Impactof Data Securityand Privacyin Cloud Computing
Impactof Data Securityand Privacyin Cloud Computing
net/publication/385587618
CITATIONS READS
0 59
1 author:
Shubham Sharma
Shoolini University
1 PUBLICATION 0 CITATIONS
SEE PROFILE
All content following this page was uploaded by Shubham Sharma on 06 November 2024.
financial losses to reputational harm. [7] Cloud computing has many benefits
including scalability, cost-efficiency, reliability, accessibility, security, storage &
backup, innovation & agility, automatic updates, and maintenance [2]. Due to its large
demand and scalability, the cloud can be used in different sectors or fields
[3][4][5][6][7]. Cloud-based LMS helps a lot for teachers, students, and mentors to
share and access course materials easily from anywhere. Similarly, in healthcare,
cloud computing provides a platform to easily store the patient’s data, manage records
and diagnose easily with modern machinery and techniques. Similarly, in terms of
large data in Banks, cloud can provide security to the customer’s data [8][9][10]. It
also offers many services such as fault tolerance, data surveillance etc. With emerging
paradigm, cloud computing has several applications in terms of agriculture such as
precision agriculture, crop management, supply chain management, Data Analytics
etc. Fig.1 illustrates the categories that need to be considered during designing a
security system for cloud storage or data processing in cloud computing [11].
Despite of all these benefits, cloud computing is risky as storing data online, on
any platform is quite inconsistent. When storing data online, there’s a risk of data
leakage. Cloud can easily modify our data sometimes [12]. This might happen due to
some crashes, unwanted configurations, or due to the operator’s error. Sometimes, the
worst can happen is that there might be some malicious breach i.e., some insider may
be leaking your data to others without your permission. Sometimes, the cloud can
accidentally expose private information, change the data without permission or give
different users different versions of the same data. Additionally, deliberate attacks by
hackers or even employees working for the cloud service could be even more harmful
and difficult to notice. These attackers might get into the cloud provider's system from
the outside, or they might already work for the company and misuse their access [13].
These mis-happenings are not merely new. In June 2023, Toyota, a renowned
carmaker, experienced a criminal breach in which some 260,000 customers' data was
inadvertently made accessible online owing to a misconfigured cloud infrastructure.
Although the breach did not result in the exposure of significant quantities of sensitive
data, it underscores the fact that a mere misconfiguration can provide hackers with an
opportunity to gain unauthorized access. Another occurrence took place. Sina Weibo
is a prominent social media site in China. In June 2020, the private information of
over 538 million individuals, such as their actual identities, usernames, gender,
location, and phone numbers for 172 million users, was publicly disclosed on the dark
web and other platforms. Although the exact cause of the event remains uncertain, the
hacker offered to sell Weibo's data for a meagre $250, presumably since it did not
contain any passwords.
2 Literature Review:
Despite the benefits of cloud computing, security issues and compliances have been
rising.
Cloud storage technology has revolutionized the way data is stored, accessed, and
shared offering high scalability, accessibility, and convenience. However, along with
its huge benefits, cloud storage also introduces significant security challenges and
risks. There’s a search into the evolving landscape of cloud storage security, exploring
the concerns, practices and measures aimed at safeguarding data in cloud
environments[2]. Moreover, the rapid adoption of cloud storage has led to an
increasing importance on addressing security and privacy concerns. The literature
review highlights the key challenges, practices, and measures to safeguard data in
cloud environments. Hence, the data in cloud can be safeguarded using different
techniques and measures such as encrypting the data, providing multi-factor
authentication and many more. SeDaSC is a methodology that deals with the security
requirements of shared group data within the cloud[3].
[4]Data availability: Data availability means that authorized users can access the
data when needed. In a cloud service, data availability is achieved through redundant
storage, replication, and recovery mechanisms. Cloud service providers deploy
infrastructure across multiple data centers and use fail-safe architectures to minimize
the risk of data loss or downtime. Service level agreements (SLAs) typically define
availability guarantees and availability goals for cloud services to ensure
uninterrupted access to data.
Cloud Proof[5]: Cloud Proof can be built on top of conventional cloud storage
services like Amazon S3 or Azure Blob Storage. The storage takes the form of
key-value pairs accessed through a get and put interface: the keys are block IDs and
the values are the contents of the blocks. Blocks can have any size and can vary in
size.
Data Confidentiality: Confidentiality means protecting sensitive information from
unauthorized access or disclosure. In the cloud, confidentiality is maintained with
encryption, access control and network security measures. Data encryption ensures
that unauthorized users cannot read the data even if it is intercepted, while access
control will limit who can see or modify the data. Cloud service providers implement
security measures such as firewalls, intrusion detection systems (IDS), and identity
and access management (IAM) to protect against unauthorized access to confidential
information.
7
Table 1. Comparison of Data Security Issues and Solutions in IaaS, PaaS, and SaaS Models
This table illustrates how each model handles data breaches, illegal access,
data loss or corruption, insider threats, and compliance challenges, explaining
the duties of both cloud providers and clients in safeguarding their
environments.
3 Data Privacy:
Data privacy refers to the protection of data which is highly sensitive and personal. It
makes sure that the data is kept confidential, secure and is accessible to authorized
users only [23]. It is like making visible only that data which is important. Data
Privacy includes some important aspects such as Confidentiality, Security, Control,
Compliance, Data Residency and Data Portability. Some of the privacy concerns are
discussed as:
1. Data Masking: Sensitive information can be hidden or replaced with safe but
realistic data using data masking. This can lower the chance of data breaches and
render masked data worthless to unauthorized parties.
11
This table examines several data privacy strategies utilized in cloud computing. It
analyzes addresses such as data encryption, access control systems, anonymization,
multi-layer encryption, tokenization, and data masking. The table examines different
techniques based on their efficiency and accuracy, highlighting the strengths and
potential problems with implementation of each method.
4 Conclusion:
In conclusion, cloud computing is a promising area in IT applications because it offers
subscription services and cost-effective data storage and processing. However, the
spread of cloud technology is hindered by data security and privacy concerns.
Building trust between cloud providers and consumers is critical for organizations to
move their data to the cloud with confidence [7]. Although various techniques have
been proposed to improve data security in the cloud, there is still a need to
continuously investigate and improve existing gaps and strengthen trust in cloud
services. Cloud computing can achieve its full potential by prioritizing privacy and
establishing robust security measures, which will help to secure personal information
while also creating trust between service providers and users. Displayed equations are
centered and set on a separate line. Furthermore, the future work can comprise of
different techniques of data privacy and safety such as AI&ML, Blockchain
Technology, Homomorphic Encryption, IoT Security etc. [26]
References
1. Z. Tari, X. Yi, U. S. Premarathne, P. Bertok, and I. Khalil, “Security and privacy in
cloud computing: Vision, trends, and challenges,” IEEE Cloud Comput., vol. 2, no.
2, pp. 30–38, 2015, doi: 10.1109/MCC.2015.45.
2. Raja, V. (2024). Exploring challenges and solutions in cloud computing: A review
of data security and privacy concerns. Journal of Artificial Intelligence General
science (JAIGS) ISSN: 3006-4023, 4(1), 121-144.B. B. Sharma, Ruchika; Vaidya,
Pankaj; Sharma, “A Review on Plant Growth Monitoring using Artificial
Intelligence and the Internet of Things,” 2024 11th Int. Conf. Comput. Sustain.
Glob. Dev., pp. 140–145, doi: 10.23919/INDIACom61295.2024.10498942.
3. B. B. Sharma and N. Kumar, “Internet of things-based hardware and software for
smart agriculture: A review,” Lect. Notes Electr. Eng., vol. 597, pp. 151–157, 2020,
doi: 10.1007/978-3-030-29407-6_13.
4. B. B. Sharma, G. Gupta, P. Vaidya, S. Basheer, F. H. Memon, and R. N. Thakur,
“Internet of Things-Based Crop Classification Model Using Deep Learning for
Indirect Solar Drying,” Wirel. Commun. Mob. Comput., vol. 2022, p. 1455216,
2022, doi: 10.1155/2022/1455216.
5. R. Sharma, N. Kumar, and B. B. Sharma, “Applications of Artificial Intelligence in
Smart Agriculture: A Review,” Lect. Notes Electr. Eng., vol. 832, no. 4, pp.
135–142, 2022, doi: 10.1007/978-981-16-8248-3_11.
6. A. Saraswat, A. Negi, K. Mittal, B. B. Sharma, and N. Kappal, “Real-Time Eyesight
Power Prediction Using Deep Learning Methods,” in Proceedings of Third
International Conference on Computing, Communications, and Cyber-Security, P.
K. Singh, S. T. Wierzchoń, S. Tanwar, J. J. P. C. Rodrigues, and M. Ganzha, Eds.,
Singapore: Springer Nature Singapore, 2023, pp. 325–339.
7. P. Yang, N. Xiong, and J. Ren, “Data Security and Privacy Protection for Cloud
Storage: A Survey,” IEEE Access, vol. 8, pp. 131723–131740, 2020, doi:
10.1109/ACCESS.2020.3009876.
8. N. Kumar and B. Sharma, “Opportunities and Challenges with WSN’s in Smart
Technologies: A Smart Agriculture Perspective,” Adv. Intell. Syst. Comput., vol.
1132, pp. 441–463, 2020, doi: 10.1007/978-3-030-40305-8_22.
9. M. W. Rasooli, B. Bhushan, and N. Kumar, “Applicability of wireless sensor
networks & IoT in saffron & wheat crops: A smart agriculture perspective,” Int. J.
Sci. Technol. Res., vol. 9, no. 2, pp. 2456–2461, 2020.
10. I. Arora and A. Gupta, “Opportunities , Concerns and Challenges in the Adoption of
Cloud Storage,” vol. 3, no. 3, pp. 4543–4548, 2012, [Online]. Available:
http://ijcsit.com/docs/Volume 3/vol3Issue3/ijcsit20120303148.pdf
11. R. A. Popa, M. I. T. Jacob, R. Lorch, D. Molnar, H. J. Wang, and L. Zhuang,
“Enabling Security in Cloud Storage SLAs with CloudProof,” USENIX Annu.
Tech. Conf., vol. 242, pp. 355–368, 2011, [Online]. Available:
http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.306.8355&rep=rep1&typ
e=pdf
12. R. Wang, “Research on Data Security Technology Based on Cloud Storage,”
Procedia Eng., vol. 174, pp. 1340–1355, 2017, doi: 10.1016/j.proeng.2017.01.286.
13. K. Kaur, “A Review of Cloud Computing Service Models,” Int. J. Comput. Appl.,
vol. 140, no. 7, pp. 15–18, 2016, doi: 10.5120/ijca2016909378.
14. X. Yang et al., “A Survey on Smart Agriculture: Development Modes,
Technologies, and Security and Privacy Challenges,” IEEE/CAA J. Autom. Sin.,
vol. 8, no. 2, pp. 273–302, 2021, doi: 10.1109/JAS.2020.1003536.
15. A. Syed, K. Purushotham, and G. Shidaganti, “Cloud Storage Security Risks,
Practices and Measures: A Review,” 2020 IEEE Int. Conf. Innov. Technol.
INOCON 2020, pp. 1–4, 2020, doi: 10.1109/INOCON50539.2020.9298281.
16. M. Ali et al., “SeDaSC: Secure Data Sharing in Clouds,” IEEE Syst. J., vol. 11, no.
2, pp. 395–404, 2017, doi: 10.1109/JSYST.2014.2379646.
17. Huma Farooq, “A Review on Cloud Computing Security Using Authentication
Techniques,” Int. J. Adv. Res. Comput. Sci., vol. 8, no. 2, pp. 19–22, 2017, [Online].
Available:
https://search.ebscohost.com/login.aspx?direct=true&profile=ehost&scope=site&au
thtype=crawler&jrnl=09765697&asa=Y&AN=122708763&h=rXqFpEmmbnKM6
Kbw%2FEG8U2QZTn6Z2DBpbgoorMdOhRfcE8QhxNp%2Fs6jkB7NL6azvpqV7
bb2uv128VDSBkvrhJg%3D%3D&crl=c
18. Abba Ari, A. A., Ngangmo, O. K., Titouna, C., Thiare, O., Mohamadou, A., &
Gueroui, A. M. (2024). Enabling privacy and security in Cloud of Things:
Architecture, applications, security & privacy challenges. Applied Computing and
Informatics, 20(1/2), 119-141. M. Waseem, A. Lakhan, and I. A. Jamali, “Data
Security of Mobile Cloud Computing on Cloud Server,” OALib, vol. 03, no. 04, pp.
1–11, 2016, doi: 10.4236/oalib.1102377.
19. R. K. Banyal, P. Jain, and V. K. Jain, “Multi-factor authentication framework for
cloud computing,” Proc. Int. Conf. Comput. Intell. Model. Simul., pp. 105–110,
2013, doi: 10.1109/CIMSim.2013.25.
20. D. Chen and H. Zhao, “Data security and privacy protection issues in cloud
computing,” Proc. - 2012 Int. Conf. Comput. Sci. Electron. Eng. ICCSEE 2012, vol.
1, no. 973, pp. 647–651, 2012, doi: 10.1109/ICCSEE.2012.193.
21. M. Factor et al., “Secure logical isolation for multi-tenancy in cloud storage,” IEEE
Symp. Mass Storage Syst. Technol., 2013, doi: 10.1109/MSST.2013.6558424.
22. M. A. Vouk, “Cloud computing - Issues, research and implementations,” J. Comput.
Inf. Technol., vol. 16, no. 4, pp. 235–246, 2008, doi: 10.2498/cit.1001391.
View publication stats
15