0% found this document useful (0 votes)
41 views16 pages

Impactof Data Securityand Privacyin Cloud Computing

Uploaded by

Wakanda Citizen
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
41 views16 pages

Impactof Data Securityand Privacyin Cloud Computing

Uploaded by

Wakanda Citizen
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 16

See discussions, stats, and author profiles for this publication at: https://www.researchgate.

net/publication/385587618

Impact of Data Security and Privacy in Cloud Computing

Conference Paper · November 2024

CITATIONS READS
0 59

1 author:

Shubham Sharma
Shoolini University
1 PUBLICATION 0 CITATIONS

SEE PROFILE

All content following this page was uploaded by Shubham Sharma on 06 November 2024.

The user has requested enhancement of the downloaded file.


Impact of Data Security and Privacy in Cloud Computing

Shubham Sharma1[0009-0000-8556-1912], Tushar Gupta2[0009-0005-6264-6653] &


Brij Bhushan Sharma*3[0000-0002-8930-8102]
1
Research Scholar MCA, Yogananda School of AI Computers and Data Sciences, Shoolini
University of Biotechnology and Management Sciences, Bhajol, Solan, Himachal Pradesh,
India. 173229.
2
Research Scholar MCA, Yogananda School of AI Computers and Data Sciences, Shoolini
University of Biotechnology and Management Sciences, Bhajol, Solan, Himachal Pradesh,
India. 173229.
3
Assistant Professor, Yogananda School of AI Computers and Data Sciences, Shoolini
University of Biotechnology and Management Sciences, Bhajol, Solan, Himachal Pradesh,
India. 173229.
[email protected]

Abstract. Cloud computing has significant advantages in terms of scalability,


cost-effectiveness, and accessibility, transforming several industries such as
education, healthcare, banking, and agriculture. Nevertheless, the inherent
hazards linked to data security and privacy in cloud systems present notable
obstacles. This paper focuses on a variety of security concerns, including
distributed denial of service (DDoS) attacks, insider threats, malware, data
breaches, phishing, and unsafe API calls. It emphasizes the significance of
taking proactive steps to reduce these risks. Examinations of instances where
data breaches have occurred highlight the tangible outcomes of insufficient
security measures, emphasizing the necessity for strong security policies.
In addition, the article explores several security solutions such as encryption,
periodic password changes, data backups, and monitoring tools like AWS
CloudWatch/CloudTrail to strengthen data security in cloud environments. This
document outlines the mutual obligations of cloud service providers and
consumers in relation to Infrastructure as a Service (IaaS), Platform as a Service
(PaaS), and Software as a Service (SaaS) models. It specifically addresses
concerns regarding unauthorized access, data loss, corruption, and compliance
matters.
Furthermore, the study examines problems regarding the privacy of data,
including techniques such as data masking, encryption, segregation, portability,
and interoperability. It emphasizes the importance of staff training and
awareness programs in promoting a culture of data protection. To summarize,
although cloud computing presents exceptional prospects for innovation and
productivity, it is crucial to prioritize the resolution of data security and privacy
issues to establish trust and fully exploit the capabilities of cloud technology.

Keywords: Cloud Computing; Clouds; Distributed Computer Systems, Data


Storage, Data Security.
1 Introduction
Cloud Computing is defined as a platform that provides with online resources and
stores your data. It is defined as renting computer resources, storage, and applications
from the provider [1]. Cloud computing allows customers to rent or access fully
featured applications, deployment models, assets, and infrastructures such as
network-accessible data storage and processing.

Fig. 1. Various categories required for the designing of cloud storage.


This image shows the categories to consider when creating a cloud storage or data
processing security system. These include Resource Pooling, On-Demand
Self-Service, Broad Network Access, and others. Each area is essential to cloud
infrastructure's efficiency, scalability, and security. Resource Pooling lets numerous
consumers share a pool of dynamically assigned and reassigned resources at demand.
On-Demand Self-Service lets users provision computing resources without service
provider interaction. Broad Network Access (BNA) makes sure that resources can be
reached over the network and can be used by a variety of light or heavy client systems
through standard access methods. Cloud computing is complicated and involves
service providers, customers, and consumers. Because these systems are shared, they
risk data breaches, unwanted access, and legal violations. Traditional security
methods generally fail to address these issues; thus, we need cloud-specific solutions.
[2]
Cloud Computing provides vast resources over the internet, Resource Pooling,
on-demand self-service, Broad Network Access and many more. The necessity to
solve cloud computing data security and privacy concerns inspired this development.
As enterprises increasingly rely on cloud services to manage sensitive information,
the potential consequence of security breaches grows more serious, ranging from
3

financial losses to reputational harm. [7] Cloud computing has many benefits
including scalability, cost-efficiency, reliability, accessibility, security, storage &
backup, innovation & agility, automatic updates, and maintenance [2]. Due to its large
demand and scalability, the cloud can be used in different sectors or fields
[3][4][5][6][7]. Cloud-based LMS helps a lot for teachers, students, and mentors to
share and access course materials easily from anywhere. Similarly, in healthcare,
cloud computing provides a platform to easily store the patient’s data, manage records
and diagnose easily with modern machinery and techniques. Similarly, in terms of
large data in Banks, cloud can provide security to the customer’s data [8][9][10]. It
also offers many services such as fault tolerance, data surveillance etc. With emerging
paradigm, cloud computing has several applications in terms of agriculture such as
precision agriculture, crop management, supply chain management, Data Analytics
etc. Fig.1 illustrates the categories that need to be considered during designing a
security system for cloud storage or data processing in cloud computing [11].
Despite of all these benefits, cloud computing is risky as storing data online, on
any platform is quite inconsistent. When storing data online, there’s a risk of data
leakage. Cloud can easily modify our data sometimes [12]. This might happen due to
some crashes, unwanted configurations, or due to the operator’s error. Sometimes, the
worst can happen is that there might be some malicious breach i.e., some insider may
be leaking your data to others without your permission. Sometimes, the cloud can
accidentally expose private information, change the data without permission or give
different users different versions of the same data. Additionally, deliberate attacks by
hackers or even employees working for the cloud service could be even more harmful
and difficult to notice. These attackers might get into the cloud provider's system from
the outside, or they might already work for the company and misuse their access [13].
These mis-happenings are not merely new. In June 2023, Toyota, a renowned
carmaker, experienced a criminal breach in which some 260,000 customers' data was
inadvertently made accessible online owing to a misconfigured cloud infrastructure.
Although the breach did not result in the exposure of significant quantities of sensitive
data, it underscores the fact that a mere misconfiguration can provide hackers with an
opportunity to gain unauthorized access. Another occurrence took place. Sina Weibo
is a prominent social media site in China. In June 2020, the private information of
over 538 million individuals, such as their actual identities, usernames, gender,
location, and phone numbers for 172 million users, was publicly disclosed on the dark
web and other platforms. Although the exact cause of the event remains uncertain, the
hacker offered to sell Weibo's data for a meagre $250, presumably since it did not
contain any passwords.

Types of Cloud Deployment Models:


Cloud services are delivered to the customer based on location and
ownership of the cloud infrastructure. Cloud Models determine who is responsible for
managing and securing the cloud environment. There are mainly four cloud
deployment models discussed as:[14]
1. Public Cloud: It is a deployment model where resources are shared among
multiple users and organizations. Security of the infrastructure is managed by the
cloud provider. Public cloud is less costly thus making it more cost effective.
Furthermore, public cloud is highly scalable and provides multitenancy. It is basically
used for development and testing environments & web applications.
2. Private Cloud: Private clouds are dedicated to a single organization and can
be located on on-premises, offering the highest degree of control and security over the
infrastructure. This makes them more costly and expensive to manage. VPC is one of
the best examples of private cloud.
3. Hybrid Cloud: Hybrid Cloud is the combination of two or more cloud
deployment models, such as public and private cloud. They offer a high degree of
flexibility and scalability, but they can be more complex to manage and require
careful integration among different cloud environments. It is a good option if the
application needs a balance of security, control, flexibility, and cost-efficiency.
4. Community Cloud: It is a multi-tenant environment that is shared by a group
of organizations having common goals and similar requirements. It affects cost
effectiveness with regards to public cloud. It’s complex as many other organizations
are working together and they might have individual demands or policies which may
result in complexity.
5. Multi Cloud: A multi-cloud model is one in which a company makes use of
several cloud computing services from multiple vendors. Businesses use a multi-cloud
strategy to expand their cloud infrastructure and benefit from the advantages provided
by many cloud providers, as opposed to depending solely on one cloud provider for
all their cloud computing requirements. Organizations may employ services from
different cloud providers, including IBM Cloud, Microsoft Azure, Google Cloud
Platform (GCP), Amazon Web Services (AWS), and others, in a multi-cloud
environment.

Fig. 2. Types of Cloud Deployment Models


5

2 Literature Review:
Despite the benefits of cloud computing, security issues and compliances have been
rising.

Fig. 3. Threats to Data


This figure illustrates various types of threats to data in cloud computing
environments. The main types of threats include Distributed Denial of Services
(DDoS), Insider Threats, Spyware, Data Breaching, Phishing, Multi-Tenancy Users,
Malicious Attacks, and Insecure API Calls. [1] Some of them are discussed as:
A. Distributed Denial of Services (DDos):
These are cyber-crimes that disrupt the normal traffic of a server, service, or
network by flooding it with internet traffic. It can be understood by website
services with so much traffic and crashes.
B. Insider Threats: This happens when someone within an organization’s
system misuse the data or networks for their own advantages.
C. Spyware: spyware is a type of malware that injects to the computer and
records the user’s activities such as websites visited, documents and apps. It
can also gather sensitive information such as passwords.
D. Data Breaching: It generally refers to gaining accessing unauthorised access
to sensitive and confidential information.
E. Phishing: This type of attack refers to sending fraud messages and emails to
users that appear to come from some trust-worthy sources.
F. Multi Tenancy Users: Multi Tenancy generally means to share the resources
or allow instances to divide physically to different multiple logical servers.
But it contains risks of Integrity and Confidentiality in sharing resources.
When multiple users are sharing the same resources, there might be a
malicious user that can take advantage of their personal information.
G. Malicious Attacks: Intentionally hacking, damaging, and corrupting or
misusing the systems is known as Malicious Attack. These includes insertion
of malicious codes or software by any third party or employees.
H. Insecure API Calls: Though APIs provide with easy access to data and
services from multiple sources to develop applications, they can be attacked
by attackers to access sensitive data or perform other malicious actions.

Cloud storage technology has revolutionized the way data is stored, accessed, and
shared offering high scalability, accessibility, and convenience. However, along with
its huge benefits, cloud storage also introduces significant security challenges and
risks. There’s a search into the evolving landscape of cloud storage security, exploring
the concerns, practices and measures aimed at safeguarding data in cloud
environments[2]. Moreover, the rapid adoption of cloud storage has led to an
increasing importance on addressing security and privacy concerns. The literature
review highlights the key challenges, practices, and measures to safeguard data in
cloud environments. Hence, the data in cloud can be safeguarded using different
techniques and measures such as encrypting the data, providing multi-factor
authentication and many more. SeDaSC is a methodology that deals with the security
requirements of shared group data within the cloud[3].
[4]Data availability: Data availability means that authorized users can access the
data when needed. In a cloud service, data availability is achieved through redundant
storage, replication, and recovery mechanisms. Cloud service providers deploy
infrastructure across multiple data centers and use fail-safe architectures to minimize
the risk of data loss or downtime. Service level agreements (SLAs) typically define
availability guarantees and availability goals for cloud services to ensure
uninterrupted access to data.
Cloud Proof[5]: Cloud Proof can be built on top of conventional cloud storage
services like Amazon S3 or Azure Blob Storage. The storage takes the form of
key-value pairs accessed through a get and put interface: the keys are block IDs and
the values are the contents of the blocks. Blocks can have any size and can vary in
size.
Data Confidentiality: Confidentiality means protecting sensitive information from
unauthorized access or disclosure. In the cloud, confidentiality is maintained with
encryption, access control and network security measures. Data encryption ensures
that unauthorized users cannot read the data even if it is intercepted, while access
control will limit who can see or modify the data. Cloud service providers implement
security measures such as firewalls, intrusion detection systems (IDS), and identity
and access management (IAM) to protect against unauthorized access to confidential
information.
7

Fig. 4. Organization of Data Security and Privacy in Cloud Computing


This image highlights the architecture of data security and privacy in cloud
computing. It mainly comprises of three layers such as Data privacy, data security and
data integrity. There are software (Encryption Software, ACLs, Monitoring Tools) and
hardware (Physical Servers, Storage Devices) components that maintain a
comprehensive security framework. To more closely, there are three different cloud
providers which provide with cloud services. Now to ensure that those services are
secure, software and hardware components are used to maintain the framework and
make sure that the services are available to you same as it were being provided by
provider.
Data Integrity: Data integrity ensures that data remains accurate, consistent, and
unchanged throughout its lifetime. In the cloud, integrity checks are used to detect and
prevent unauthorized changes or corruption of data. Technologies such as data
checksums, cryptographic hashes, and digital signatures are used to ensure data
integrity during storage, transmission, and processing. Cloud service providers
implement data validation mechanisms and integrity checks to ensure data integrity
and reliability.
Data Privacy: Data protection refers to the protection of personal data and privacy
rights of individuals. In the case of a cloud service, privacy concerns arise from the
potential disclosure of sensitive information to third parties or unauthorized access by
service providers. Privacy protection in the cloud includes data encryption,
anonymization and compliance with data protection laws and regulations. Cloud
service providers follow data protection principles such as data minimization, target
limitation and transparency to ensure responsible and ethical handling of personal
data.
Data Security: IBM defines cloud security as:
A suite of policies and tools developed to counteract both internal and external
risks to a company's data stored in the cloud. When businesses adopt a digital
transformation plan and start using cloud-based resources, they must ensure that
these resources are secure [6].
Data security challenges cover a broad range of worries about protecting data
against loss, change, disclosure, and illegal access. These problems include the
potential for data breaches brought on by insider threats, hacking, or cyberattacks,
which can result in the loss of confidential data and harm to one's reputation. Data
integrity is at danger from unauthorized access, which is made possible by insufficient
access restrictions and shoddy authentication procedures[7]. Financial losses and
major disruptions can arise from data loss or corruption, which can be caused by
software flaws, hardware malfunctions, or human mistakes. Organizations need to
prioritize several crucial components of data security to effectively safeguard their
data, including insider threats, compliance requirements, encryption, security
vulnerabilities, social engineering assaults, data privacy, and data governance. There
can be various threats to availability with Denial-of-Service attacks (DOS)[8] being
the most popular one. Some other threats include natural disasters and equipment
outages. There are many ways for securing data on cloud. We can deploy encryption,
or we can back up the data.
1. Encryption: It is the process of encoding the plaintext or data into protected
ciphertext to protect it during data travel in cloud. When it is travelling, no
intermediate can access or read it. This prevents cyberattacks and helps to
maintain data privacy and integrity. The receiver’s end has a decryption key
which he can use to decrypt the original message that was sent by the
sender[2]. This key is generated once you encrypt the data.
2. Regularly Updating the Passwords: It is always better to regularly update the
passwords of your files so that they remain safe and secure.
3. Back-up data: Be sure to always have backups for your data. In case if data is
lost or mishandled, backups can provide with actual data. By doing so,
there’s always data available for you making it consistent and relevant to you
anytime and anywhere.
4. Monitoring: Data travelling can be monitored by using AWS Cloud
Watch/Cloud Trail. It is a service provided by Amazon Web Services (AWS)
to regularly monitor the resources being allocated to users, responding to
performance changes, and optimizing resource uses[9]. This can be used
when data is travelling from one place to another to make sure that it is safe
and consistently travelling by continuously monitoring applications or data.
If there’s any mis happenings or improper means of data accessibility, it can
set alarms for the users to make them alert.
An outline of the data security concerns related to IaaS PaaS, & SaaS are given in the
table 1. along with the information on the roles that cloud providers provides
solutions to resolve the issues that clients face in certain Scenarios.
9

Table 1. Comparison of Data Security Issues and Solutions in IaaS, PaaS, and SaaS Models

Data SecurityInfrastructure as a Platform as a Service Software as a Service


Issue Service (IaaS) (PaaS) (SaaS)
Data The cloud service Cloud provider The cloud provider is
Breaches provider protects the manages the responsible for
infrastructure that is platform and managing the entire
beneath servers, underlying software application,
networks, and infrastructure, but which includes data
storage. But customers are backup and processing.
customers oversee responsible for However, due to
securing their securing their security vulnerabilities
information and applications and in SaaS application
applications. Data data. Vulnerabilities itself or
Breach may result or insecure coding misconfiguration of
from configuration practices in user access controls,
or vulnerability in custom-developed data could still be
customer managed applications can lead compromised.
environment. to data breaches.
Unauthorized Unauthorized access Unauthorized access Inadequate access
Access to Virtual Machines, to PasS environment, controls or weak
Storage and application authentication
Networks in cloud frameworks or mechanisms can lead to
environment can development tools unauthorized access to
result from secured may result from SaaS applications and
access controls, insufficiently secured sensitive user data.
weak or incorrect access management
passwords of ACLs. or insufficient
authentication
mechanism.
Data Loss or In the management Data loss or In the management of
Corruption of Virtual Machines, corruption can occur SaaS application or
storage volumes and due to software bugs, their underlying
backups, data loss or configuration errors, infrastructure, data loss
corruption can be or inadequate backup or corruption may be
caused by hardware and recovery caused by system
failure, software, or mechanisms failures, software
human errors. provided by the PaaS problems and errors in
platform. personnel.
Insider In the IaaS model, Insider threats, such The security of data in
Threats there may be risk to as unauthorized SaaS environment may
data security from access by platform be at risk from insider
insider threats like administrators or threats, such as
fraudulent insiders developers, can pose unauthorized access by
or compromised a risk to data security SaaS administrators or
account holders. The in PaaS employees. Limiting
detection and environments. control over user access
removal of insider Limited visibility and activities may
threats can be into platform make it challenging to
difficult, if not activities can make detect and prevent
impossible, due to difficult for detection insider threats
lack of monitoring and response to effectively.
or auditing insider threats.
capabilities.
Compliance Ensuring compliance The customer using As they are responsible
and with industry the PaaS is for the management of
Regulatory regulations or data responsible for software and
Issues protection laws (e.g., compliance with infrastructure, cloud
GDPR, HIPAA) is regulatory providers generally
the responsibility of requirements or take care of compliance
the customer using industry standards. and regulatory issues
IaaS. Cloud To assist in with SaaS. Despite that,
providers may offer compliance, cloud customers may
compliance providers may offer continue to be required
certifications for tools or services, but to comply with data
their infrastructure, customers need to protection legislation or
but customers must ensure that their industry regulations on
implement necessary applications and data the use of SaaS.
controls to meet are kept in line with
specific relevant legislation.
requirements.

This table illustrates how each model handles data breaches, illegal access,
data loss or corruption, insider threats, and compliance challenges, explaining
the duties of both cloud providers and clients in safeguarding their
environments.

3 Data Privacy:

Data privacy refers to the protection of data which is highly sensitive and personal. It
makes sure that the data is kept confidential, secure and is accessible to authorized
users only [23]. It is like making visible only that data which is important. Data
Privacy includes some important aspects such as Confidentiality, Security, Control,
Compliance, Data Residency and Data Portability. Some of the privacy concerns are
discussed as:

1. Data Masking: Sensitive information can be hidden or replaced with safe but
realistic data using data masking. This can lower the chance of data breaches and
render masked data worthless to unauthorized parties.
11

2. Data Encryption: Data encryption is used to protect sensitive information


both during transit and at rest. Use strong encryption algorithms and secure key
management practices to protect data confidentiality [24].

3. Data Segregation: Data segregation: In cloud environments with multiple


tenants, logical separation of data is crucial to prevent unauthorized access or data
leakage. Implement strong isolation mechanisms to isolate customer data and
resources.

4. Data Portability and Interoperability: Maintain data privacy and security by


selecting cloud services that are designed to facilitate data transfer between
on-premises systems and cloud providers. Additionally, some services may require
additional authorization or authorization to access sensitive user data.

5. Employee Training and Awareness: Educate employees and stakeholders on


data protection best practices, information security practices and methods for handling
sensitive data in the cloud. Doing so can promote a culture of data protection
awareness and responsibility throughout the organization.

Table. 2. Comparison of Data Privacy Techniques in Cloud Computing

Paper Title Data Privacy Efficiency Accuracy


Techniques

Review Article Data encryption- High (due to High (accurate


Data Security and Access Control advanced anonymization and
Privacy in Cloud Mechanisms and cryptographic strong encryption)
Computing [20] Anonymization methods and
techniques efficient access
controls)

Data Security and Multi-layer Medium Medium (effective


Privacy Protection encryption, (multi-layer but can be prone to
Issues in Cloud Tokenization, Data encryption can be implementation
Computing [8] Masking resource-intensive) errors)

This table examines several data privacy strategies utilized in cloud computing. It
analyzes addresses such as data encryption, access control systems, anonymization,
multi-layer encryption, tokenization, and data masking. The table examines different
techniques based on their efficiency and accuracy, highlighting the strengths and
potential problems with implementation of each method.

Table. 3. Limitations and Challenges of Privacy Techniques


Privacy Technique Description Challenges Limitations

Data Masking Changing sensitive Implementation is Does not protect


data to equivalents hard and it might info in transit and
that are not affect the data can be reversible if
important. usefulness for not done right.
analytics.

Data Encryption Encoding data to Computationally Encrypted data is


prevent unwanted intensive and key still subjected if
entry. management issues encryption keys
have been stolen.

Access Control Restricting access Requires regular May lead to delays


Mechanisms to data based on updates and can be in data access and
the user roles. bypassed if not complex to handle
implemented in big systems.
efficiently.

Data Segregation Ensuring Difficult to keep Performance effect


reasonable apart and potential due to extra
separation of data for data leaks. separation layers
in multi-tenant and complex to
situations. implement.

Data Portability Data can be easily Uniform concerns Compatibility


and moved anywhere and possible issues and risk of
Interoperability and is available security risks data breach during
across various during data transfer move.
systems.

Employee Training Educating staff for Continuous process Totally depends on


and Awareness handling sensitive and efficiency vary humans and might
data on cloud. by people. not cover all
threats

Tokenization Using tokens that Requires complex Tokens should be


can only be implementation safely stored and
matched to the and secure token managed/accessed.
original data via a management. [25]
secure mechanism
to replace sensitive
data.
13

The above-mentioned table cites challenges such as significant computational cost,


implementation complexity, potential for performance degradation, and difficulty in
handling encryption keys and keeping compliance with developing rules.

4 Conclusion:
In conclusion, cloud computing is a promising area in IT applications because it offers
subscription services and cost-effective data storage and processing. However, the
spread of cloud technology is hindered by data security and privacy concerns.
Building trust between cloud providers and consumers is critical for organizations to
move their data to the cloud with confidence [7]. Although various techniques have
been proposed to improve data security in the cloud, there is still a need to
continuously investigate and improve existing gaps and strengthen trust in cloud
services. Cloud computing can achieve its full potential by prioritizing privacy and
establishing robust security measures, which will help to secure personal information
while also creating trust between service providers and users. Displayed equations are
centered and set on a separate line. Furthermore, the future work can comprise of
different techniques of data privacy and safety such as AI&ML, Blockchain
Technology, Homomorphic Encryption, IoT Security etc. [26]

References
1. Z. Tari, X. Yi, U. S. Premarathne, P. Bertok, and I. Khalil, “Security and privacy in
cloud computing: Vision, trends, and challenges,” IEEE Cloud Comput., vol. 2, no.
2, pp. 30–38, 2015, doi: 10.1109/MCC.2015.45.
2. Raja, V. (2024). Exploring challenges and solutions in cloud computing: A review
of data security and privacy concerns. Journal of Artificial Intelligence General
science (JAIGS) ISSN: 3006-4023, 4(1), 121-144.B. B. Sharma, Ruchika; Vaidya,
Pankaj; Sharma, “A Review on Plant Growth Monitoring using Artificial
Intelligence and the Internet of Things,” 2024 11th Int. Conf. Comput. Sustain.
Glob. Dev., pp. 140–145, doi: 10.23919/INDIACom61295.2024.10498942.
3. B. B. Sharma and N. Kumar, “Internet of things-based hardware and software for
smart agriculture: A review,” Lect. Notes Electr. Eng., vol. 597, pp. 151–157, 2020,
doi: 10.1007/978-3-030-29407-6_13.
4. B. B. Sharma, G. Gupta, P. Vaidya, S. Basheer, F. H. Memon, and R. N. Thakur,
“Internet of Things-Based Crop Classification Model Using Deep Learning for
Indirect Solar Drying,” Wirel. Commun. Mob. Comput., vol. 2022, p. 1455216,
2022, doi: 10.1155/2022/1455216.
5. R. Sharma, N. Kumar, and B. B. Sharma, “Applications of Artificial Intelligence in
Smart Agriculture: A Review,” Lect. Notes Electr. Eng., vol. 832, no. 4, pp.
135–142, 2022, doi: 10.1007/978-981-16-8248-3_11.
6. A. Saraswat, A. Negi, K. Mittal, B. B. Sharma, and N. Kappal, “Real-Time Eyesight
Power Prediction Using Deep Learning Methods,” in Proceedings of Third
International Conference on Computing, Communications, and Cyber-Security, P.
K. Singh, S. T. Wierzchoń, S. Tanwar, J. J. P. C. Rodrigues, and M. Ganzha, Eds.,
Singapore: Springer Nature Singapore, 2023, pp. 325–339.
7. P. Yang, N. Xiong, and J. Ren, “Data Security and Privacy Protection for Cloud
Storage: A Survey,” IEEE Access, vol. 8, pp. 131723–131740, 2020, doi:
10.1109/ACCESS.2020.3009876.
8. N. Kumar and B. Sharma, “Opportunities and Challenges with WSN’s in Smart
Technologies: A Smart Agriculture Perspective,” Adv. Intell. Syst. Comput., vol.
1132, pp. 441–463, 2020, doi: 10.1007/978-3-030-40305-8_22.
9. M. W. Rasooli, B. Bhushan, and N. Kumar, “Applicability of wireless sensor
networks & IoT in saffron & wheat crops: A smart agriculture perspective,” Int. J.
Sci. Technol. Res., vol. 9, no. 2, pp. 2456–2461, 2020.
10. I. Arora and A. Gupta, “Opportunities , Concerns and Challenges in the Adoption of
Cloud Storage,” vol. 3, no. 3, pp. 4543–4548, 2012, [Online]. Available:
http://ijcsit.com/docs/Volume 3/vol3Issue3/ijcsit20120303148.pdf
11. R. A. Popa, M. I. T. Jacob, R. Lorch, D. Molnar, H. J. Wang, and L. Zhuang,
“Enabling Security in Cloud Storage SLAs with CloudProof,” USENIX Annu.
Tech. Conf., vol. 242, pp. 355–368, 2011, [Online]. Available:
http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.306.8355&rep=rep1&typ
e=pdf
12. R. Wang, “Research on Data Security Technology Based on Cloud Storage,”
Procedia Eng., vol. 174, pp. 1340–1355, 2017, doi: 10.1016/j.proeng.2017.01.286.
13. K. Kaur, “A Review of Cloud Computing Service Models,” Int. J. Comput. Appl.,
vol. 140, no. 7, pp. 15–18, 2016, doi: 10.5120/ijca2016909378.
14. X. Yang et al., “A Survey on Smart Agriculture: Development Modes,
Technologies, and Security and Privacy Challenges,” IEEE/CAA J. Autom. Sin.,
vol. 8, no. 2, pp. 273–302, 2021, doi: 10.1109/JAS.2020.1003536.
15. A. Syed, K. Purushotham, and G. Shidaganti, “Cloud Storage Security Risks,
Practices and Measures: A Review,” 2020 IEEE Int. Conf. Innov. Technol.
INOCON 2020, pp. 1–4, 2020, doi: 10.1109/INOCON50539.2020.9298281.
16. M. Ali et al., “SeDaSC: Secure Data Sharing in Clouds,” IEEE Syst. J., vol. 11, no.
2, pp. 395–404, 2017, doi: 10.1109/JSYST.2014.2379646.
17. Huma Farooq, “A Review on Cloud Computing Security Using Authentication
Techniques,” Int. J. Adv. Res. Comput. Sci., vol. 8, no. 2, pp. 19–22, 2017, [Online].
Available:
https://search.ebscohost.com/login.aspx?direct=true&profile=ehost&scope=site&au
thtype=crawler&jrnl=09765697&asa=Y&AN=122708763&h=rXqFpEmmbnKM6
Kbw%2FEG8U2QZTn6Z2DBpbgoorMdOhRfcE8QhxNp%2Fs6jkB7NL6azvpqV7
bb2uv128VDSBkvrhJg%3D%3D&crl=c
18. Abba Ari, A. A., Ngangmo, O. K., Titouna, C., Thiare, O., Mohamadou, A., &
Gueroui, A. M. (2024). Enabling privacy and security in Cloud of Things:
Architecture, applications, security & privacy challenges. Applied Computing and
Informatics, 20(1/2), 119-141. M. Waseem, A. Lakhan, and I. A. Jamali, “Data
Security of Mobile Cloud Computing on Cloud Server,” OALib, vol. 03, no. 04, pp.
1–11, 2016, doi: 10.4236/oalib.1102377.
19. R. K. Banyal, P. Jain, and V. K. Jain, “Multi-factor authentication framework for
cloud computing,” Proc. Int. Conf. Comput. Intell. Model. Simul., pp. 105–110,
2013, doi: 10.1109/CIMSim.2013.25.
20. D. Chen and H. Zhao, “Data security and privacy protection issues in cloud
computing,” Proc. - 2012 Int. Conf. Comput. Sci. Electron. Eng. ICCSEE 2012, vol.
1, no. 973, pp. 647–651, 2012, doi: 10.1109/ICCSEE.2012.193.
21. M. Factor et al., “Secure logical isolation for multi-tenancy in cloud storage,” IEEE
Symp. Mass Storage Syst. Technol., 2013, doi: 10.1109/MSST.2013.6558424.
22. M. A. Vouk, “Cloud computing - Issues, research and implementations,” J. Comput.
Inf. Technol., vol. 16, no. 4, pp. 235–246, 2008, doi: 10.2498/cit.1001391.
View publication stats

15

23. F. Pfarr, T. Buckel, and A. Winkelmann, “Cloud computing data protection - A


literature review and analysis,” Proc. Annu. Hawaii Int. Conf. Syst. Sci., pp.
5018–5027, 2014, doi: 10.1109/HICSS.2014.616.
24. Wang, N., Zhou, W., Wang, J., Guo, Y., Fu, J., & Liu, J. (2024). Secure and efficient
similarity retrieval in cloud computing based on homomorphic encryption. IEEE
Transactions on Information Forensics and Security.
25. Fadhil, J., & Zeebaree, S. R. (2024). Blockchain for Distributed Systems Security in
Cloud Computing: A Review of Applications and Challenges. Indonesian Journal of
Computer Science, 13(2).

You might also like