Security and Privacy in Cloud Computing: Challenges and Opportunities
DOI:
https://doi.org/10.18034/ajtp.v4i3.667Keywords:
Cloud Computing, Security Issues, Privacy, Cloud Computing Model, Cloud SecurityAbstract
ICT advancements have made cloud computing popular and successful. Cloud computing lets corporate users relocate and utilize the pay-as-you-go price model's scalability. However, outsourcing data and business applications to the Cloud or a third party creates security and privacy concerns, which are crucial to cloud adoption. Researchers and impacted organizations have offered several security measures to address security issues in the literature. Cloud computing security and privacy are extensively covered in the literature. Unfortunately, literature efforts lack flexibility in mitigating numerous threats without contradicting cloud security aims. The literature has also focused on security and privacy issues and has yet to give technical solutions. Research on technical remedies to security concerns has yet to explain their origins. This paper introduces security and privacy challenges that require adaptive solutions without compromising cloud security. This research evaluates the literature, including its adaptability to future threats and how cloud security conflicts have invalidated their models. The essay uses STRIDE to highlight cloud computing security issues from a user perspective. It also analyses literature-based inefficient solutions and recommends secure, adaptive cloud environments.
Downloads
References
Aithal, P. S., & Pai, V. T. (2016). Concept of Ideal Software and its Realization Scenarios. International Journal of Scientific Research and Modern Education (IJSRME), 1(1), 826-837. http://doi.org/10.5281/zenodo.160908
Čapek, J. (2012). Cloud Computing and Information Security. Scientific Papers of the University of Pardubice. Series D. Faculty of Economics and Administration, Pardibuce 24, 23-30.
Dekkati, S., & Thaduri, U. R. (2017). Innovative Method for the Prediction of Software Defects Based on Class Imbalance Datasets. Technology & Management Review, 2, 1–5. https://upright.pub/index.php/tmr/article/view/78
Desamsetti, H. (2016a). A Fused Homomorphic Encryption Technique to Increase Secure Data Storage in Cloud Based Systems. The International Journal of Science & Technoledge, 4(10), 151-155.
Desamsetti, H. (2016b). Issues with the Cloud Computing Technology. International Research Journal of Engineering and Technology (IRJET), 3(5), 321-323.
Fernandes, D. A. B., Soares, L. F. B., Gomes, J. V., Freire, M. M., Inácio, P. R. M. (2014). Security Issues in Cloud Environments: a Survey. International Journal of Information Security, 13(2), 113-170. http://doi.org/10.1007/s10207-013-0208-7 DOI: https://doi.org/10.1007/s10207-013-0208-7
Gutlapalli, S. S. (2016a). An Examination of Nanotechnology’s Role as an Integral Part of Electronics. ABC Research Alert, 4(3), 21–27. https://doi.org/10.18034/ra.v4i3.651 DOI: https://doi.org/10.18034/ra.v4i3.651
Gutlapalli, S. S. (2016b). Commercial Applications of Blockchain and Distributed Ledger Technology. Engineering International, 4(2), 89–94. https://doi.org/10.18034/ei.v4i2.653 DOI: https://doi.org/10.18034/ei.v4i2.653
Hatem, S. S., wafy, M. H., El-Khouly, M. M. (2014). Malware Detection in Cloud Computing. International Journal of Advanced Computer Science and Applications, 5(4), 187-192. http://doi.org/10.14569/IJACSA.2014.050427 DOI: https://doi.org/10.14569/IJACSA.2014.050427
Keegan, N., Ji, S-Y., Chaudhary, A., Concolato, C., Yu, B. (2016). A Survey of Cloud-Based Network Intrusion Detection Analysis. Human-centric Computing and Information Sciences, 6(1), 1-16. http://doi.org/10.1186/s13673-016-0076-z DOI: https://doi.org/10.1186/s13673-016-0076-z
Lal, K. (2015). How Does Cloud Infrastructure Work?. Asia Pacific Journal of Energy and Environment, 2(2), 61-64. https://doi.org/10.18034/apjee.v2i2.697 DOI: https://doi.org/10.18034/apjee.v2i2.697
Lal, K. (2016). Impact of Multi-Cloud Infrastructure on Business Organizations to Use Cloud Platforms to Fulfill Their Cloud Needs. American Journal of Trade and Policy, 3(3), 121–126. https://doi.org/10.18034/ajtp.v3i3.663 DOI: https://doi.org/10.18034/ajtp.v3i3.663
Lal, K., & Ballamudi, V. K. R. (2017). Unlock Data’s Full Potential with Segment: A Cloud Data Integration Approach. Technology & Management Review, 2(1), 6–12. https://upright.pub/index.php/tmr/article/view/80
Mandapuram, M. (2016). Applications of Blockchain and Distributed Ledger Technology (DLT) in Commercial Settings. Asian Accounting and Auditing Advancement, 7(1), 50–57. https://4ajournal.com/article/view/76
Mona, M. A., Sharma, P. (2014). Cloud Computing: a Collaborative Green Platform for the Knowledge Society. VINE: Very Informal Newsletter on Library Automation, 44(3), 357-374. http://doi.org/10.1108/VINE-07-2013-0038 DOI: https://doi.org/10.1108/VINE-07-2013-0038
Thaduri, U. R., Ballamudi, V. K. R., Dekkati, S., & Mandapuram, M. (2016). Making the Cloud Adoption Decisions: Gaining Advantages from Taking an Integrated Approach. International Journal of Reciprocal Symmetry and Theoretical Physics, 3, 11–16. https://upright.pub/index.php/ijrstp/article/view/77
William, U., Lee, U. (2016). A Fortress of Clouds: Copyright Law, the Computer Fraud, Abuse Act, and Cloud Computing. Southern Law Journal, 26(2), 191-232.
Downloads
Published
Issue
Section
License
Copyright (c) 2017 Venkata Koteswara Rao Ballamudi, Harshith Desamsetti
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
American Journal of Trade and Policy is an Open Access journal. Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal the right of first publication with the work simultaneously licensed under a CC BY-NC 4.0 International License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of their work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal. We require authors to inform us of any instances of re-publication.