Cloud Architectures Encountering Data Security and Privacy Concerns- A Survey

Authors

  • Shweta Singh Cloud Computing, architecture, PaaS, SaaS, IaaS, Cloud Computing, Cloud Attacks, Cloud Security

Keywords:

Research, Methodology, Research Methodology, Research Techniques, Qualitative research, Quantitative Research

Abstract

Emerging as one of the most relevant IT paradigms of recent times is cloud computing. The IT environment is increasingly being transformed by cloud computing. Cloud users may access resources, apps, including infrastructure from cloud providers on the pay-as-you-go basis. As an example, cloud providers may already have apps in place for their customers to utilise. As an example, the cloud service provider may provide the capacity to design and the deploy user apps. The Massive storage infrastructure is also accessible for such database and any user provided data. There are a slew of different cloud designs, and more are on the way. SaaS, PaaS, as well as IaaS are by far the most common, and they may be set up in private, public, communal, or a mix of these environments. It explores current cloud computing architectural advances and gives a review of numerous investigations undertaken inside
cloud computing industry to address various dangers inside its design, with specific reference towards multi-cloud architectures.

References

[1] Gartner, "Gartner identifies the top 10 strategic technologies for 2011", "web reference": http://www.gartner.com/it/page.jsp?id=1454221, "Last access date": 02 Dec. 2016.

[2] S. Subashini and V. Kavitha, "A survey on security issues in service delivery models of cloud computing", Journal of Network and Computer Applications, 34(1), 2011, pp 1-11.https://doi.org/10.1016/j.jnca.2010.07.006

[3] Hassan, Qusay (2011). "Demystifying Cloud computing" (PDF). The Journal of Defense Software Engineering. CrossTalk. 2011 (Jan/Feb): 16-21. Retrieved 11 December 2014.

[4] Peter Mell and Timothy Grance (September 2011). "The NIST definition of Cloud computing (technical report), National Institute of Standards and Technology: U.S. Department of Commerce. doi:10.6028/NIST.SP.800-145. Special publication 800-145. https://doi.org/10.6028/NIST.SP.800-145

[5] Hassan, Qusay (2011). "Demystifying Cloud computing" (PDF). The Journal of Defense Software Engineering. CrossTalk. 2011 (Jan/Feb): 16-21. Retrieved 11 December 2014.

[6] Harold C. Lin, Shivnath Babu, Jeffrey S. Chase, Sujay S. Parekh, "Automated control in Cloud computing: Opportunities and Challenges", Proc. of the 1st Workshop on Automated control for data centres and clouds, New York, NY, USA, pp. 13-18, 2009, ISBN: 978- 1-60558-585-7.

[7] William Y. Chang, Hosame Abu-Amara, Jessica Feng Sanford, Transforming Enterprise Cloud Services, London: Springer, 2010, pp. 55-56.

[8] E. Gorelik, "Cloud computing models," 2013.

[9] G. Somani, M. S. Gaur, D. Sanghi, M. Conti, and R. Buyya, "DDoS attacks in cloud computing: Issues, taxonomy, and future directions," Computer Communications, vol. 107, pp. 30-48, 2017. https://doi.org/10.1016/j.comcom.2017.03.010

[10] L. Alhenaki, A. Alwatban, B. Alamri, and N. Alarifi, "A Survey on the Security of Cloud Computing," in 2019 2nd International Conference on Computer Applications & Information Security (ICCAIS), 2019, pp. 1-7.

[11] P. Deshpande, S. Sharma, S. K. Peddoju, and A. Abraham, "Security and service assurance issues in Cloud environment," International Journal of System Assurance Engineering and Management, vol. 9, pp. 194- 207, 2018. https://doi.org/10.3917/presa.194.0207

[12] A. Singh and K. Chatterjee, "Cloud security issues and challenges: A survey," Journal of Network and Computer Applications, vol. 79, pp. 88-115, 2017. https://doi.org/10.1016/j.jnca.2016.11.027

[13] N. Almasalmeh, F. Saidi, and Z. Trabelsi, "A Dendritic Cell Algorithm Based Approach for Malicious TCP Port Scanning Detection," in 2019 15th International Wireless Communications & Mobile Computing Conference (IWCMC), 2019, pp. 877-882.

[14] R. Anitha, P. Pradeepan, P. Yogesh, and S. Mukherjee, "Data storage security in cloud using metadata," in 2nd International Conference on Machine Learning and Computer Science (IMLCS'2013), Kuala Lumpur (Malaysia), 2013, pp. 26-30.

[15] A. Mallik, A. Ahsan, M. Shahadat, and J. Tsou, "Man-in-the-middle-attack: Understanding in simple words," International Journal of Data and Network Science, vol. 3, pp. 77-92, 2019.

[16] V. S. P. P. C. Kumar and S. P. Rao, "Phishing attack detection," ed: Google Patents, 2019.

[17] F. Mohammed and D. Uliyan, "A New Password Authentication Scheme Resistant against Shoulder Surfing Attack," 技術學刊, vol. 34, 2019.

[18] S. Anwar, Z. Inayat, M. F. Zolkipli, J. M. Zain, A. Gani, N. B. Anuar, et al., "Cross-VM cachebased side channel attacks and proposed prevention mechanisms: A survey," Journal of Network and Computer Applications, vol. 93, pp. 259-279, 2017. https://doi.org/10.1016/j.jnca.2017.06.001

[19] P. Mishra, E. S. Pilli, V. Varadharajan, and U. Tupakula, "Intrusion detection techniques in cloud environment: A survey," Journal of Network and Computer Applications, vol. 77, pp. 18- 47, 2017.

[20] Y. Xia, Y. Liu, H. Chen, and B. Zang, "Defending against vm rollback attack," in IEEE/IFIP International Conference on Dependable Systems and Networks Workshops (DSN 2012), 2012, pp. 1-5

[21] M. Lillibridge, S. Elnikety, A. Birrell, M. Burrows, and M. Isard. "A cooperative Internet backup scheme", USENIX Annual Technical Conference, General Track 2003, pages 29-41, 2003.

[22] H. Shacham and B. Waters, "Compact proofs of retrievability," Advances in Cryptology- ASIACRYPT 2008, pp. 90-107, 2008. https://doi.org/10.1525/curh.2008.107.706.90

[23] Q. Wang, C. Wang, J. Li, K. Ren, and W. Lou, "Enabling public verifiability and data dynamics for storage security in Cloud computing," Computer Security-ESORICS 2009, pp. 355-370, 2009.

Downloads

Published

2022-01-06

How to Cite

[1]
Shweta Singh 2022. Cloud Architectures Encountering Data Security and Privacy Concerns- A Survey. AG Volumes. (Jan. 2022), 60–68.