Security and Privacy in Cloud Computing: Challenges and Opportunities

Authors

  • Venkata Koteswara Rao Ballamudi Sr. Software Engineer, High Quartile LLC, USA
  • Harshith Desamsetti Department of Computer Science, Northern Illinois University, IL 60115, USA

DOI:

https://doi.org/10.18034/ajtp.v4i3.667

Keywords:

Cloud Computing, Security Issues, Privacy, Cloud Computing Model, Cloud Security

Abstract

ICT advancements have made cloud computing popular and successful. Cloud computing lets corporate users relocate and utilize the pay-as-you-go price model's scalability. However, outsourcing data and business applications to the Cloud or a third party creates security and privacy concerns, which are crucial to cloud adoption. Researchers and impacted organizations have offered several security measures to address security issues in the literature. Cloud computing security and privacy are extensively covered in the literature. Unfortunately, literature efforts lack flexibility in mitigating numerous threats without contradicting cloud security aims. The literature has also focused on security and privacy issues and has yet to give technical solutions. Research on technical remedies to security concerns has yet to explain their origins. This paper introduces security and privacy challenges that require adaptive solutions without compromising cloud security. This research evaluates the literature, including its adaptability to future threats and how cloud security conflicts have invalidated their models. The essay uses STRIDE to highlight cloud computing security issues from a user perspective. It also analyses literature-based inefficient solutions and recommends secure, adaptive cloud environments.

Downloads

Download data is not yet available.

References

Aithal, P. S., & Pai, V. T. (2016). Concept of Ideal Software and its Realization Scenarios. International Journal of Scientific Research and Modern Education (IJSRME), 1(1), 826-837. http://doi.org/10.5281/zenodo.160908

Čapek, J. (2012). Cloud Computing and Information Security. Scientific Papers of the University of Pardubice. Series D. Faculty of Economics and Administration, Pardibuce 24, 23-30.

Dekkati, S., & Thaduri, U. R. (2017). Innovative Method for the Prediction of Software Defects Based on Class Imbalance Datasets. Technology & Management Review, 2, 1–5. https://upright.pub/index.php/tmr/article/view/78

Desamsetti, H. (2016a). A Fused Homomorphic Encryption Technique to Increase Secure Data Storage in Cloud Based Systems. The International Journal of Science & Technoledge, 4(10), 151-155.

Desamsetti, H. (2016b). Issues with the Cloud Computing Technology. International Research Journal of Engineering and Technology (IRJET), 3(5), 321-323.

Fernandes, D. A. B., Soares, L. F. B., Gomes, J. V., Freire, M. M., Inácio, P. R. M. (2014). Security Issues in Cloud Environments: a Survey. International Journal of Information Security, 13(2), 113-170. http://doi.org/10.1007/s10207-013-0208-7 DOI: https://doi.org/10.1007/s10207-013-0208-7

Gutlapalli, S. S. (2016a). An Examination of Nanotechnology’s Role as an Integral Part of Electronics. ABC Research Alert, 4(3), 21–27. https://doi.org/10.18034/ra.v4i3.651 DOI: https://doi.org/10.18034/ra.v4i3.651

Gutlapalli, S. S. (2016b). Commercial Applications of Blockchain and Distributed Ledger Technology. Engineering International, 4(2), 89–94. https://doi.org/10.18034/ei.v4i2.653 DOI: https://doi.org/10.18034/ei.v4i2.653

Hatem, S. S., wafy, M. H., El-Khouly, M. M. (2014). Malware Detection in Cloud Computing. International Journal of Advanced Computer Science and Applications, 5(4), 187-192. http://doi.org/10.14569/IJACSA.2014.050427 DOI: https://doi.org/10.14569/IJACSA.2014.050427

Keegan, N., Ji, S-Y., Chaudhary, A., Concolato, C., Yu, B. (2016). A Survey of Cloud-Based Network Intrusion Detection Analysis. Human-centric Computing and Information Sciences, 6(1), 1-16. http://doi.org/10.1186/s13673-016-0076-z DOI: https://doi.org/10.1186/s13673-016-0076-z

Lal, K. (2015). How Does Cloud Infrastructure Work?. Asia Pacific Journal of Energy and Environment, 2(2), 61-64. https://doi.org/10.18034/apjee.v2i2.697 DOI: https://doi.org/10.18034/apjee.v2i2.697

Lal, K. (2016). Impact of Multi-Cloud Infrastructure on Business Organizations to Use Cloud Platforms to Fulfill Their Cloud Needs. American Journal of Trade and Policy, 3(3), 121–126. https://doi.org/10.18034/ajtp.v3i3.663 DOI: https://doi.org/10.18034/ajtp.v3i3.663

Lal, K., & Ballamudi, V. K. R. (2017). Unlock Data’s Full Potential with Segment: A Cloud Data Integration Approach. Technology & Management Review, 2(1), 6–12. https://upright.pub/index.php/tmr/article/view/80

Mandapuram, M. (2016). Applications of Blockchain and Distributed Ledger Technology (DLT) in Commercial Settings. Asian Accounting and Auditing Advancement, 7(1), 50–57. https://4ajournal.com/article/view/76

Mona, M. A., Sharma, P. (2014). Cloud Computing: a Collaborative Green Platform for the Knowledge Society. VINE: Very Informal Newsletter on Library Automation, 44(3), 357-374. http://doi.org/10.1108/VINE-07-2013-0038 DOI: https://doi.org/10.1108/VINE-07-2013-0038

Thaduri, U. R., Ballamudi, V. K. R., Dekkati, S., & Mandapuram, M. (2016). Making the Cloud Adoption Decisions: Gaining Advantages from Taking an Integrated Approach. International Journal of Reciprocal Symmetry and Theoretical Physics, 3, 11–16. https://upright.pub/index.php/ijrstp/article/view/77

William, U., Lee, U. (2016). A Fortress of Clouds: Copyright Law, the Computer Fraud, Abuse Act, and Cloud Computing. Southern Law Journal, 26(2), 191-232.

Downloads

Published

2017-12-31

Issue

Section

Policy and Practice Reviews

How to Cite

Ballamudi, V. K. R., & Desamsetti, H. (2017). Security and Privacy in Cloud Computing: Challenges and Opportunities. American Journal of Trade and Policy, 4(3), 129-136. https://doi.org/10.18034/ajtp.v4i3.667