Open Access   Article Go Back

A Study on Data Security and Privacy Protection Issues in Cloud Computing

N. Chandramouli1 , B. Manjula2

  1. Dept of CSE, Vaageswari College of Engineering ,Karimnagar, India.
  2. Dept of Computer Science, Kakatiya University, Warangal, India.

Correspondence should be addressed to: cmnarsingoju@gmail.com.

Section:Survey Paper, Product Type: Journal Paper
Volume-5 , Issue-9 , Page no. 164-170, Sep-2017

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v5i9.164170

Online published on Sep 30, 2017

Copyright © N. Chandramouli, B. Manjula . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: N. Chandramouli, B. Manjula , “A Study on Data Security and Privacy Protection Issues in Cloud Computing,” International Journal of Computer Sciences and Engineering, Vol.5, Issue.9, pp.164-170, 2017.

MLA Style Citation: N. Chandramouli, B. Manjula "A Study on Data Security and Privacy Protection Issues in Cloud Computing." International Journal of Computer Sciences and Engineering 5.9 (2017): 164-170.

APA Style Citation: N. Chandramouli, B. Manjula , (2017). A Study on Data Security and Privacy Protection Issues in Cloud Computing. International Journal of Computer Sciences and Engineering, 5(9), 164-170.

BibTex Style Citation:
@article{Chandramouli_2017,
author = {N. Chandramouli, B. Manjula },
title = {A Study on Data Security and Privacy Protection Issues in Cloud Computing},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {9 2017},
volume = {5},
Issue = {9},
month = {9},
year = {2017},
issn = {2347-2693},
pages = {164-170},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=1449},
doi = {https://doi.org/10.26438/ijcse/v5i9.164170}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v5i9.164170}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=1449
TI - A Study on Data Security and Privacy Protection Issues in Cloud Computing
T2 - International Journal of Computer Sciences and Engineering
AU - N. Chandramouli, B. Manjula
PY - 2017
DA - 2017/09/30
PB - IJCSE, Indore, INDIA
SP - 164-170
IS - 9
VL - 5
SN - 2347-2693
ER -

VIEWS PDF XML
784 326 downloads 286 downloads
  
  
           

Abstract

Data security has a vital issue in cloud enlisting condition; it transforms into a noteworthy issue due to the data which is secured diversely completed the cloud. Data protection and security are the two essential parts of customer`s stress in cloud information innovation. Different techniques as for these points of view are grabbing thought over the cloud preparing conditions and are investigated in both endeavors and scholastics. Data protection and security protection are transforming into the most enormous points of view for the future update and headway of cloud figuring innovation in the field of business and government parts. Thusly, in this paper, the cloud figuring security techniques are reviewed and its troubles as for data protection are discussed. The rule purpose of this proposed work is to update the data protection and security for the trustworthy cloud condition. This close research examination of the ebb and flow cloud security approach as for the data protection and security techniques utilized as a part of the cloud enrolling. It will be significant to enhance the security of data stockpiling in a cloud space.

Key-Words / Index Term

Cloud Computing, Security Issues and challenges, Cloud Architecture, Data Privacy

References

[1]SwapnaLia Anil, Roshni Thanka, "A Survey on Security of Data outsourcing in Cloud", International Journal of Scientific and Research Publications, Vol. 3, Issue 2, 2013.
[2] Ramesh Prasad Vishwakarma, Sitendra Tamrakar, Rishi Kumar Sharma, "Data Security and Service Overloading in Cloud Computing –An overview", International Journal of Computer Sciences and Engineering, Vol.5, Issue.8, pp.177-180, 2017.
[3] Yunchuan Sun, Junsheng Zhang, Yongping Xiong, Guangyu Zhu, "Information Security and Privacy in Cloud Computing", International Journal of Distributed Sensor Networks Volume 2014, Article ID 190903, 9 pages, 2014
[4] Abhinay B.Angadi, Akshata B.Angadi, Karuna C.Gull, "Security Issues with Possible Solutions in Cloud Computing-A Survey",International Journal of Advanced Research in Computer Engineering and Technology (IJARCET), Vol.2, Issue 2, 2013.
[5] B.Tejaswi, L.V.Reddy, M.Leelavathi, "A Survey on Secure Storage Services in Cloud Computing", Global Journal of Computer Science and Technology Cloud and Distributed Volume 12 Issue, 0975-4172, 2012.
[6] Yinqian Zhang,Ari Juels, Michael K. Reiter, "CrossVM side channels and their utilization to remove private keys", ACM meeting on Computer and interchanges security,PP. 305-316,2012.
[7] BhruguSevak, "Security against Side Channel Attack in Cloud Computing", International Journal of Engineering and Advanced Technology (IJEAT), Vol-2, Issue-2, 2012.
[8] Aye Thu, "Incorporated Intrusion Detection and Prevention System with Honeypot on Cloud Computing Environment",International Journal of Computer Applications,Vol. 67– No.4, 2013.
[9] Vineet Chaturvedi, Ashok Verma and Neha Agarwal, "A Systematic Approach for Ensuring Security and Efficiency in Cloud Computing", International Journal of Scientific Research in Computer Science and Engineering, Vol.1, Issue.5, pp.16-20, 2013.
[10] Mitchell Cochran,Paul D. Witman, "Administration And Service Level Agreement Issues In A Cloud Computing Environment",Journal of Information Technology Management, Vol. XXII, Number 2, 2011.
[11] Vivek Raich, Pradeep Sharma, Shivlal Mewada and Makhan Kumbhkar, "Performance Improvement of Software as a Service and Platform as a Service in Cloud Computing Solution", International Journal of Scientific Research in Computer Science and Engineering, Vol.1, Issue.6, pp.13-16, 2013.
[12] Bijayalaxmi Purohit,PawanPrakash Singh, "Information spillage examination on cloud computing",International Journal of Engineering Research and Applications,Vol. 3, Issue 3, 2013.
[13] V. Shobana, M. Shanmugasundaram, "Information Leakage Detection Using Cloud Computing",International Journal of Emerging Technology and Advanced Engineering, Vol.3, Special Issue 1, 2013.
[14] Ramesh Prasad Vishwakarma, Sitendra Tamrakar, Rishi Kumar Sharma, "Data Security and Service Overloading in Cloud Computing –An overview", International Journal of Computer Sciences and Engineering, Vol.5, Issue.8, pp.177-180, 2017.
[15] Tomoyoshi Takebayashi, Hiroshi Tsuda, TakayukiHasebe, RyusukeMasuoka, "Information Loss Prevention Technologies", FUJITSU Sci. Tech, vol.46, No.1, PP 47-55, 2010.