CFP last date
01 April 2024
Reseach Article

Cloud Computing: An Overview of Data Security Issues

by Ayokunle Omotunde, Faith Adekogbe, Onuiri Ernest, Precious Uchendu
Communications on Applied Electronics
Foundation of Computer Science (FCS), NY, USA
Volume 5 - Number 9
Year of Publication: 2016
Authors: Ayokunle Omotunde, Faith Adekogbe, Onuiri Ernest, Precious Uchendu
10.5120/cae2016652363

Ayokunle Omotunde, Faith Adekogbe, Onuiri Ernest, Precious Uchendu . Cloud Computing: An Overview of Data Security Issues. Communications on Applied Electronics. 5, 9 ( Sep 2016), 14-19. DOI=10.5120/cae2016652363

@article{ 10.5120/cae2016652363,
author = { Ayokunle Omotunde, Faith Adekogbe, Onuiri Ernest, Precious Uchendu },
title = { Cloud Computing: An Overview of Data Security Issues },
journal = { Communications on Applied Electronics },
issue_date = { Sep 2016 },
volume = { 5 },
number = { 9 },
month = { Sep },
year = { 2016 },
issn = { 2394-4714 },
pages = { 14-19 },
numpages = {9},
url = { https://www.caeaccess.org/archives/volume5/number9/648-2016652363/ },
doi = { 10.5120/cae2016652363 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2023-09-04T19:55:43.630616+05:30
%A Ayokunle Omotunde
%A Faith Adekogbe
%A Onuiri Ernest
%A Precious Uchendu
%T Cloud Computing: An Overview of Data Security Issues
%J Communications on Applied Electronics
%@ 2394-4714
%V 5
%N 9
%P 14-19
%D 2016
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Cloud computing can be explained as a technology that enables user access to computing services over a network, different technologies have been existing over the years bearing a canny resemblance to what is termed “Cloud Computing” today, and these technologies have helped to shape its functionalities. Security is a fundamental factor that affects each and every field of study of which cloud computing is not exempted. Delivering computing resources over a network usually the Internet, creates problems associated with protecting information from unauthorized and malicious persons. The implementation of the cloud for infrastructure provides facilities such as data storage, servers and operating systems, which could result in unauthorized access to important information on the cloud. This can lead to data manipulation, data loss and breach of privacy. This paper provides an insight into the field of cloud computing, with discussions on issues related to data security.

References
  1. Harjit, S. L., & Singh, G. (2011, July). Cloud Computing-Future Framework for e-management of NGO's. International Journal of Advancements in Technology, 2(3), 400-408.
  2. Petre, R.-Ş. (2012). Data mining in Cloud Computing. Database Systems Journal, 2(3), 67-72.
  3. Kumar, D. A., & Sukumar, M. (2013, November). Development of cloud computing in integrated library management and retrieval system. International Journal of Library and Information Science, 5(10), 394-400.
  4. Mell, P., & Grance, T. (2011). NIST Definition of Cloud Computing. Recommendations of the National Istitute of Standards and Technology NIST Special Publication 800-145.
  5. Armburst, M. e. (2009). Above the Clouds: A Berkeley View of Cloud Computing. University of California, Berkeley. Retrieved from http://www.eecs.berkeley.edu/Pubs/TechRpts/2009/EECS-2009-28.html
  6. Buyya, R., Yeoa, C. S., Venugopala, S., Broberg, J., & Brandic, I. (2009). Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the 5th utility. Future Generation Computer Systems, 599-616
  7. Srinivasa, R. V., Nageswara, R. N., & Kumari, K. (2009). Cloud Computing: An Overview. Journal of thoeritical and Applied Information Technology, 71-77.
  8. Borenstein, N., & Blake, J. (2011). Cloud Computing Standards: Where’s the Beef? IEEE Internet Computing, 15(3), 74-78.
  9. Ştefania, R. (2012). Datamining in Cloud Computing. Database Systems Journal, III(3).
  10. Foster, I., Zhao, Y., Raicu, I., & Lu, S. (2008). Cloud Computing and Grid Computing 360-Degree Compared. Texas: 2008 Grid Computing Environment Workshop (GCE ’08).
  11. Sarga, L. (2012). Cloud Computing. JOURNAL OF SYSTEMS INTEGRATION, 4, 3-15.
  12. Karlin, S., & Curran, K. (2012, June). Cloud Computing Technologies. International Journal of Cloud Computing and Services Science (IJ-CLOSER), 1(2), 59-65.
  13. Sultan, N. (2010). Cloud computing for education: A new dawn? International Journal of Information Management, 109-116.
  14. Padhy, R. P., Patra, M. R., & Satapathy, S. C. (2011, December). Cloud Computing: Security Issues and Research. International Journal of Computer Science and Information Technology & Security (IJCSITS), I(2), 136-145.
  15. Berry, R., & Reisman, M. (2012, May). Policy Challenges of Cross-Border Cloud Computing. Journal of International Commerce and Economics, 2-35.
  16. Kuyoro, S. O., Ibikunle, F., & Awodele, O. (2011). Cloud Computing Security Issues and Challenges. International Journal of Computer Networks (IJCN), 3(5), 247-255.
  17. Youssef, A. E. (2012, July). Exploring Cloud Computing Services and Applications. Journal of Emerging Trends in Computing and Information Sciences, 3(6), 838-848.
  18. Emam, A. (2013). Additional Authentication and Authorization using Registered Email-ID for Cloud Computing. International Journal of Soft Computing and Engineering, 3(2), 110-113.
  19. Kim, J., & Hong, S. (2012). A Consolidated Authentication Model in Cloud Computing Environments. International Journal of Multimedia and Ubiquitous Engineering, 151-160.
  20. Hashizume, K., Rosado, D. G., Fernández-Medina, E., & Fernandez, E. B. (2013). An analysis of security issues for cloud computing. Journal of Internet Services and Applications, 4(5). Retrieved from http://www.jisajournal.com/content/4/1/5
  21. KPMG. (2010). From hype to future: KPMG’s 2010 Cloud Computing survey. Retrieved from KPMG: http://www.techrepublic.com/whitepapers/from-hype-to-futurekpmgs-2010-cloud-computing-survey/2384291
  22. Hamlen, K., Kantarcioglu, M., Khan, L., & Thuraisingham, B. (2010, April-June). Security Issues for Cloud Computing. International Journal of Information Security and Privacy, 4(2), 39-51.
  23. Ahmed, M., & Hossain, M. A. (2014, January). Cloud Computing and Security Issues in the Cloud. International Journal of Network Security & Its Applications (IJNSA), 6(1), 25-37.
  24. Cloud Security Alliance. (2015, March). Cloud Security Alliance Announces Release of Security Framework for Governmental Clouds. Retrieved January 2016, from Cloud Security Alliance.
  25. Mosher, R. (2011, July). Cloud Computing Risks. Information Systems Security Association.
  26. R. Velumadhava Rao & K. Selvamani (2015). Data Security Challenges and Its Solutions in Cloud Computing. International Conference on Intelligent Computing, Communication & Convergence, 204-209
  27. Lee, K. (2012, October). Security Threats in Cloud Computing Environments1. International Journal of Security and Its Applications, 6(4).
Index Terms

Computer Science
Information Sciences

Keywords

Technology Security Internet Network Infrastructure Data Storage.