Data control in public cloud computing: Issues and challenges

被引:0
|
作者
Sharma A. [1 ]
Jha P. [2 ]
Singh S. [2 ]
机构
[1] Department of Computer Science and Engineering, Lovely Professional University, Phagwara, Jalandhar, Punjab
[2] School of Computer Application, Lovely Professional University, Jalandhar, Punjab
来源
Sharma, Ashok (drashoksharma@hotmail.co.in) | 1600年 / Bentham Science Publishers卷 / 14期
关键词
Cloud computing; Cloud security; Data control; Data privacy; Data security; Security challenges;
D O I
10.2174/2213275912666190617164550
中图分类号
学科分类号
摘要
Background: The Advancement in the Hardware and Progress in IoT based devices has led to significant transformation in digitalization and globalization of business models in the IT World. In fact Cloud Computing has attracted many companies to expand their business by providing IT infrastructure with very less budget in pay per use model. The Expansion and Migration of Companies to Cloud Computing facilities has really brought many pros and cons and opened new area of Research. The Management of IT infrastructure as per business requirement is a great challenge for the IT Infrastructure managers because of complex business models which needs to be updated with market trends and it requires huge and updated infrastructure to accelerate their business requirements. No doubt there are many benefits of moving to Cloud but several vulnerabilities and potential threats related to security is a major concern for any business sensitive data. These security challenges place restrictions on moving on-premises workloads to the Cloud. This paper has discussed key differences in cloud models and existing various Cloud Security Architectures and challenges in cloud computing related to Data Security at Rest and in Transit. Also data controlling mechanism need to be adopted by IT Industry along with end to end security mechanism has been explained. Objective: The main objective of this paper is to discuss about the prevailing issues in cloud in terms of data security which is discouraging the Industry and organizations to move their data into public cloud and also to discuss how to enhance security mechanism in cloud during data migration and multitenant environment. Methods: Based on different reports and analysis, it has been pointed that data breach and data security are most challenging and concerning factor for any customer when someone think to migrate the workloads from On-Premises datacenter to Cloud Computing. It needs more attention in every consideration. All criteria and considerations to secure and protect the customer’s information and data have been classified and discussed. Data-at-rest and Data-in-transit are transmission method for storing and moving the data from one source to destination. Different encryption methods for protecting and security data-at-rest and data-in-transit have been identity. However, there are still more areas need to work in for filling gaps for Cloud data control and security which is still a serious concern and on top of attackers every day. Results & Conclusion: Since, cyber-attacks occurring very frequently and causing a huge amount of invest-ment on re-establishing the environment, it needs more control with effective usages of technology. All those concerns related to security are very reasonable concerns that needs to be addressed. © 2021 Bentham Science Publishers.
引用
收藏
页码:564 / 579
页数:15
相关论文
共 50 条
  • [21] Challenges and Issues of Resource Allocation Techniques in Cloud Computing
    Abid, Adnan
    Manzoor, Muhammad Faraz
    Farooq, Muhammad Shoaib
    Farooq, Uzma
    Hussain, Muzammil
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2020, 14 (07): : 2815 - 2839
  • [22] A Survey on Resource Scheduling in Cloud Computing: Issues and Challenges
    Singh, Sukhpal
    Chana, Inderveer
    JOURNAL OF GRID COMPUTING, 2016, 14 (02) : 217 - 264
  • [23] A Survey on Resource Scheduling in Cloud Computing: Issues and Challenges
    Sukhpal Singh
    Inderveer Chana
    Journal of Grid Computing, 2016, 14 : 217 - 264
  • [24] Cloud Computing Security and Challenges: Issues, Threats, and Solutions
    Alrasheed, Sadeem Hamad
    Alhariri, Majid Aied
    Adubaykhi, Sulaiman Abdulaziz
    El Khediri, Salim
    2022 5TH CONFERENCE ON CLOUD AND INTERNET OF THINGS, CIOT, 2022, : 166 - 172
  • [25] Security Issues and Challenges in Cloud Computing: A Mirror Review
    Kumari, Chandini
    Singh, Gagandeep
    Singh, Gursharan
    Batth, Ranbir Singh
    PROCEEDINGS OF 2019 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND KNOWLEDGE ECONOMY (ICCIKE' 2019), 2019, : 702 - 707
  • [26] Cloud Computing Features, Issues and Challenges: A Big Picture
    Puthal, Deepak
    Sahoo, B. P. S.
    Mishra, Sambit
    Swain, Satyabrata
    2015 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND NETWORKS (CINE), 2015, : 116 - 123
  • [27] A Review on Mobile Cloud Computing Interoperability Issues and Challenges
    Debbarma, Tribid
    Chandrasekaran, K.
    INVENTIVE COMMUNICATION AND COMPUTATIONAL TECHNOLOGIES, ICICCT 2019, 2020, 89 : 325 - 333
  • [28] Mobile Cloud Computing Research - Issues, Challenges, and Needs
    Chang, Ruay-Shiung
    Gao, Jerry
    Gruhn, Volker
    He, Jingsha
    Roussos, George
    Tsai, Wei-Tek
    2013 IEEE SEVENTH INTERNATIONAL SYMPOSIUM ON SERVICE-ORIENTED SYSTEM ENGINEERING (SOSE 2013), 2013, : 442 - 453
  • [29] A Review on Different Security Issues and Challenges in Cloud Computing
    Narang, Ashima
    Gupta, Deepali
    2018 INTERNATIONAL CONFERENCE ON COMPUTING, POWER AND COMMUNICATION TECHNOLOGIES (GUCON), 2018, : 121 - 125
  • [30] Enterprise Usability of Cloud Computing Environments: Issues and Challenges
    Goyal, Pankaj
    19TH IEEE INTERNATIONAL WORKSHOPS ON ENABLING TECHNOLOGIES: INFRASTRUCTURE FOR COLLABORATIVE ENTERPRISES (WETICE 2010), 2010, : 54 - 59