Data Security and Data Privacy in Cloud Computing

Article Preview

Abstract:

Cloud computing has led to the development of IT to more sophisticated levels by improving the capacity and flexibility of data storage and by providing a scalable computation and processing power which matches the dynamic data requirements. Cloud computing has many benefits which has led to the transfer of many enterprise applications and data to public and hybrid clouds. However, many organizations refer to the protection of privacy and the security of data as the major issues which prevent them from adopting cloud computing. The only way successful implementation of clouds can be achieved is through effective enhancement and management of data security and privacy in clouds. This research paper analyzes the privacy and protection of data in cloud computing through all data lifecycle stages providing an overall perspective of cloud computing while highlighting key security issues and concerns which should be addressed. It also discusses several current solutions and further proposes more solutions which can enhance the privacy and security of data in clouds. Finally, the research paper describes future research work on the protection of data privacy and security in clouds.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

687-692

Citation:

Online since:

April 2014

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] D. Chen and H. Zhao. Data security and privacy protection issues in cloud computing. International conference on computer science and electronics engineering. (2012).

DOI: 10.1109/iccsee.2012.193

Google Scholar

[2] S. Ramgovind, M. M Eloff and E. Smith. The management of security in cloud computing. IEEE. (2010).

Google Scholar

[3] P. Bhisikar and A. Sahu. Security in data storage and transmission in cloud computing. International journal of advanced research in computer science and software engineering 3(3). (2013).

Google Scholar

[4] D. Yuefa, W. Bo, G. Yaqiang, Z. Quan and T. Chaojing. Data security model for cloud computing. Proceedings of the 2009 international workshop on information security and application. (2009).

Google Scholar

[5] A. Mohta, R.K. Sahu and L. K Awasthi. Robust data security for cloud while using third party auditor. International journal of advanced research in computer science and software engineering, 2 (2). (2012).

Google Scholar

[6] C. Wang, Q. Wang, K. Ren and W. Lou. Privacy preserving public auditing for data storage security in cloud computing. IEEE INFOCOM. San Diego, CA. (2010).

DOI: 10.1109/infcom.2010.5462173

Google Scholar