| Peer-Reviewed

Data Security and Privacy Concerns in Cloud Computing

Received: 3 June 2014     Accepted: 28 June 2014     Published: 20 August 2014
Views:       Downloads:
Abstract

Cloud is a latest computing paradigm. Cloud computing means storing and accessing data and programs over the internet instead of computer’s hard disk. Cloud storage makes it easy to access the software, resources and data anytime anywhere when connected to the internet. Now-a-days almost every organization is using cloud to store the data. There is a need to protect that data .Cloud data security goal aims at three main things: Availability, Confidentiality, and Integrity. Cryptography is used to achieve confidentiality. Three types of algorithms are used in Cryptography (1) Symmetric-key algorithms (2) Asymmetric-key algorithms and (3) Hashing. Hashing algorithms ensure integrity of data. Cloud provides three types of services to its users: SaaS – enables users to run applications online through cloud computing techniques PaaS – enables the users to build their own cloud applications using supplier-specific tools and languages through cloud computing techniques.IaaS – enables the users to run any application on supplier’s cloud hardware. This paper discusses the types, service model, deployment methods, data security and privacy concerns in cloud.

Published in Internet of Things and Cloud Computing (Volume 2, Issue 2)
DOI 10.11648/j.iotcc.20140202.11
Page(s) 6-11
Creative Commons

This is an Open Access article, distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution and reproduction in any medium or format, provided the original work is properly cited.

Copyright

Copyright © The Author(s), 2014. Published by Science Publishing Group

Keywords

Cloud Computing, Cryptography, IaaS, PaaS , SaaS, Symmetric-Key, Asymmetric-Key, Hashing

References
[1] Private Cloud Computing Essentials- 2 X Software white papers available at: http://www.2x.com/docs/en/whitepapers/pdf/Private_Cloud_Computing_Essentials.pdf
[2] NIST Definition of Cloud Computing. Peter Mell Timothy Grance NIST Special Publication 800-145 computer security .Computer Security Division Information Technology Laboratory .National Institute of Standards and Technology Gaithersburg, MD 20899-8930 September 2011 U.S. Department of Commerce Rebecca M. Blank.
[3] Security Guidance for Critical Areas of Focus in Cloud Computing V2.1Prepared by the Cloud Security Alliance December 2009
[4] Cloud Computing basics available at: http://south.cattelecom.com/rtso/Technologies/CloudComputing/0071626948_chap01.pdf
[5] A survey of cryptographic algorithms for cloud computing Rashmi Nigori, Manoj Jhuria, Dr. Shailendra Singh. International Journal of Emerging Technologies in computational and Applied Sciences (IJETCAS). ISSn (print): 2279-0047, ISSN (online) : 2279-0055.
[6] Efficiency of Modern Encyrption Algorithm in cloud computing.Omer k jasmine, Safia Abbas, El-Sayed M.Horbaty and Abdel-Badeeh M. Salem International Journal of Emerging Trends of Technology in computer science (IJETICS) ISSN 2278-6856.
[7] Analyzing Data Security for cloud computing using cryptographic Algorithms. Gurpreet Kaur, Manish Mahajan Gurpreet kaur et al.int Journal of Engineering Research and Applications. ISSN : 2248-9622, Vol. 3, Issue 5, Sep-Oct 2013, pp.782-786
[8] Implementing Encryption Algorithms to Enhance Data Security of Cloud in Cloud Computing Manpreet Kaur, Rajbir Singh. International Journal of Computer Applications (0975 – 8887) Volume 70– No.18, May 2013
[9] Cloud Computing A collection of working papers Thomas B Winans John Seely Brown
[10] Armbrust, M., Fox, A., Griffith, R., Joseph, A., Katz, R., Konwinski, A., et al. (2009). Above the clouds: A berkeley view of cloud computing. EECS Department, University of California, Berkeley, Tech. Rep. UCB/EECS-2009-28.
[11] Boniface, M., Nasser, B., Papay, J., Phillips, S., Servin, A., Yang, X., et al. (2009). Platform-as-a-Service Architecture for Real-time Quality of Service Management in Clouds.
[12] Murphy, M., Abraham, L., Fenn, M., & Goasguen, S. (2009). Autonomic Clouds on the Grid. Journal of Grid Computing, 1-18
[13] Cryptography and Cloud Security Challenges Nitin Singh Chauhan and Ashutosh Saxena.CSI Communications
[14] Ronald L. Krutz and Russell Dean Vines, Cloud Security: A Comprehensive Guide to Secure Cloud Computing Wiley Publishing, Inc. Indianapolis, Indiana 2010.
[15] Cloud Security and privacy An Enterprise perspective on risks and compliance.O’Reilly Tim Mather, Subra Kumaraswamy, Shahed Latif
[16] Security and Privacy Issues in Cloud Computing Jaydip Sen Innovation Labs, Tata Consultancy Services Ltd., Kolkata, INDIA.
[17] Introduction to Cloud Computing.office of the privacy commissioner of Canada.Fact Sheet available at: http://www.priv.gc.ca/resource/fs-fi/02_05_d_51_cc_e.pdf .
[18] US-CERT united states computer Emergency Readiness Team The Basics of Cloud Computing Alexa Huth and James Cebula Available at: http://www.uscert.gov/sites/default/files/publications/CloudComputingHuthCebula.pdf.
[19] Cloud Computing Security Issues and Challenges Kuyoro S. O., Ibikunle F. & Awodele O. International Journal of Computer Networks (IJCN), Volume (3) : Issue (5) : 2011
[20] Privacy, Security and Trust in Cloud Computing Siani Pearson HP Laboratories HPL-2012-80R1
[21] Bisong and S M Rahman, “An overview of the security concerns in enterprise cloud computing,” CoRR, vol. abs/1101.5613, 2011.
[22] Cloud Computing Security and Privacy Issues: The Council of European Professional Informatics Societies LSI SIN (10)02 Source: Marko Hölbl Version: V17/15.032011Available at: http://www.cepis.org/media/CEPIS_Cloud_Computing_Security_v17.11.pdf
[23] Data Security In The Cloud Protecting Business-Critical Information In Public, Private and Hybrid Cloud Environments available at: http://www.vormetric.com/sites/default/files/wp-data-security-in-the-cloud.pdf
[24] Addressing Data Security Challenges In he Cloud The Need for Cloud Computing Security A Trend Micro White Paper | July 2010. available at: http://www.trendmicro.com/cloud-content/us/pdfs/business/white-papers/wp_addressing-security-challenges-in-the-cloud.pdf
[25] NIST National Institute of Standards and Technology U.S department of commerce. Guidelines on Security and Privacy in Public Cloud Computing .Draft Special Publication 800-144.Wayne Jansen Timothy Grance.available at: https://cloudsecurityalliance.org/wp-content/uploads/2011/07/NIST-Draft-SP-800-144_cloud-computing.pdf
[26] zenith international journal of multidisciplinary research vol.2 issue 4, april 2012, issn 2231 5780.Security and privacy issues of cloud computing; solutions and secure framework prof: asha mathew assistant professor (research), welingkar institute of management development and research banglore.
[27] Securing the Cloud: Addressing Cloud Computing Security Concerns with Private Cloud .Available at: http://www.rackspace.com/knowledge_center/article/securing-the-cloud-addressing-cloud-computing-security-concerns-with-private-cloud
[28] Public Cloud Security Concerns Remain after Recent Study Available at: http://www.jurinnov.com/cloud-security/
[29] S. Arnold (2009, Jul.). “Cloud computing and the issue of privacy.” KM World, pp14-22.Available at: www.kmworld.com [Aug. 19, 2009].
[30] Private clouds Krishnan Subramanian Analyst & Researcher Krishworld.com.A whitepaper sponsored by Trend Micro Inc.
[31] Review A survey on security issues in service delivery models of cloud computing. S. Subashini n, V. Kavitha. Journal of Network and Computer Applications.
Cite This Article
  • APA Style

    Masrat Yousuf Pandith. (2014). Data Security and Privacy Concerns in Cloud Computing. Internet of Things and Cloud Computing, 2(2), 6-11. https://doi.org/10.11648/j.iotcc.20140202.11

    Copy | Download

    ACS Style

    Masrat Yousuf Pandith. Data Security and Privacy Concerns in Cloud Computing. Internet Things Cloud Comput. 2014, 2(2), 6-11. doi: 10.11648/j.iotcc.20140202.11

    Copy | Download

    AMA Style

    Masrat Yousuf Pandith. Data Security and Privacy Concerns in Cloud Computing. Internet Things Cloud Comput. 2014;2(2):6-11. doi: 10.11648/j.iotcc.20140202.11

    Copy | Download

  • @article{10.11648/j.iotcc.20140202.11,
      author = {Masrat Yousuf Pandith},
      title = {Data Security and Privacy Concerns in Cloud Computing},
      journal = {Internet of Things and Cloud Computing},
      volume = {2},
      number = {2},
      pages = {6-11},
      doi = {10.11648/j.iotcc.20140202.11},
      url = {https://doi.org/10.11648/j.iotcc.20140202.11},
      eprint = {https://article.sciencepublishinggroup.com/pdf/10.11648.j.iotcc.20140202.11},
      abstract = {Cloud is a latest computing paradigm. Cloud computing means storing and accessing data and programs over the internet instead of computer’s hard disk. Cloud storage makes it easy to access the software, resources and data anytime anywhere when connected to the internet. Now-a-days almost every organization is using cloud to store the data. There is a need to protect that data .Cloud data security goal aims at three main things: Availability, Confidentiality, and Integrity. Cryptography is used to achieve confidentiality. Three types of algorithms are used in Cryptography (1) Symmetric-key algorithms (2) Asymmetric-key algorithms and (3) Hashing. Hashing algorithms ensure integrity of data. Cloud provides three types of services to its users: SaaS – enables users to run applications online through cloud computing techniques PaaS – enables the users to build their own cloud applications using supplier-specific tools and languages through cloud computing techniques.IaaS – enables the users to run any application on supplier’s cloud hardware. This paper discusses the types, service model, deployment methods, data security and privacy concerns in cloud.},
     year = {2014}
    }
    

    Copy | Download

  • TY  - JOUR
    T1  - Data Security and Privacy Concerns in Cloud Computing
    AU  - Masrat Yousuf Pandith
    Y1  - 2014/08/20
    PY  - 2014
    N1  - https://doi.org/10.11648/j.iotcc.20140202.11
    DO  - 10.11648/j.iotcc.20140202.11
    T2  - Internet of Things and Cloud Computing
    JF  - Internet of Things and Cloud Computing
    JO  - Internet of Things and Cloud Computing
    SP  - 6
    EP  - 11
    PB  - Science Publishing Group
    SN  - 2376-7731
    UR  - https://doi.org/10.11648/j.iotcc.20140202.11
    AB  - Cloud is a latest computing paradigm. Cloud computing means storing and accessing data and programs over the internet instead of computer’s hard disk. Cloud storage makes it easy to access the software, resources and data anytime anywhere when connected to the internet. Now-a-days almost every organization is using cloud to store the data. There is a need to protect that data .Cloud data security goal aims at three main things: Availability, Confidentiality, and Integrity. Cryptography is used to achieve confidentiality. Three types of algorithms are used in Cryptography (1) Symmetric-key algorithms (2) Asymmetric-key algorithms and (3) Hashing. Hashing algorithms ensure integrity of data. Cloud provides three types of services to its users: SaaS – enables users to run applications online through cloud computing techniques PaaS – enables the users to build their own cloud applications using supplier-specific tools and languages through cloud computing techniques.IaaS – enables the users to run any application on supplier’s cloud hardware. This paper discusses the types, service model, deployment methods, data security and privacy concerns in cloud.
    VL  - 2
    IS  - 2
    ER  - 

    Copy | Download

Author Information
  • I.T Skills Department, King Saud University, Riyadh, Saudi Arabia

  • Sections