Navigating Privacy and Security in Cloud Computing
Abstract
Cloud computing has rapidly evolved, serving as a cornerstone for storage, information processing, and various applications. Its adoption has surged across enterprises and small businesses alike, offering them efficient means to store and process data. However, alongside its undeniable benefits, the cloud also presents inherent risks to privacy and security, as data traverses and resides on remote servers. Employing tactics such as data encryption, multifactor authentication, access control, and intrusion detection systems, cloud service providers can inspire trust in their customers, guaranteeing the security of their data and the reliability of the cloud service. Thus, it is utmost important to maintain security of data in cloud environment and to ensure privacy of the users as well. This study delves into the privacy and security challenges inherent in cloud computing and proposes viable solutions. Ensuring privacy and security in cloud computing is crucial in the current digital environment. By adopting a proactive approach and implementing robust security measures, both cloud service providers and users can mitigate risks and ensure that the cloud remains a secure and trusted platform for storing and processing data. It underscores the significance of encryption, multi-factor authentication (MFA), access controls, and intrusion detection systems (IDS) to fortify the safety of these sectors. Through the adoption of these tactics, cloud service providers can inspire trust in their customers, guaranteeing the security and reliability of the cloud service.
Keywords: Cloud computing, privacy and security, multi-factor authentication, information processing, cloud service, intrusion detection systems
INTRODUCTION
Cloud computing has revolutionized traditional methods of information processing and storage, enabling users to access and store data from any internet-connected device worldwide. The capacity of this technology to deliver high-performance computing services at reasonable prices has led to its continuing expansion. Major IT businesses like Microsoft, Amazon, Google, and Rackspace offer it. These services, including Google Apps Engine, Microsoft Azure, and Amazon Stack, cater to diverse user needs, with enterprises like ACME adopting VMware-based v-Cloud to facilitate resource sharing among multiple organizations.
Keyworde: Cloud computing, privacy and security, multi-factor authentication, information processing, cloud service, intrusion detection systems
Full Text PDF
Refrences:
- Xiao Z, Xiao Y. Security and privacy in cloud computing. IEEE Commun Surv Tutor. 2012 Jul 12; 15(2): 843–59.
- Chen D, Zhao H. Data security and privacy protection issues in cloud computing. In 2012 IEEE international conference on computer science and electronics engineering. 2012 Mar 23; 1: 647– 651.
- Sun Y, Zhang J, Xiong Y, Zhu G. Data security and privacy in cloud computing. Int J Distrib Sens Netw. 2014 Jul 16; 10(7): 190903.
- Zhou M, Zhang R, Xie W, Qian W, Zhou A. Security and privacy in cloud computing: A survey. In 2010 IEEE 6th international conference on semantics, knowledge and grids. 2010 Nov 1; 105– 112.
- Sambangi S, Gondi L, Aljawarneh S. A feature similarity machine learning model for ddos attack detection in modern network environments for industry 4.0. Comput Electr Eng. 2022 May 1; 100: 107955.
- Bansal Y, Mahajan S. Network security breaches: Comprehension and its implications. In: Kaushik K, Bhardwaj A, editors. Perspectives on Ethical Hacking and Penetration Testing. PA, USA: IGI Global; 2023. p. 239–254. DOI: 10.4018/978-1-6684-8218-6.ch010.
- Mahajan S. Phishing uniform resource locator detection using machine learning: A step towards secure system. Secur Priv. 2023 Nov; 6(6): e311.
- Kshetri N. Privacy and security issues in cloud computing: The role of institutions and institutional evolution. Telecommun Policy. 2013 May 1; 37(4–5): 372–86.
- Abdulsalam YS, Hedabou M. Decentralized data integrity scheme for preserving privacy in cloud computing. In 2021 IEEE International Conference on Security, Pattern Analysis, and Cybernetics (SPAC). 2021 Jun 18; 607–612.
- 14Bajaj P, Arora R, Khurana M, Mahajan S. Cloud security: the future of data storage. In Cyber Security and Digital Forensics: Proceedings of ICCSDF 2021. Singapore: Springer; 2022; 87–98.
- Abdulsalam YS, Hedabou M. Security and privacy in cloud computing: technical review. Future Internet. 2021 Dec 27; 14(1): 11.
- Bamasoud DM, Al-Dossary AS, Al-Harthy NM, Al-Shomrany RA, Alghamdi GS, Algahmdi RO. Privacy and security issues in cloud computing: A survey paper. In 2021 IEEE international conference on information technology (ICIT). 2021 Jul 14; 387–392.
- Sahmim S, Gharsellaoui H. Privacy and security in internet-based computing: cloud computing, internet of things, cloud of things: a review. Procedia Comput Sci. 2017 Jan 1; 112: 1516–22.
- Sharma S, Mahajan S. Design and implementation of a security scheme for detecting system vulnerabilities. Int J Comput Netw Inf Secur. 2017 Oct 1; 11(10): 24–32.