Call for Paper

CAE solicits original research papers for the October 2019 Edition. Last date of manuscript submission is September 30, 2019.

Read More

Cloud Computing: An Overview of Data Security Issues

Ayokunle Omotunde, Faith Adekogbe, Onuiri Ernest, Precious Uchendu. Published in Information Sciences.

Communications on Applied Electronics
Year of Publication: 2016
Publisher: Foundation of Computer Science (FCS), NY, USA
Authors: Ayokunle Omotunde, Faith Adekogbe, Onuiri Ernest, Precious Uchendu
10.5120/cae2016652363

Ayokunle Omotunde, Faith Adekogbe, Onuiri Ernest and Precious Uchendu. Cloud Computing: An Overview of Data Security Issues. Communications on Applied Electronics 5(9):14-19, September 2016. BibTeX

@article{10.5120/cae2016652363,
	author = {Ayokunle Omotunde and Faith Adekogbe and Onuiri Ernest and Precious Uchendu},
	title = {Cloud Computing: An Overview of Data Security Issues},
	journal = {Communications on Applied Electronics},
	issue_date = {September 2016},
	volume = {5},
	number = {9},
	month = {Sep},
	year = {2016},
	issn = {2394-4714},
	pages = {14-19},
	numpages = {6},
	url = {http://www.caeaccess.org/archives/volume5/number9/648-2016652363},
	doi = {10.5120/cae2016652363},
	publisher = {Foundation of Computer Science (FCS), NY, USA},
	address = {New York, USA}
}

Abstract

Cloud computing can be explained as a technology that enables user access to computing services over a network, different technologies have been existing over the years bearing a canny resemblance to what is termed “Cloud Computing” today, and these technologies have helped to shape its functionalities. Security is a fundamental factor that affects each and every field of study of which cloud computing is not exempted. Delivering computing resources over a network usually the Internet, creates problems associated with protecting information from unauthorized and malicious persons. The implementation of the cloud for infrastructure provides facilities such as data storage, servers and operating systems, which could result in unauthorized access to important information on the cloud. This can lead to data manipulation, data loss and breach of privacy. This paper provides an insight into the field of cloud computing, with discussions on issues related to data security.

References

  1. Harjit, S. L., & Singh, G. (2011, July). Cloud Computing-Future Framework for e-management of NGO's. International Journal of Advancements in Technology, 2(3), 400-408.
  2. Petre, R.-Ş. (2012). Data mining in Cloud Computing. Database Systems Journal, 2(3), 67-72.
  3. Kumar, D. A., & Sukumar, M. (2013, November). Development of cloud computing in integrated library management and retrieval system. International Journal of Library and Information Science, 5(10), 394-400.
  4. Mell, P., & Grance, T. (2011). NIST Definition of Cloud Computing. Recommendations of the National Istitute of Standards and Technology NIST Special Publication 800-145.
  5. Armburst, M. e. (2009). Above the Clouds: A Berkeley View of Cloud Computing. University of California, Berkeley. Retrieved from http://www.eecs.berkeley.edu/Pubs/TechRpts/2009/EECS-2009-28.html
  6. Buyya, R., Yeoa, C. S., Venugopala, S., Broberg, J., & Brandic, I. (2009). Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the 5th utility. Future Generation Computer Systems, 599-616
  7. Srinivasa, R. V., Nageswara, R. N., & Kumari, K. (2009). Cloud Computing: An Overview. Journal of thoeritical and Applied Information Technology, 71-77.
  8. Borenstein, N., & Blake, J. (2011). Cloud Computing Standards: Where’s the Beef? IEEE Internet Computing, 15(3), 74-78.
  9. Ştefania, R. (2012). Datamining in Cloud Computing. Database Systems Journal, III(3).
  10. Foster, I., Zhao, Y., Raicu, I., & Lu, S. (2008). Cloud Computing and Grid Computing 360-Degree Compared. Texas: 2008 Grid Computing Environment Workshop (GCE ’08).
  11. Sarga, L. (2012). Cloud Computing. JOURNAL OF SYSTEMS INTEGRATION, 4, 3-15.
  12. Karlin, S., & Curran, K. (2012, June). Cloud Computing Technologies. International Journal of Cloud Computing and Services Science (IJ-CLOSER), 1(2), 59-65.
  13. Sultan, N. (2010). Cloud computing for education: A new dawn? International Journal of Information Management, 109-116.
  14. Padhy, R. P., Patra, M. R., & Satapathy, S. C. (2011, December). Cloud Computing: Security Issues and Research. International Journal of Computer Science and Information Technology & Security (IJCSITS), I(2), 136-145.
  15. Berry, R., & Reisman, M. (2012, May). Policy Challenges of Cross-Border Cloud Computing. Journal of International Commerce and Economics, 2-35.
  16. Kuyoro, S. O., Ibikunle, F., & Awodele, O. (2011). Cloud Computing Security Issues and Challenges. International Journal of Computer Networks (IJCN), 3(5), 247-255.
  17. Youssef, A. E. (2012, July). Exploring Cloud Computing Services and Applications. Journal of Emerging Trends in Computing and Information Sciences, 3(6), 838-848.
  18. Emam, A. (2013). Additional Authentication and Authorization using Registered Email-ID for Cloud Computing. International Journal of Soft Computing and Engineering, 3(2), 110-113.
  19. Kim, J., & Hong, S. (2012). A Consolidated Authentication Model in Cloud Computing Environments. International Journal of Multimedia and Ubiquitous Engineering, 151-160.
  20. Hashizume, K., Rosado, D. G., Fernández-Medina, E., & Fernandez, E. B. (2013). An analysis of security issues for cloud computing. Journal of Internet Services and Applications, 4(5). Retrieved from http://www.jisajournal.com/content/4/1/5
  21. KPMG. (2010). From hype to future: KPMG’s 2010 Cloud Computing survey. Retrieved from KPMG: http://www.techrepublic.com/whitepapers/from-hype-to-futurekpmgs-2010-cloud-computing-survey/2384291
  22. Hamlen, K., Kantarcioglu, M., Khan, L., & Thuraisingham, B. (2010, April-June). Security Issues for Cloud Computing. International Journal of Information Security and Privacy, 4(2), 39-51.
  23. Ahmed, M., & Hossain, M. A. (2014, January). Cloud Computing and Security Issues in the Cloud. International Journal of Network Security & Its Applications (IJNSA), 6(1), 25-37.
  24. Cloud Security Alliance. (2015, March). Cloud Security Alliance Announces Release of Security Framework for Governmental Clouds. Retrieved January 2016, from Cloud Security Alliance.
  25. Mosher, R. (2011, July). Cloud Computing Risks. Information Systems Security Association.
  26. R. Velumadhava Rao & K. Selvamani (2015). Data Security Challenges and Its Solutions in Cloud Computing. International Conference on Intelligent Computing, Communication & Convergence, 204-209
  27. Lee, K. (2012, October). Security Threats in Cloud Computing Environments1. International Journal of Security and Its Applications, 6(4).

Keywords

Technology, Security, Internet, Network, Infrastructure, Data Storage.