Navigating Privacy and Security in Cloud Computing


Year : 2024 | Volume : 11 | Issue : 02 | Page : 1-10
    By

    Shilpa Mahajan,

  1. Associate Professor, Department of Computer Science, The NorthCap University, Gurugram, Haryana, India

Abstract

Cloud computing has rapidly evolved, serving as a cornerstone for storage, information processing, and various applications. Its adoption has surged across enterprises and small businesses alike, offering them efficient means to store and process data. However, alongside its undeniable benefits, the cloud also presents inherent risks to privacy and security, as data traverses and resides on remote servers. Employing tactics such as data encryption, multifactor authentication, access control, and intrusion detection systems, cloud service providers can inspire trust in their customers, guaranteeing the security of their data and the reliability of the cloud service. Thus, it is utmost important to maintain security of data in cloud environment and to ensure privacy of the users as well. This study delves into the privacy and security challenges inherent in cloud computing and proposes viable solutions. Ensuring privacy and security in cloud computing is crucial in the current digital environment. By adopting a proactive approach and implementing robust security measures, both cloud service providers and users can mitigate risks and ensure that the cloud remains a secure and trusted platform for storing and processing data. It underscores the significance of encryption, multi-factor authentication (MFA), access controls, and intrusion detection systems (IDS) to fortify the safety of these sectors. Through the adoption of these tactics, cloud service providers can inspire trust in their customers, guaranteeing the security and reliability of the cloud service.

Keywords: Cloud computing, privacy and security, multi-factor authentication, information processing, cloud service, intrusion detection systems

[This article belongs to Recent Trends in Parallel Computing (rtpc)]

How to cite this article:
Shilpa Mahajan. Navigating Privacy and Security in Cloud Computing. Recent Trends in Parallel Computing. 2024; 11(02):1-10.
How to cite this URL:
Shilpa Mahajan. Navigating Privacy and Security in Cloud Computing. Recent Trends in Parallel Computing. 2024; 11(02):1-10. Available from: https://journals.stmjournals.com/rtpc/article=2024/view=152534


References

  1. Xiao Z, Xiao Y. Security and privacy in cloud computing. IEEE Commun Surv Tutor. 2012 Jul 12; 15(2): 843–59.
  2. Chen D, Zhao H. Data security and privacy protection issues in cloud computing. In 2012 IEEE international conference on computer science and electronics engineering. 2012 Mar 23; 1: 647–651.
  3. Sun Y, Zhang J, Xiong Y, Zhu G. Data security and privacy in cloud computing. Int J Distrib Sens Netw. 2014 Jul 16; 10(7): 190903.
  4. Zhou M, Zhang R, Xie W, Qian W, Zhou A. Security and privacy in cloud computing: A survey. In 2010 IEEE 6th international conference on semantics, knowledge and grids. 2010 Nov 1; 105–112.
  5. Sambangi S, Gondi L, Aljawarneh S. A feature similarity machine learning model for ddos attack detection in modern network environments for industry 4.0. Comput Electr Eng. 2022 May 1; 100: 107955.
  6. Bansal Y, Mahajan S. Network security breaches: Comprehension and its implications. In: Kaushik K, Bhardwaj A, editors. Perspectives on Ethical Hacking and Penetration Testing. PA, USA: IGI Global; 2023. p. 239–254. DOI: 10.4018/978-1-6684-8218-6.ch010.
  7. Mahajan S. Phishing uniform resource locator detection using machine learning: A step towards secure system. Secur Priv. 2023 Nov; 6(6): e311.
  8. Kshetri N. Privacy and security issues in cloud computing: The role of institutions and institutional evolution. Telecommun Policy. 2013 May 1; 37(4–5): 372–86.
  9. Abdulsalam YS, Hedabou M. Decentralized data integrity scheme for preserving privacy in cloud computing. In 2021 IEEE International Conference on Security, Pattern Analysis, and Cybernetics (SPAC). 2021 Jun 18; 607–612.
  10. 14Bajaj P, Arora R, Khurana M, Mahajan S. Cloud security: the future of data storage. In Cyber Security and Digital Forensics: Proceedings of ICCSDF 2021. Singapore: Springer; 2022; 87–98.
  11. Abdulsalam YS, Hedabou M. Security and privacy in cloud computing: technical review. Future Internet. 2021 Dec 27; 14(1): 11.
  12. Bamasoud DM, Al-Dossary AS, Al-Harthy NM, Al-Shomrany RA, Alghamdi GS, Algahmdi RO. Privacy and security issues in cloud computing: A survey paper. In 2021 IEEE international conference on information technology (ICIT). 2021 Jul 14; 387–392.
  13. Sahmim S, Gharsellaoui H. Privacy and security in internet-based computing: cloud computing, internet of things, cloud of things: a review. Procedia Comput Sci. 2017 Jan 1; 112: 1516–22.
  14. Sharma S, Mahajan S. Design and implementation of a security scheme for detecting system vulnerabilities. Int J Comput Netw Inf Secur. 2017 Oct 1; 11(10): 24–32.

Regular Issue Subscription Review Article
Volume 11
Issue 02
Received 15/04/2024
Accepted 03/05/2024
Published 29/06/2024


Loading citations…