amount of personal and confidential data brings up attention on storing the data securely. Data can be composed of financial transactions, vital documents, and multimedia contents. Implementation of cloud computing services may minimize local storage trust in addition decrease operational and maintenance costs. However, the users still have major privacy and security concerns about their data stored on remote servers due to potential unauthorized access among the service providers. So, these concerns bring focus on security issues related to cloud computing which is the reason why most of the industries still not adopting cloud server for the storage of their critical data. Cloud computing does not provide transparency to users to view where their data is being stored and users have to trust the service provider for handling and maintaining their data. Also, it does not provide users to access the audit logs because many users are sharing the same cloud server so audit activity of one tenant might constitute a transparency for another tenant. In this paper, the extreme focus is given to the security challenges related with cloud’s service models, deployment models, and issues related to networking capabilities are discussed and studied. In addition, the existing symmetric and asymmetric encryption algorithms utilized to render security in cloud computing environment are reviewed. Furthermore, the comparative analysis of different encryption algorithms based upon few parameters is also been performed.

IJERT-A Review on Clouds Security Based Encryption and Decryption Techniques

International Journal of Engineering Research and Technology (IJERT), 2021

https://www.ijert.org/a-review-on-clouds-security-based-encryption-and-decryption-techniques https://www.ijert.org/research/a-review-on-clouds-security-based-encryption-and-decryption-techniques-IJERTV10IS020122.pdf Today, large amounts of electronic data have been created, and the work of organizations that need data recovery services can suffer from various natural or man-made disasters, which can lead to huge data losses. Encryption and spatial encryption performance and average response time have been estimated based on the size of the data file. RSA encryption is often used in cloud storage. It allows cloud services to search encrypted data directly. Cloud Server provides storage and search services. To perform efficient searches, the cloud uses verification keys to maintain privacy protection or meet authentication requirements and provide equivalent proof of encrypted documents based on tokens. Most security issues are caused by people deliberately creating malicious or malicious purposes. This Paper reviews and examines some Encryption and Decryption technologies. As a result, the better solution to the symmetric key encryption and the asymmetric key encryption is provided. I INTRODUCTION Cloud computing is a distributed community that provides calculating or storage space as services to end users. The architecture / model of cloud computing is that all servers, networks, presentations or other basics connected to the facts centre are accessible to the end users. Cloud computing is upward in attention of technology and business organizations, but this is useful for solving social problems. It can also be beneficial. Cloud computing refers to online operation, configuration and access to applications. It provides online data storage, infrastructure or submissions. Cloud computing allows individuals and businesses to shift the burden by managing large amounts of data or performance processes that require computing for powerful servers. Due to the growing approval of cloud figuring, more or more data proprietors are being encouraged to subcontract their data to cloud attendants in order to provide great convenience and reduce data management costs. Data tenants provide services to many businesses and companies, and they insist on improving data security standards by following a covered method, including following: data encryption, key organization, strong admission controls, or security intellect. The cloud attendant performs query or returns encrypted papers with an additional proof according to the token generated by Data owners. The Data users will receive the result with the corresponding proof so they can verify the correctness and decrypt scrambled leaflets after verification is accurate. Concepts Of Cloud Computing-Cloud computing is an advantage of information technology / business applications. Any organization can gain this benefit by paying or renting usage. Storage, servers and applications belong to the cloud computing area and are prerequisites for on-demand access. Therefore, unlike traditional methods of building data centers, hardware, applications and applications can be executed in a secure way before concentrating on building / transmitting business solutions. Cloud computing eliminates the need for expensive data centers and management because cloud vendors provide, manage and monitor the health and accessibility of the framework. Registering a cloud is an event on the network that allows administrators to provide versatility, quality of service (QoS) and, in most cases, to ensure custom on-demand and low-cost computing infrastructure. These infrastructures can be simple and access in a universal way. Cloud computing is a model used to authorize expedient, on-demand network admission to a public pool of configurable computing value (such as systems, servers, storage, function, or management). These resources can be managed by negligible or cloud Service-fast configuration and release The term "cloud" for vendor interaction is built from the network and its schematic representation is cloud. It refers to various specific types of services or submission that have been communicated in Internet cloud, and in many cases the devices used to get these products and applications require no special applications. Cloud Architecture-The rise of cloud computing is rapidly changing business and innovative ideas and having different effects on different individuals. For utilities and IT customers, IT management (ITaaS)-that is, computing, storage and applications is transferred from the central data centre via the Internet. For Internet and software developers, this is the stage of development of web-scale programming. Operating environment For infrastructure providers and administrators, it is a huge distributed data centre infrastructure that is connected to IP networks. Top layer (application layer): The top application that is delivered as needed according to the software as a service model (SaaS).

Data Security Issues in Cloud Computing: Review

International Journal of Software Engineering and Computer Systems

Cloud computing is an internet based model that empower on demand ease of access and pay for the usage of each access to shared pool of networks. It is yet another innovation that fulfills a client's necessity for computing resources like systems, stockpiling, servers, administrations and applications. Securing the Data is considered one of the principle significant challenges and concerns for cloud computing. This persistent problem is getting more affective due to the changes in improving cloud computing technology. From the perspective of the Clients, cloud computing is a security hazard especially when it comes to assurance affirmation issues and data security, remain the most basically which backs off for appropriation of Cloud Computing administrations. This paper audits and breaks down the essential issue of cloud computing and depicts the information security and protection of privacy issues in cloud.

Cloud Computing Security Issues and Challenges

Cloud computing is a set of IT services that are provided to a customer over a network on a leased basis and with the ability to scale up or down their service requirements. Usually cloud computing services are delivered by a third party provider who owns the infrastructure. It advantages to mention but a few include scalability, resilience, flexibility, efficiency and outsourcing non-core activities. Cloud computing offers an innovative business model for organizations to adopt IT services without upfront investment. Despite the potential gains achieved from the cloud computing, the organizations are slow in accepting it due to security issues and challenges associated with it. Security is one of the major issues which hamper the growth of cloud. The idea of handing over important data to another company is worrisome; such that the consumers need to be vigilant in understanding the risks of data breaches in this new environment. This paper introduces a detailed analysis of the cloud computing security issues and challenges focusing on the cloud computing types and the service delivery types.

Data Security Issues in Cloud Computing

Open Journal of Mobile Computing and Cloud Computing, 2014

As we are familiar that the cloud computing field is very vast and also its one of the potential field. It also has many advantages over the other storing fields. This is the only reason that the data is being migrating from the local storages to the public or the hybrid clouds. Due to some of the drawbacks the large enterprises or the critical data of the organizations are not moved to the cloud. The actual size of the cloud is much more and effective than we expect it. The data owners i.e. the cloud consumers need a high level of security regarding their data and the privacy concerns are also there. This is one of the issue that many consumers are not moving towards the cloud computing services. In this paper short but and effective analysis on the data security and privacy protection part is provided which is concerned with the data life cycle in cloud computing. The further part consists of the present work in this area. Finally the future work and the conclusion of this topic.