You are on page 1of 7

Volume 7, Issue 10, October – 2022 International Journal of Innovative Science and Research Technology

ISSN No:-2456-2165

Risks & Solutions for Data


Security in Cloud Computing
Mandar Gangurde
MCA
School of Engineering Ajeenky
D. Y. Patil UniversityPune, Maharashtra, India

Abstract:- The safety of one's data when using cloud New York Times rented Amazon's cloud computing
computing is the topic of this research. It is an capabilities in order to convert over 11 million stories into
investigation into the data stored in the cloud as well as electronic documents for users to explore, at a total cost of
the various issues of data security that are connected to it. $ 240, which is significantly less than the cost of one of the
In this paper, we will go into the specifics of data dozens or perhaps hundreds of traditional alternatives. In
protection methods and approaches that are utilized in addition, the cloud is a highly practical, quick way for a
different parts of the world to provide the highest level of startup to save money on essentials like servers, software, and
data protection possible by minimizing potential dangers processing capacity expansion. Unfortunately, cloud
and hazards. The availability of data in the cloud is computing has not yet achieved the kind of commercial
advantageous for a wide variety of applications, but it also dominance that we had hoped for.
presents hazards because it exposes data to applications
that may already contain vulnerabilities in their security When it comes to adapting cloud storage for data,
protocols. In a similar vein, the utilization of privacy and data security are important concerns. It is
virtualization for cloud computing may put data at risk essential for the cloud service to guarantee the confidentiality
when a guest operating system is run atop a hypervisor of the data as well as its own integrity and protection. To
without first determining the dependability of the guest achieve this goal, anumber of different service providers are
operating system, which may contain a security flaw. In utilizing a variety of policies and mechanisms, each of which
addition to this, the paper will shed light on the various is determined by the nature, type, and scale of the data. One
facets of data security that pertain to data both while it is of the benefits of using cloud computing is the ability for
in transit and when it is stored. The research considers several organizations’ data to be shared with one another.
all aspects of Software as a Service (SaaS), Platform as a Nevertheless, this benefit in and of itself constitutes a threat to
Service (PaaS), and Infrastructure as a Service (IaaS) data. It is imperative that data repositories be protected in
(Infrastructure as a Service). order to ward off any potential dangers to the data. When
using the cloud to store data, one of the most important
Keywords:- Data Security, Cloud Computing, Data questions to ask is whether or not to use a cloud service
Protection, Privacy, Risks, and threats. provided by a third party or to build an internal organizational
cloud. Sometimes, the information is too sensitive to be
I. INTRODUCTION stored in a public cloud. This could be the case with data
pertaining to national security or highly confidential
There has been a recent emergence of the term "Cloud information regarding future products, for example. The
Computing," but it is still not commonly used. One of the repercussions of exposing this type of data on a public cloud
simplest definitions is "a network solution for offering cheap, can be severe because this data might be exceedingly
dependable, accessible, and simple access to IT resources." sensitive, and the cloud in question can be public. When this
The focus of cloud computing is on the underlying services, occurs, it is strongly advised that the data be stored using the
rather than the applications themselves. Cloud computing's internal cloud of the organization. Imposing an on-premises
service orientation not only lowers the total cost of ownership data usage policy, this strategy can be helpful in the process
and operational expenses but also gives users more control of keeping data secure. However, this does not guarantee
over their systems and better overall performance. Like the complete data security and privacy because many firms do
transition from traditional computing to a centralized power not have the necessary expertise to apply all of the necessary
supply method, cloud computing originates from a single layers of protection to sensitive data.
generator at a power steering plant. This means that computer
capability can be utilized as a commodity and traded like The purpose of this paper is to investigate the methods
water or energy. of data security that are currently in use all over the world to
safeguard and protect data stored in the cloud. It examines the
Internet-based distributed and virtual machine potential dangers that could befall data stored in the cloud as
technologiesinspired the concept of cloud computing, which well as the solutions that have been implemented by a variety
aims to lower the cost of computing by providing consumers of service providers in order to protect data. growth of
with low- priced computer services and storage options. The computing in the cloud.

IJISRT22OCT1040 www.ijisrt.com 1194


Volume 7, Issue 10, October – 2022 International Journal of Innovative Science and Research Technology
ISSN No:-2456-2165
II. LITERATURE REVIEW computing companies would also need to offer some sort of
cloud storage service.
Several websites have been reviewed in order to acquire
an understanding of the fundamentals of cloud computing and Multi-tenancy, enormous scalability, elasticity, pay-as-
the safe and secure storage of data on the cloud. This part you-go, and self-provisioning of resources are the primary
presents a review of the relevant literature in order to characteristics of cloud computing. There are essentially
establish a basis for examining the many facets of data three distinct types of cloud computing service models.
security. Software as a service (SaaS) allows users to gain access to
software and applications hosted by service providers over
 The authors, Srinivas, Venkata, and Moiz, offer a very the internet, while the other two categories—"infrastructure
helpful introduction to the fundamental ideas of cloud as a service" (IaaS) and "platform as a service" (PaaS)—
computing. The purpose of this article is to investigate a provide a virtualized computing environment and online
number of important ideas by examining some instances storage, hardware, servers, and networking components. One
of apps that may be created with cloud computing and the approach for deploying cloud computing is the "public
ways in which these applications can assist developing cloud," which is held by a service provider and from which
countries in gaining advantages from new forms of users can rent or purchase access to the cloud's resources or a
technology. privately held or leased cloud infrastructure

 On the other side, Chen and Zhao have talked about The third type of cloud is the "community cloud," which
the customers' worries about shifting their data to the functions similarly to a private cloud but is shared among a
cloud. According to Chen and Zhao, concerns about data smaller group of people.
security areone of the primary factors that contribute to
the reluctance ofmajor businesses to shift their data to Cloud infrastructure that combines elements of many
the cloud. The authorshave offered an excellent analysis deployment types is called a hybrid cloud.
of the data security andprivacy protection challenges
associated with cloudcomputing.

In addition to that, they have also talked about some


of thepotential remedies that are out there for these problems.

 On the other hand, Hu and A. Klein developed a standard


that secures data while it is in transit within a cloud. For
the purpose of protecting data while it is being migrated,
a standard for encryption has been under discussion.
Additional encryption is necessary for strong security, but
it requires additional computational resources to
implement. The benchmark that was presented in their
research offers a compromise that strikes a balance
between security and encryption overhead.

 Tjoa, A.M., and Huemer investigate the problem of


privacyby giving the end user more control over their data Fig 1:- NIST Cloud Definition Framework
in order to increase confidence.
IV. RISKS AND SECURITY CONCERNS IN CLOUD
A number of attacks on cloud computing are discussed COMPUTING
here, along with some potential countermeasures to
counteract theseattacks. As speaking of risks in cloud computing there are 35
risks altogether, classified by ENISA into the following four
 In light of this, Abdelkader and Etriby have proposed a groups: legal risks, policy and organizational risks,
data security model for cloud computing that is founded technological risks, and general security risks. The ENISA
on cloud architecture. In addition to this, they built prioritized these threatsby identifying the top eight. Five of
software in an effort to better enrich the Data Security these threats are specifically dedicated to keeping private
paradigm for cloud computing. information secret. Isolation failure, data loss, unsafe data
deletion, malevolent insiders, and management interface
III. CLOUD COMPUTING AND CLOUD STORAGE compromise are all potential dangers. The Cloud Security
Alliance (CSA) also catalogues thirteen distinct threats to
Cloud computing primarily offers two service models: cloud services. CSA has identified seven of these threats as
compute and storage. Virtually any service that runs in the being of the highest priority. Account service, traffic
cloud needs access to fast, reliable cloud storage to keep up hijacking, insecure application programming interfaces, data
with customer demands. Since data processing is important to loss/leakage, and malicious attacks are five of the seven
modern computer design, it stands to reason that cloud threats that all relate in some way to data confidentiality.

IJISRT22OCT1040 www.ijisrt.com 1195


Volume 7, Issue 10, October – 2022 International Journal of Innovative Science and Research Technology
ISSN No:-2456-2165
There are a number of threats and security issues with If there is even the slightest chance of a security breach
cloud computing and its data. The virtualization, public cloud in the public cloud, storage resources, which are complex
storage, and multitenancy that are relevant to cloud systemsconsisting of a combination of hardware and software
computingdata security will be the focus of this research. implementations, have the potential to expose sensitive data.

 Virtualization It is always advisable to have a private cloud for really


In virtualization, an image of a fully functional sensitive data if one can get one if at all possible. This is so
operating system is saved in another operating system so that that such hazards can be avoided.
the real operating system can use all of its resources. To run
a guest operating system as a virtual machine in a host  Data in transit:-
operatingsystem, you need something called a hypervisor.

Virtualization is one of the most important parts of cloud


computing because it helps deliver the main benefits of cloud
computing.

But virtualization in cloud computing brings some risks


to data. One risk is that a hypervisor could be hacked. If a
hypervisor is weak, it can become a main target. If a
hypervisor is broken, the whole system can be broken, which
means that the data can also be broken.

Another risk of virtualization is the way resources are


given out and taken back. If VM operation data is written to
memoryand isn't cleared before the memory is given to the
next VM, the next VM could see the data, which might not be Fig 2:- Data in Rest
what you want.
 Multienancy
Better planning for the use of virtualization is one way One of the most significant threats to data in cloud
to solvethe problems above. Before freeing up resources, they computing is shared access, often known as multitenancy.
should be used carefully, and data should be checked to make When numerous users share the same CPU, storage, memory,
sure it is correct. different service models with varying etc., it poses a risk not just to one but to all of them.
requirements for protecting sensitive information.
A leak of sensitive information could occur in such a
Data at Rest, or information already in the cloud, Data situation. It's important to be cautious with multitenancy
in Transit, or Data in Use, or information leaving the cloud, attacks because a single vulnerability can give an attacker
all pose risks to cloud security. The nature of data procedures, access to all of the data in the system.
protection measures, and processes determines the data's
confidentiality and integrity. This is in three different forms. Carefully authenticating people before to granting them
access to the data can prevent these kinds of problems.
 Data at Rest:-
The term "data at rest" refers to information that is stored In order to prevent multitenancy problems in cloud
in thecloud or any other data that may be accessed via the use computing,a number of authentication methods are in use.
of the internet. This covers both active data and data that has
been backed up. Because they do not have physical control V. DATA SECURITY IN CLOUD COMPUTING
over the data, businesses that do not keep their data in a
private cloud can find it exceedingly difficult, as was said A side from encryption, data connection is also crucial
previously, to protect data while it is at rest if they do not have for cloud computing security. SaaS, PaaS, and IaaS are all
a private cloud. On the other hand, this problem can be The term "data in transit" is commonly used to describe
overcome by preserving a private cloud that has access that is information that is being uploaded or downloaded from a
strictly regulated. cloud storage service. One can request and use this
information fromanother place, as it can be saved in a file or
 Storage in Public Cloud database in the cloud. Data in transit refers to information that
Another potential security risk associated with cloud has not yet been fully stored in a cloud environment.
computing is the storing of data in a public cloud. Cloud Passwords and other login information are examples of very
computing typically makes use of centralised storage sensitive data that may require encryption while in transit.
facilities, which might make them an attractive target for Unencrypted data is still data in transit, nevertheless.
cybercriminals.

IJISRT22OCT1040 www.ijisrt.com 1196


Volume 7, Issue 10, October – 2022 International Journal of Innovative Science and Research Technology
ISSN No:-2456-2165
 Data in Use:- VI. MAJOR SECURITY CHALLENGES

Because there are many computers and clients involved,


it is not easy to secure and make sure the safety of computers
that are linked. This is called "multi-tenancy." The cloud
service providers and cloud computing have to deal with a lot
of problems, especially when it comes to security. So, it's very
important to think about how these challenges are simulated
and how security models are put into place to keep clients safe
and make cloud computing a safe place to work. The major
challenges involved are :

 Lack of appropriate governance:-


The cloud service provider continues to have full reign
Fig 3:- Data in Transit
over the operation. When this authority is delegated to the
provider, theclient runs the risk of compromising data access
into the programme. As a result, consumers are put in a
and resource utilisation due to a lack of oversight over the
position where they must contemplate the security of their
authorization parameters. In the absence of a Service Level
data and applications regardless of who hosts, provides, or
Agreement between you and your service provider, this
mediatesthem.
security risk posesthe extra risk of leaving you vulnerable.
Also, the user is given considerable leeway in how they put
 Lock-in:-
the terms of service to use, making it easier for data to be
Another problem is that there aren't enough data format
misused. You "accept that Google has no duty or liability for
standards, there aren't enough operating methods, and there
deletion or failure to preserve any material and other
aren't enough tools. This makes it hard to move data between
communication maintained or sent through use of the
services and applications, even between service providers.
service," according to Google's terms of service. Further,
Amazon makes it quite clear that they take noaccountability
So, the customer has to depend on the vendor
for any harm caused by unauthorised access, usage,
completely and totally.
corruption, deletion of data, or other forms of intrusion
problematic quality. It might be disastrous for companies not
 Isolation failure:-
tohave adequate space for separate storage. Other concerns
The sharing of resources that arises as a result of the
surrounding guest hopping attacks and the problems they
multi- tenancy feature of cloud computing is in and of itself
causeare believed to be a significant obstacle in the utilisation
a Data that is normally being used for processing, such as
of cloud computing applications and their implementation.
creation, change, or deletion. Due to the large number of users
in the Cloud environment, the chances of mistreatment go up
 Malicious attacks from management internally:-
when processing takes place there.
There is a possibility that consumers' privacy and
security could be compromised due to the architecture of
cloud computing systems in some cases. This danger presents
a significant challenge, despite the fact that it only
occasionally materialises. For instance, the administrators
and managers of cloud service providers can occasionally
pose a security risk to their customers by behaving in a
malevolent manner and posing a threat to the clients that use
cloud computing services.

 Insecure or incomplete data deletion:-


When a client asks for some or all of their data to be
deleted, it brings up the question of whether or not it will be
possible to delete the right part of their data segment. This
makes it harder for clients to sign up for cloud-computing
services.

 Data interception:-
Fig 4 :- Data in Use
In cloud computing, data is separated and dispersed
while in transit, in contrast to traditional computing. This
increases risksdue to the insecurity and frailty of computer
technology, especially with regards to sniffing and spoofing,
third-party attacks, and reply assaults.

IJISRT22OCT1040 www.ijisrt.com 1197


Volume 7, Issue 10, October – 2022 International Journal of Innovative Science and Research Technology
ISSN No:-2456-2165
 Compromise of management interface:- generates theuser's public key, private key, and user ID when
Since cloud services are provided remotely over the the user requests cloud storage. To send data to the cloud,
Internet and the provider has access to the resources, there is users must first encrypt their data using a private key and
a risk of harmful actions being carried out. As a result, risks, append a message header. The SID is looked for in the
service manipulation, and service provider involvement are message header when a user makes a request to a cloud
allmagnified. server. If the SID is located, the request is dealt with.

For instance, in some cloud computing use cases, the Secure Sockets Layer (SSL) 128-bit encryption, which
client may assume ownership of the computers, while in maybe upgraded to 256 bits, is introduced to guarantee the
others, the service provider may assume control by instituting availability, integrity, and secrecy of cloud data. Access to
strict accesspolicies. encrypted cloud data requires a user ID and password. The
userinputs data into the cloud, and the cloud service provider
Information leakage during data uploading to the cloud, encrypts it with the RSA algorithm before storing it. The
attacks on privacy and security of user's data, lost or cloudservice provider authenticates the user's identity before
maliciously manipulated encryption keys, and disagreements handing over encrypted data that can be unlocked with a
between service providers and customers on procedure and personal key.
policies pertaining to the operation of cloud computing
applications all pose additional security challenges. The three layers of this data security approach all
contribute to keeping cloud information safe. Data is
There are also complications that don't directly threaten authenticated in the first layer, encrypted in the second, and
the security of cloud applications but do interact with or decrypted in the third. If your data is stored in the cloud, RC5
influence cloud computing. Changes in network traffic, will keep it safe. Theft of encrypted data is catastrophic since
network outages, and managerial complications including no recovery key exists.
inefficient resource utilisation, traffic buildup, and lost
connections all fall under this category. Social engineering With the help of role-based access control (RBAC)
assaults, natural disasters, andtheft of equipment are just a few cloud architecture and the Role-Based Encryption (RBE)
examples of the additional threats that might impact cloud method, businesses can confidently store data in the public
computing deployments. cloud while keeping sensitive information about their internal
structures in a private cloud.
VII. PROPOSED SOLUTIONS/APPROACHES TO
ENSURE THE DATA SECURITY IN CLOUD Data owner, data consumer, cloud server, and N
attribute authorities are the four defined authorities in. In
 Encryption:- order to send encrypted data to a cloud server, the data's
The most popular method for protecting information in owner must first geta public key from the relevant authorities.
the cloud was encryption (used by 45%). To protect cloud After receiving a request for information, authorities generate
information, it is suggested using digital signatures based on a private key and provide it to the end user. Only once the
the RSA method. Which programme minimises filesize by user has been authenticated by the cloud service will he be
using a hashing algorithm? The digital signature is generated able to download the file. There are two distinct approaches
by encrypting the message digest using the individual's to safe cloud computing, one of which necessitates a reliable
privatekey in software. A digital signature is converted into a third party andthe other of which does not. Data stored in the
messagedigest by software using the recipient's private key cloud is protected using Elliptic Curve DiffieHellman
and the sender's public key. (ECDH) and symmetric bivariate polynomial-based secret
sharing.
Use both the SDES and DES cypher methods for a more
secure and robust game (DES). In this method, a 64-bit block In, an encryption method dependent on a user's physical
of plain text is split in half using a "black box;" the right half location was unveiled. Data was encrypted using a geo
contains two bits, while the left half contains six bits. These encryption method and labelled with the firm or employee's
sixbits are then fed into a "superior function" block, where name in the cloud and on the user's machine. Data is retrieved
they are split once again; the first two bits represent the rows, using a cloud-based search for a matching label whenever it
whilethe last four bits represent the columns. Then, the output is required. Information kept in the cloud can be encrypted
from the vigenere block is multiplied by this function, which and signed digitally, as well as using the Diffie-Hellman key
is applied to all eight octets. The output of the black box is 64 exchange and the Advanced Encryption Standard. The
bits, which are subsequently subdivided into 4 new octaves. authentication, data security, and verification needs are met
The left half is derived by XOR-ending the right and left bythis approach.
halves. At least thrice
 Guidelines:-
The data is encrypted using RSA, and the keys are According to the findings of research, 21% of studies
securely exchanged using Bilinear Diffie-Hellman. The use guidelines to guarantee the security of data stored in the
suggested solution adds a message header to each data packet cloud. By introducing a new cloud system architecture
so that clients can securely communicate with the cloud approach that has three features—separation of software
directly, without going through a proxy server. The server service providers and infrastructure service providers, hiding

IJISRT22OCT1040 www.ijisrt.com 1198


Volume 7, Issue 10, October – 2022 International Journal of Innovative Science and Research Technology
ISSN No:-2456-2165
information about the owner of the data, and data anda data marking component, all of which would help keep
obfuscation—guidelines are provided for data security in the cloud data safe. The evaluation of this part shows that
cloud in. In order to guarantee data security in cloud legitimate users' data is successfully hidden and that they are
architecture, agents method is introduced. Data security was safe from possible attacks.
implemented using three agents:a file agent, an authentication
agent, and a key managing agent. A repository that protects privacy was shown in. This
repository was mostly focused on harmonising operations to
Guidelines for six key data technologies are provided in, keep data private while keeping harmonising relationships in
including those for protecting data privacy, proving the the cloud. With this plan, the owner of the data will be able
existence of data and making it usable, trusted access control, to give most tasks that require a lot of computing power to
retrieving and processing cypher text, controlling access to cloud servers without revealing what the data is. To deal with
cloud resources, and trusted cloud computing. In this book, data security in cloud computing, they came up with a good
guidelines are given along with a meta-analysis of four and flexible distribution verification protocol. This protocol
different encryption algorithms that can be used to help checks the integrity of erasure-coded data instead of
choosethe best algorithm for a given situation. pseudorandom data by using token precomputation with a
sobol sequence. The proposed model has three parts: the
 Framework:- distribution of files, the pre-computing of tokens, and the
14% of the results come from the framework approach. challenge response protocol.
In Trust Cloud, a framework is given that uses a data-centric
and detective approach to make data more secure. The goal is VIII. CONCLUSIONS AND FUTURE DIRECTIONS
to encourage the use of file-centric and data-centric logging
mechanisms to make data in cloud computing more secure Cloud computing is cost-effective, quick to deploy, and
and private. In, a framework is made by building a system accessible. Many practical problems remain, though. One is
with multiple users. The layers of a developed solution are data privacy. Many researchers contributed to this work to
the presentation layer, the business logic layer, and the data reduce data security issues in this domain. This paper presents
accesslayer. The data of users is very safe because of these a literature review on cloud computing data security. Future
layers. plans include exploring other cloud computing security issues
and designing a data-concealment encryption model.
In, a framework is given that includes a protocol called
Sec Cloud. Sec Cloud is a first protocol that covers secure ACKNOWLEDGEMENT
storage and secure computation in a cloud environment
through designated verifier signature, batch authentication, I would like to express my very great appreciation to
and probabilistic sampling procedures. In the proposed Prof Akanksha Kulkarni of ADYPU for her valuable and
framework, there are three steps. In the first step, data and constructive suggestions during the planning and
metadata are indexed to protect against cloud service development of this research work.
providers that aren't completely honest. In the second step,
encrypted data is given a multi-user, private, keyword- REFERENCES
searchable encryption to hide searches and the files that come
from them from the cloud service provider. The last step is to [1]. J. Srinivas, K. Reddy, and A. Qyser, “Cloud Computing
use a policy to allow users to share data by using metadata and Basics,” Build. Infrastruct. Cloud Secur., vol. 1, no.
an encryption scheme. September 2011, pp. 3–22, 2014.
[2]. M. A. Vouk, “Cloud computing - Issues, research and
 Homomorphic Token:- implementations,” Proc. Int. Conf. Inf. Technol.
7% of the results come from the homomorphic token Interfaces, ITI,pp. 31–40, 2008.
scheme. In, homomorphic token scheme is used to protect the [3]. P. S. Wooley, “Identifying Cloud Computing Security
security of the data. The proposed plan uses a homomorphic Risks,” Contin. Educ., vol. 1277, no. February, 2011.
token and checks erasure-coded data in different places. It lets [4]. A. Alharthi, F. Yahya, R. J. Walters, and G. B. Wills,
you delete, update, and add data to a data block in a safe and “An Overview of Cloud Services Adoption Challenges
efficient way. By using a homomorphic token scheme with a in Higher Education Institutions,” 2015.
token pre- computation algorithm, a model from achieves [5]. S. Subashini and V. Kavitha, “A survey on security
both storage correctness insurance and the identification of a issues in service delivery models of cloud computing,”
server that is acting up (s). J. Netw. Comput. Appl., vol. 34, no. 1, pp. 1–11, Jan.
2011.
 Stripping algorithm, data concealment component, [6]. F. Zhang and H. Chen, “Security-Preserving Live
harmonizing and token scheme:- Migration of Virtual Machines in the Cloud,” J. Netw.
The stripping algorithm, data concealment, and Syst. Manag., pp. 562–587, 2012.
harmonising and token scheme each contribute 3%. Stripping [7]. J. Hu and A. Klein, “A benchmark of transparent data
protects cloud photo data.The method has three parts: image encryption for migration of web applications in the
analysis, data separation, and data distribution. Proposed a cloud,” 8th IEEE Int. Symp. Dependable, Auton. Secur.
design for a data concealment component with three Comput. DASC 2009, pp. 735–740, 2009.
subcomponents: a prediction component, a data generator,

IJISRT22OCT1040 www.ijisrt.com 1199


Volume 7, Issue 10, October – 2022 International Journal of Innovative Science and Research Technology
ISSN No:-2456-2165
[8]. D. Descher, M., Masser, P., Feilhauer, T., Tjoa, A.M. [22]. Leistikow, R., & Tavangarian, D. (2013, 25-28 March
and Huemer, “Retaining data control to the client in 2013). Secure Picture Data Partitioning for Cloud
infrastructure clouds,” Int. Conf. Availability, Reliab. Computing Services. Paper presented at the Advanced
Secur. (pp. 9-16). IEEE., pp. pp. 9–16, 2009. Information Networking and Applications Workshops
[9]. E. Mohamed, “Enhanced data security model for cloud (WAINA), 2013 27th International Conference on.
computing,” Informatics Syst. (INFOS), 2012 8th Int. [23]. Delettre, C., Boudaoud, K., & Riveill, M. (2011, June 28
Conf., pp. 12–17, 2012. 2011- July 1 2011). Cloud computing, security and data
[10]. Ajoudanian, Sh., and M. R. Ahmadi. “A Novel Data concealment. Paper presented at the Computers and
Security Model for Cloud Computing.” International Communications (ISCC), 2011 IEEE Symposium on.
Journal of Engineering and Technology, vol. 4, no. 3, [51] Mishra, R., Dash, S. K., Mishra, D. P., & Tripathy,
IACSIT Press, 2012, pp. 326–29. . A. (2011, 8- 10 April 2011). A privacy preserving
[11]. Kodada, Basappa B., and Demian Antony D’Mello. repository for securing data across the cloud. Paper
“Data Security Challenges in Cloud Computing.” presented at the Electronics Computer Technology
Academia Letters, Academia.edu, July 2021 (ICECT), 2011 3rd International Conference on.
[12]. Fakhruddin Noori , Abdul Ghafar “Omerkhel”, 2021, A [24]. Syam Kumar, P., Subramanian, R., & Thamizh Selvam,
Review on Data Security in Cloud Computing, D. (2010, 28-30 Oct. 2010). Ensuring data storage
INTERNATIONAL JOURNAL OF ENGINEERING security in cloud computing using Sobol Sequence.
RESEARCH & TECHNOLOGY (IJERT) Volume 10, Paper presented at the Parallel Distributed and Grid
Issue 03 (March 2021), Computing (PDGC), 2010 1st International Conference
[13]. Data Security in Cloud Computing by Ahmed on.
Albugmi Madini O. Alassafi Robert Walters, Gary Wills [25]. Anane, R., Dhillon, S., & Bordbar, B. (2008). Stateless
[14]. Rachna, A., and Anshu, P.(Jul-Aug 2013). Secure User data concealment for distributed systems. Journal of
Data in Cloud Computing Using Encryption Algorithms Computerand System Sciences, 74(2), 243-254.
in International Journal of Engineering Research and [26]. An Efficient Approach on Data Security with Cloud
Applications (IJERA), 3(4),1922- 1926. Computing Environment: A Comprehensive Research
[15]. Rachna, A., and Anshu, P.(Jul-Aug 2013). Secure User Mrs.Anjali Sharma1 , Dr. Garima Sinha Turkish Journal
Datain Cloud Computing Using Encryption Algorithms of Computer and Mathematics Education Vol.12 No.14
in International Journal of Engineering Research and (2021), 1372 – 1382
Applications (IJERA), 3(4),1922- 1926. [27]. International Journal of Advanced Research in
[16]. [15] Ko, R. K. L., Kirchberg, M., & Bu Sung, L. (2011, Computer and Communication Engineering Vol. 10,
3-5 Aug. 2011). From system-centric to data-centric Issue 7, July 2021 security in cloud computing Mitisha
logging Accountability, trust & security in cloud b Barot1, Prof.Riddhi Patel
computing. Paper presented at the Defense Science [28]. International Journal of Engineering Research &
Research Conference andExpo (DSR), 2011. Technology (IJERT) ISSN: 2278-0181 Protection and
[17]. [16] Gawali, M. B., & Wagh, R. B. (2012, 6-8 Dec. Security of Data in Cloud Computing 1. E. Poonguzhali
2012). Enhancement for data security in cloud 2. Suhas Rao M V 3. Shanth GK 4. Mujasem Khanum
computing environment. Paper presented at the
Engineering (NUiCONE), 2012 Nirma University
International Conference on.
[18]. Wei, L., Zhu, H., Cao, Z., Dong, X., Jia, W., Chen, Y.,
et al. (2014). Security and privacy for storage and
computation in cloud computing. Information Sciences,
258(0), 371-386.
[19]. Rashid, F., Miri, A., & Woungang, I. (2013, June 28
2013-July 3 2013). Secure Enterprise Data
Deduplication inthe Cloud. Paper presented at the Cloud
Computing (CLOUD), 2013 IEEE Sixth International
Conference on.
[20]. [19] Cong, W., Qian, W., Kui, R., & Wenjing, L. (2009,
13-15 July 2009). Ensuring data storage security in
Cloud Computing. Paper presented at the Quality of
Service, 2009. IWQoS. 17th International Workshop on.
[21]. Tribhuwan, M. R., Bhuyar, V. A., & Pirzade, S. (2010,
16-17 Oct. 2010). Ensuring Data Storage Security in
Cloud Computing through Two-Way Handshake Based
on Token Management. Paper presented at the
Advances in Recent Technologies in Communication
and Computing (ARTCom), 2010 International
Conference on.

IJISRT22OCT1040 www.ijisrt.com 1200

You might also like