CLOUD COMPUTING DATA SECURITY CHALLENGES AND ALGORITHMS TO PROTECT SECURITY ISSUES

Dr. A. Kalaivani Assistant Professor, Department of Computer Applications, Nehru Arts and Science College, Coimbatore.

Abstract

Cloud computing is a rapidly increasing technology that enables more efficient use of information technology infrastructure, services, and applications. It is an architecture for delivering computer services through the internet to a set of shared resources such as networks, storage, services, and applications. These clouds enable corporations, public and private organizations to optimize their capacities without incurring additional setup, staffing, or license expenditures. Due to the effectiveness of this system, which is based on a pay-per-use paradigm, numerous businesses such as banking, health care, geosciences, and education are embracing it. This article provides an overview of cloud computing and discusses its characteristics, services, and deployment approach. This article discusses the many advantages of cloud computing, as well as the associated problems and applications along with data security challenges and innovative Algorithms for security protections.

Keywords:

:

: Security Issues, Challenges, Cloud Data, Data Transmission, Securitycompliance.

Full Text:

PDF


References


References: 1. Lim,S.Y.;Kiah,M.M.;Ang,T.F.SecurityIssuesandFutureChallengesofCloudServiceAuthentication.Polytech.Hung.2017, 14, 69–89. 2. Borylo, P.;Tornatore, M.;Jaglarz, P.;Shahriar, N.;Cholda, P.;Boutaba, R. Latency and energy-awareprovisioningofnetworkslicesincloudnetworks.Comput.Commun. 2020,157,1–19. 3. Carmo, M.; Dantas Silva, F.S.; Neto, A.V.; Corujo, D.; Aguiar, R. Network-Cloud Slicing Definitions for Wi-Fi Sharing Systems to Enhance 5G Ultra-Dense Network Capabilities.Wirel. Commun. Mob. Comput.2019, 2019,1–17. 4. Dang, L.M.; Piran, M.; Han, D.; Min, K.; Moon, H. A Survey on Internet of Things and Cloud Computing forhealthcare.Electronics2019,8,768. 5. Srinivasamurthy, S.; Liu, D. Survey on Cloud Computing Security. 2020. Available online: https://www.semanticscholar.org/(accessedon19July2020). 6. Mathkunti,N.CloudComputing:SecurityIssues.Int.J.Comput.Commun.Eng.2014,3,259–263 7. Stefan, H.;Liakat, M. Cloud Computing Security Threats And Solutions.J. Cloud Comput.2015, 4, 1.[CrossRef] 8. Fauzi,C.;Azila,A.;Noraziah,A.;Tutut,H.;Noriyani,Z.OnCloudComputingSecurityIssues.Intell. Inf.DatabaseSyst. Lect.NotesComput.Sci. 2012,7197,560–569. 9. Palumbo,F.;Aceto,G.;Botta,A.;Ciuonzo,D.;Persico,V.;Pescapé,A.CharacterizingCloud-to-userLatencyas perceived by AWS and Azure Users spread over the Globe.In Proceedings of the 2019 IEEE GlobalCommunicationsConference (GLOBECOM), Taipei,Taiwan, 7–11 December2019; pp.1–6. 10. Hussein,N.H.;Khalid,A.AsurveyofCloudComputingSecuritychallengesandsolutions.Int.J.Comput.Sci.Inf.Secur.2017,1,52–56. 11. LeDuc,T.;Leiva,R.G.;Casari,P.;Östberg,P.O.MachineLearningMethodsforReliableResourceProvisioninginEdge-CloudComputing:ASurvey.ACMComput.Surv.2019,52,1–39. 12. Li,K.;Gibson,C.;Ho,D.;Zhou,Q.;Kim,J.;Buhisi,O.;Gerber,M.Assessmentofmachinelearningalgorithmsincloudcomputingframeworks.InProceedingsoftheIEEESystemsandInformationEngineeringDesignSymposium,Charlottesville,VA,USA,26April2013;pp.98–103. 13. Callara, M.;Wira, P. User Behavior Analysis with Machine Learning Techniques in Cloud ComputingArchitectures.In Proceedings of the 2018 International Conference on Applied Smart Systems, Médéa,Algeria,24–25November2018;pp.1–6. 14. Singh,S.;Jeong,Y.-Security:Issues,Threats,andSolutions.J.Netw.Comput.Appl.2016,75,200–222. 15. Khan, A.N.; Fan, M.Y.; Malik, A.; Memon, R.A. Learning from Privacy Preserved Encrypted Data on CloudThroughSupervisedandUnsupervisedMachineLearning.InProceedingsoftheInternationalConferenceonComputing,MathematicsandEngineeringTechnologies,Sindh,Pakistan,29–30January2019;pp.1–5. 16. Khilar,P.;Vijay, C.;Rakesh, S. Trust-Based Access Control in Cloud Computing Using Machine Learning.In Cloud Computing for Geospatial Big Data Analytics; Das, H., Barik, R., Dubey, H., Roy, D., Eds.; Springer:Cham,Switzerland,2019;Volume49,pp.55–79. 17. Subashini,S.;Kavitha,V. A Survey on SecurityIssuesinService Delivery Models of Cloud Computing.J.Netw.Comput.Appl.2011,35,1–11. 18. Bhamare, D.; Salman, T.; Samaka, M.; Erbad, A.; Jain, R. Feasibility of Supervised Machine Learning for Cloud Security. In Proceedings of the International Conference on Information Science and Security, Jaipur, India, 16–20 December 2016; pp. 1–5. 19. Li, C.; Song, M.; Zhang, M.; Luo, Y. Effective replica management for improving reliability and availabilityinedge-cloudcomputingenvironment.J.ParallelDistrib.Comput.2020,143,107–128. 20. Purniemaa, P.; Kannan, R.; Jaisankar, N. Security Threat and Attack in Cloud Infrastructure: A Survey.Int. J.Comput.Sci.Appl.2013,2,1–12. 21. Yuhong, L.; Yan, S.; Jungwoo, R.; Syed, R.; Athanasios, V. A Survey of Security and Privacy Challenge inCloudComputing:SolutionsandFuture Directions.J.Comput.Sci.Eng.2015,9,119–133. 22. Chirag, M.; Dhiren, P.; Bhavesh, B.; Avi, P.; Muttukrishnan, R. A survey on security issues and solutions at differentlayers ofCloudcomputing.J.Supercomput.2013,63,561–592. 23. Behl,A.;Behl,K.Ananalysisofcloudcomputingsecurityissues.InProceedingoftheWorldCongresson Information and Communication Technologies,Trivandrum, India, 30 October–2 November 2012;pp.109–114. 24. Selamat,N.;Ali,F.Comparisonofmalwaredetectiontechniquesusingmachinelearningalgorithm.Indones.J.Electr.Eng.Comput.Sci.2019,16,435.] 25. Shamshirband, S.; Fathi, M.; Chronopoulos, A.T.; Montieri, A.; Palumbo, F.; Pescapè, A. ComputationalIntelligence Intrusion Detection Techniques in Mobile Cloud Computing Environments: Review, Taxonomy,andOpenResearchIssues.J.Inf.Secur.Appl.2019,1–52.

Refbacks

  • There are currently no refbacks.