Communications and Network

Volume 6, Issue 1 (February 2014)

ISSN Print: 1949-2421   ISSN Online: 1947-3826

Google-based Impact Factor: 0.63  Citations  

Data Security Issues and Challenges in Cloud Computing: A Conceptual Analysis and Review

HTML  XML Download Download as PDF (Size: 319KB)  PP. 15-21  
DOI: 10.4236/cn.2014.61003    14,483 Downloads   30,102 Views  Citations

ABSTRACT

Cloud computing is a set of Information Technology services offered to users over the web on a rented base. Such services enable the organizations to scale-up or scale-down their in-house foundations. Generally, cloud services are provided by a third-party supplier who possesses the arrangement. Cloud computing has many advantages such as flexibility, efficiency, scalability, integration, and capital reduction. Moreover, it provides an advanced virtual space for organizations to deploy their applications or run their operations. With disregard to the possible benefits of cloud computing services, the organizations are reluctant to invest in cloud computing mainly due to security concerns. Security is one of the main challenges that hinder the growth of cloud computing. At the same time, service providers strive to reduce the risks over the clouds and increase their reliability in order to build mutual trust between them and the cloud customers. Various security issues and challenges are discussed in this research, and possible opportunities are stated.

Share and Cite:

O. Harfoushi, B. Alfawwaz, N. Ghatasheh, R. Obiedat, M. Abu-Faraj and H. Faris, "Data Security Issues and Challenges in Cloud Computing: A Conceptual Analysis and Review," Communications and Network, Vol. 6 No. 1, 2014, pp. 15-21. doi: 10.4236/cn.2014.61003.

Cited by

[1] Cloud Computing Applications in Social Work and Education
Handbook of Research on Cyber Approaches to …, 2022
[2] A cloud business intelligence security evaluation framework for small and medium enterprises
2021
[3] Analyzing and evaluating critical challenges and practices for software vendor organizations to secure big data on cloud computing: An AHP-based systematic …
IEEE …, 2021
[4] A review paper on hypervisor and virtual machine security
Journal of Physics: Conference …, 2021
[5] Identification and prioritization of security challenges of big data on cloud computing based on SLR: A fuzzy‐TOPSIS analysis approach
Journal of Software …, 2021
[6] Cloud Computing: Security Issues and Challenges
2021
[7] Skills and Competences for Utilization of Web Storage Technology (WST) Platform for Academic Activities by Faculty Members in Faculty of Education, Ahmadu Bello …
2020
[8] A Prototype for Data Integrity in Cloud Environment
2020
[9] SECURITY FLAWS AND RISKS IN CLOUD COMPUTING SERVICE: A QUALITATIVE CASE STUDY
2019
[10] Analytics on real time security attacks in healthcare, retail and banking applications in the cloud
2019
[11] A brief review: security issues in cloud computing and their solutions
2019
[12] A Privacy Preserved Scheme for Data Verification and Integrity Protocol
2019
[13] A brief review: security issues in cloud computing and their solutions.
2019
[14] Data Access and security in Cloud integrated IoT
2019
[15] Analysis of Several Data Security Issues in Cloud Computing with Cryptographic Algorithms
International Journal of Scientific Research in Computer Science Applications and Management Studies, 2019
[16] SIGURIA DHE PRIVATËSIA NË SEKTORIN BANKAR QË PËRDORIN SHËRBIME TË BAZUARA NË CLOUD: SFIDAT DHE KONTROLLET
2019
[17] Efficient Online Data Storage Over Cloud Using Enhanced Homomorphic Encryption With Redundancy Handling
Think India Journal, 2019
[18] A Survey of Techniques Used For Dynamic Replication and Migration of Data In Cloud
Think India Journal, 2019
[19] An Optimized Algorithm: Maxchild on Workflow Scheduling
International Journal of Applied Engineering Research [IJAER], 2018
[20] Retrieving Real Time Data Through IOT Devices and Storing Securely on Cloud Using Li-Fi
2018
[21] The Perception of Information Security Threats Surrounding the Cloud Computing Environment
2018
[22] Comprehensive Analysis of Security Mechanisms Within Cloud Computing
International Journal of Computer Science Trends and Technology (IJCST), 2018
[23] Requirement Engineering for Security Issues in Cloud Computing
2018
[24] THE MANAGEMENT OF IT SOLUTIONS SECURITY OFFERED IN PUBLIC CLOUD COMPUTING
2018
[25] Studying the Effect of Using E-Learning Through Secure Cloud Computing Systems
2018
[26] Accepting the Cloud: A Quantitative Predictive Analysis of Cloud Trust and Acceptance Among IT Security Professionals
2018
[27] AN INSIGHT INTO SERVICE MODEL SPECIFIC SECURITY IN CLOUDCOMPUTING
Global Journal of Engineering Science and Research Management, 2018
[28] Securing Cloud Hypervisors: A Survey of the Threats, Vulnerabilities, and Countermeasures
Security and Communication Networks, 2018
[29] SMART CARD BASED AUTOMATED TOLL PLAZA SYSTEM
International Research Journal of Engineering and Technology, 2018
[30] Certificate Programs in Computer Networks, Security, and Cloud Computing in the USA-A Review
Certificate Programs in Computer Networks, Security, and Cloud Computing in the USA-A Review, 2017
[31] Security and management framework for an organization operating in cloud environment
Annals of Telecommunications, 2017
[32] Role of Scheduling and Load Balancing Algorithms in cloud to improve the Quality of Services
2017
[33] TRUST MODEL FOR EFFECTIVE CLOUD COMPUTING USAGE: A QUANTITATIVE STUDY
2017
[34] An Analytical Account of Cryptography in Cloud Computing and Potential Security Risks
2017
[35] Security and Privacy in Cloud Computing
2017
[36] Review of Various Encryption and Compression Mechanisms Used within Deduplication in Cloud Computing
International Journal of Science and Research, 2017
[37] Fog computing: Common security issues and proposed countermeasures
2016
[38] Security Issues in Service Models of Cloud Computing
2016
[39] Developing A Secure Cloud Storage System for Storing IoT Data by Applying Role Based Encryption
Procedia Computer Science, 2016
[40] Secure data sharing through additive similarity based ElGamal like encryption
2016
[41] Secured Cloud Computing Using User Classification and Bilinear Diffie-Hellman Schema
2016
[42] Causal Understanding of Limited Adoption of Cloud Computing by Customers
International Journal of Computer Applications, 2015
[43] ANALYSIS OF CLOUD SECURITY ISSUES AND CHALLENGES IN MEDIUM SCALE ENTERPRISES IN PAKISTAN
2015
[44] Security challenges in cloud
2015
[45] A Framework for Homomorphic, Private Information Retrieval Protocols in the Cloud
2015
[46] Does Cloud Storage Lend Itself to Cyberbullying?
Cloud Computing, IEEE, 2015
[47] Research Article DYBACON: An Auditor for Secure Kinetic Cloud Storage
2015
[48] DYBACON: An Auditor for Secure Kinetic Cloud Storage
2015
[49] A Technique to Enhance the Privacy Issues in Cloud Computing
2015
[50] Multi-Level Data Integrity Service
International Journal of Computer Applications, 2014
[51] An Overview of Cloud Computing Delivery Models: Security Issues and Challenges
TS Aluko, AO Ayannusi, OJ Olusanya
[52] Data Breaches in Cloud Computing and its Privacy and Security Aspects

Copyright © 2024 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.