The Study of Data Security in Cloud Computing
Article Main Content
Cloud computing holds the possibility to annihilate the needs for setting up of costly computing infrastructure for IT-based services and proffering IT Solutions. It offers an adaptable IT architecture which is accessible via the internet for lightweight and hand-held compact gadgets. The concept has encouraged numerous folds to improve in the capacity or capabilities of the existing and new software. In the cloud computing environment, the whole data/information is available over a set of networked resources, empowering the information to be accessible via virtual machines. Considering the fact that the cloud computing server may be located in any part of the world beyond the reach and control of users, there are various security issues and privacy challenges that need to be clearly understood with a view to identifying how to mitigate them. Likewise, there are possibilities of the imminent breakdown of servers which have been witnessed in recent times. This research addresses the security issues connected with cloud computing, provides analysis of the militating factors against the successful implementation of cloud computing and proffers useful recommendations on how to ameliorate identified issues.
References
-
L.M. Vaquero, L. Rodero-Merino, J. Caceres and M. Lindner, ?A break in the clouds: Towards a cloud definition,? ACM SIGCOMM Comput. Commun. Rev., 39: 50-55, 2009.
Google Scholar
1
-
Computer Infographics (May 2013). ?Infographic Zone: The No. 1 source of data visualization,? [Online]. Available: http://www.infographicszone.com/computers/top-5-cloud-computing-infographics
Google Scholar
2
-
I. P. Sokolov, ?Cloud Computing: Overview, Concepts and Business Development Scenerio,? Thesis, Vienna University of Economics and Business:, p. 9, 2009.
Google Scholar
3
-
J. Mckendric (2012), ?Forbes?, [Online]. Available: http://www.forbes.com/sites/joemckendrick/2012/02/22/6-shining-examples-of-cloud-computing-in-action/
Google Scholar
4
-
M. Armburst, A. Fox, R. Griffith, A. D. Joseph, R. Katz, A. Konwinski, G. Lee, D. Pattersson, A. Rabkin, I. Stoica and M. Zaharia, ?Above the Clouds: A Berkeley View of Cloud Computing,? Berkeley: EECS Department, University of Califonia, 2009.
Google Scholar
5
-
ORACLE (2012), ?Oracle?s Cloud Solutions for Public Sector,? [Online]. Available: http://www.oracle.com/us/industries/public-sector/cloud-solutions-public-sector-wp-323002.pdf.
Google Scholar
6
-
D. Farber. (2006), ?Oracle's Ellison nails cloud computing,? [Online]. Available: http://news.cnet.com/8301-13953_3-10052188-80.html.
Google Scholar
7
-
Intel IT Centre. (2012), ?Planning guide cloud security,? pp. 5.
Google Scholar
8
-
Z. Whittaker. (2012), ?Amazon Web Services suffers partial outage,? [Online]. Available: http://www.zdnet.com/blog/btl/amazon-web-services-suffers-partial-outage/79981.
Google Scholar
9
-
M. J. Schwartz. (2011), ?6 Worst Data Breaches of 2011,? [Online]. Available: http://www.informationweek.com/news/security/attacks/232301079.
Google Scholar
10
-
N. Cao, (2012) ?Secure and reliable data outsourcing in Cloud computing,? Worcester Polytechnic Institute: S.N, 2012.
Google Scholar
11
-
IDC. (2011). ?Cloud will have dramatic impact on IT organisations, vendors and enterprises,? [Online]. Available: Accessed 13th March 2010 via. http://www.idc.com/getdoc.jsp?containerId=prUS22903111.
Google Scholar
12
-
G. Reese, ?Cloud Application Architectures: Building Applications and Infrastructure in the Cloud,?. S.L.:O?Reilly, (2009).
Google Scholar
13
-
R. Jacob, ?Security in the Cloud: The threat of coexist with an unknown tenant on a public environment?, Royal Holloway, University of London: s.n., 2012.
Google Scholar
14
-
CSIS. (2009), ?Threats Posed by the Internet,? [Online]. Available: http://csis.org/files/media/csis/pubs/081028_threats_working_group.pdf.
Google Scholar
15
-
Cloud Security Alliance. (2011), ?Encription and key management,?. [Online]. Available:https://wiki.cloudsecurityalliance.org/guidance/index.php/Encryption_and_Key_Management.
Google Scholar
16
-
NIST. (2009), ?The NIST definition of cloud computing,?. [Online]. Available: http://csrc.nist.gov/publications/nistpubs/800-145/SP800-145.pdf.
Google Scholar
17
-
T. Grance. (2011). ?The NIST Definition of Cloud Computing? [Online]. Available at: http://www.nist.gov/itl/cloud/upload/cloud-def-v15.pdf.
Google Scholar
18
-
CSA. (2010). Encription and key management. [Online] Available at: https://wiki.cloudsecurityalliance.org/guidance/index.php/Encryption_and_Key_Management.
Google Scholar
19
-
CSA, ?Security Guidance for Critical Area of Focus in Cloud computing,? Cloud Security Alliance, V2.1. p. 33, (2009).
Google Scholar
20
-
F. Jericho. (2009). ?Cloud Cube Model?. [Online]. Available: http://www.opengroup.org/jericho/cloud_cube_model_v1.0.pdf.
Google Scholar
21
-
ENISA. (2009). ?Cloud computing: Benefits, risks and recommendations for information security,? [Online]. Available: http://www.enisa.europa.eu/act/rm/files/deliverables/cloud-computing-risk-assessment.
Google Scholar
22
-
Gartner. (2011). ?CIO Agenda Findings,? [Online]. Available: http://www.gartner.com/technology/cio/cioagenda_findings.jsp.
Google Scholar
23
-
T. J. Velte, R. Elsenpeter. (2010). ?Cloud computing: A practical Approach,? s.l.:McGraw - Hill.
Google Scholar
24
-
R. L. Krutz et al, ?Cloud Security: A Comprehensive Guide To Secure Cloud Computing,? 2010.
Google Scholar
25
-
Global Knowledge. (2011). ?10 security concerns for cloud computing,?. [Online]. Available at: http://viewer.media.bitpipe.com/1078177630_947/1268847180_5/WP_VI_10SecurityConcernsCloudComputing.pdf.
Google Scholar
26
-
R. Murch (2004), ?Autonomic Computing,?. s.l.:IBM press, pp. 336, 2004.
Google Scholar
27
-
M. Rouse. (2006), ?Autonomic Computing,? [Online]. Available at: http://searchcio-midmarket.techtarget.com/definition/autonomic-computing.
Google Scholar
28
-
P. Horn. (2001), ?Autonomic Computing: IBM perspective on the state of information technology,? [Online]. Available at: http://www.research.ibm.com/autonomic.
Google Scholar
29
-
J. Kephart, ?The Vision of Autonomic Computing,? IEEE Comput 2003; vol. 36, pp. 41 - 50. 2003.
Google Scholar
30
-
IBM, ?Autonomic Computing: IBM perspective on the state of information technology,? IBM J., 2003.
Google Scholar
31
-
R. Buyya, C. S. Yeo, and S. Venugopal (2008), ?Market-oriented cloud computing: Vision, Hype, and reality for delivering IT services as Computing Utilities,?, Keynote Paper, China, Dalian, 2008.
Google Scholar
32
-
D. Neumann, M. Baker, J. Altmann and O.F. Rana, (2010) ?Economic Models and Algorithm for Distributed Systems,? Birkauser, Berlin, 2010.
Google Scholar
33
-
Gridpedia. (n.d). ?The European Grid Marketplace,? [Online]. Available at: http://www.gridipedia.eu/sla-article.html.
Google Scholar
34
-
F. Liu, J. Tong, J. Mao, R. Bohn, J. Messina, L. Badger and D. Leaf, ?NIST Cloud computing reference architecture; Recommendations of the National Institute of Standards and Technology,? Gaithersburg: NIST, 2011.
Google Scholar
35
-
O. Florence. (2012). ?The Effects of The Amazon Web Services Outages,? [Online]. Available: http://www.cloudtweaks.com/2012/06/the-effects-of-the-amazon-web-services-outages/.
Google Scholar
36
-
J. W. Rittinghouse and J. F. Ransome, ?Cloud Computing: Implementation, Management, and Security,? Auerbach Publications, New York, 2009.
Google Scholar
37
-
S. K. Sood. ?A combined approach to ensure data security in cloud computing,?, Gurdaspur, India: Department of Computer Science and Engineering, GNDU, 2012.
Google Scholar
38
-
T. Dierks and C. Allen, ?The TLS Protocol, Certicom: Network Working Group,? The Internet Society, 1999.
Google Scholar
39
-
A. Whitten, ?Consumer Online Privacy: Statement at hearing of Senate Committee on Commerce, Science, and Transportation?, July 27 2010.
Google Scholar
40
-
A. Friedman, A. Allan, and M. D. M. West, ?Privacy and Security in Cloud Computing,? Issues of Technology Innovation, pp. 1, 2010.
Google Scholar
41
-
B. Lev, ?Remarks on the Measurement, Valuation, and Reporting of Intangible Assets,? FRBNY Economic Policy Review. 2003.
Google Scholar
42
-
K. Hon. (2011). ?Data protection, the law and you,? [Online]. Available:http://blogs.computerworlduk.com/cloud-vision/2011/04/data-protection-the-law-and-you-1/index.htm.
Google Scholar
43
-
D. Preez. (2011). ?UK census contractor says data privacy laws will have to change,? [Online]. Available: http://www.computing.co.uk/ctg/news/2029852/uk-census-contractor-privacy-laws-change.
Google Scholar
44
-
A. Oza, (2008). Amend the ECPA: Fourth Amendment Protection Erodes as E-Mails Get Dusty. BUL Rev., 88.
Google Scholar
45
Most read articles by the same author(s)
-
Hashiru Isiaka Muhammad,
Kabir Ibrahim Musa,
Mustapha Lawal Abdulrahman,
Abdullahi Abubakar,
Kabiru Umar,
Abdulhakeem Ishola,
Enhancing Detection Performance of Face Recognition Algorithm Using PCA-Faster R-CNN , European Journal of Electrical Engineering and Computer Science: Vol. 5 No. 3 (2021) -
Syed Ibtisam Tauhidi,
Abdullahi Abubakar,
Abdulhakeem Ishola,
Alhaji Idi Babate,
Zayyanu Umar,
Musa Abubaka Alkali Tanko,
Ahmad Maccido Abdulkadi,
Umar Audu Mustapha,
Muhammad Haruna Rasheed,
Hashiru Isiaka Muhammad,
ABAFOR: A Blockchain-based Privacy-Preserving Architecture for Efficient Contact Tracing and GIS Analysis , European Journal of Electrical Engineering and Computer Science: Vol. 6 No. 2 (2022)