Open Access   Article Go Back

A Study on Data Storage Security Issues in Cloud Computing

Nayana Bnasod1 , Pranjal Dhore2 , Nisha Balani3

Section:Review Paper, Product Type: Journal Paper
Volume-07 , Issue-12 , Page no. 71-74, May-2019

Online published on May 12, 2019

Copyright © Nayana Bnasod, Pranjal Dhore, Nisha Balani . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Nayana Bnasod, Pranjal Dhore, Nisha Balani, “A Study on Data Storage Security Issues in Cloud Computing,” International Journal of Computer Sciences and Engineering, Vol.07, Issue.12, pp.71-74, 2019.

MLA Style Citation: Nayana Bnasod, Pranjal Dhore, Nisha Balani "A Study on Data Storage Security Issues in Cloud Computing." International Journal of Computer Sciences and Engineering 07.12 (2019): 71-74.

APA Style Citation: Nayana Bnasod, Pranjal Dhore, Nisha Balani, (2019). A Study on Data Storage Security Issues in Cloud Computing. International Journal of Computer Sciences and Engineering, 07(12), 71-74.

BibTex Style Citation:
@article{Bnasod_2019,
author = {Nayana Bnasod, Pranjal Dhore, Nisha Balani},
title = {A Study on Data Storage Security Issues in Cloud Computing},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {5 2019},
volume = {07},
Issue = {12},
month = {5},
year = {2019},
issn = {2347-2693},
pages = {71-74},
url = {https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=1046},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=1046
TI - A Study on Data Storage Security Issues in Cloud Computing
T2 - International Journal of Computer Sciences and Engineering
AU - Nayana Bnasod, Pranjal Dhore, Nisha Balani
PY - 2019
DA - 2019/05/12
PB - IJCSE, Indore, INDIA
SP - 71-74
IS - 12
VL - 07
SN - 2347-2693
ER -

           

Abstract

Cloud computing , a remote service platform used to store information and execute applications. It lets you run services and data online by request via a simple internet connection. Cloud computing is a relatively new technology that will become more widespread. The adoption of this technology is not without its challenges and risks. With the cloud model, you lose control over physical security. In a public cloud, you are sharing computing resources with other companies. In a shared pool outside the enterprise, you don’t have any knowledge or control of where the resources run. Exposing your data in an environment shared with other companies could give the government “reasonable cause” to seize your assets because another company has violated the law. Simply because you share the environment in the cloud, may put your data at risk of seizure. Storage services provided by one cloud vendor may be incompatible with another vendor’s services should you decide to move from one to the other. Vendors are known for creating what the hosting world calls “sticky services”—services that an end user may have difficulty transporting from one cloud vendor to another (e.g., Amazon’s “Simple Storage Service” [S3] is incompatible with IBM’s Blue Cloud, or Google, or Dell). This study aims to review and classify the issues that surround the implementation of cloud computing which a hot area that needs to be addressed by future research.

Key-Words / Index Term

Cloud Computing, security issues in cloud computing

References

[1] V.S. Varnika, “ Cloud Computing Advantages and Challenges for Developing Nations”, International Journal of Scientific Research in Computer Science and Engineering Vol.6, Issue.3, pp.51-55 , June (2018)
[2] Ramona Carr, “Top Challenges in Cloud Security”, 2018
[3] Naresh vurukonda, B.Thirumala Rao, “A Study on Data Storage Security Issues in Cloud Computing”,2nd International Conference on Intelligent Computing, Communication & Convergence (ICCC-2016).
[4] Ilango Sriram, Ali Khajeh-Hosseini, “Research Agenda in Cloud Technologies”.
[5] John W. Rittinghouse and James F. Ransome, “Cloud Computing, Implementation, Management, and Security”, © 2010 by Taylor and Francis Group, LLC.
[6] Dr. Ramalingam Sugumar, K.Raja, “A Study on Enhancing Data Security in Cloud Computing Environment”, Dr. Ramalingam Sugumar et al, International Journal of Computer Science and Mobile Applications, Vol.6 Issue. 3, March- 2018, pg. 44-49.
[7] Prof. Syed Neha Samreen, Prof. Neha Khatri-Valmik, Prof. Supriya Madhukar Salve, Mr. Pathan Nouman Khan,“Introduction to Cloud Computing”, International Research Journal of Engineering and Technology (IRJET), Volume: 05 Issue: 02 | Feb-2018.
[8] Qusay Kanaan Kadhim , Robiah Yusof , Hamid Sadeq Mahdi, Sayed Samer Ali Al-shami , Siti Rahayu Selamat, “A Review Study on Cloud Computing Issues”, 1st International Conference on Big Data and Cloud Computing (ICoBiC) 2017 .
[9] Everaldo Aguiar, Yihua Zhang, and Marina Blanton,” An Overview of Issues and Recent Developments in Cloud Computing and Storage Security”.
[10] M.B. Jayalekshmi and S.H. Krishnaveni, “A Study of Data Storage Security Issues in Cloud Computing”, Indian Journal of Science and Techonology, Vol 8(24), DOI:10.17485/ijst/2015/v8i24/84229, September 2015.