Article Preview
TopIntroduction
Cloud computing has been envisioned as a new model in distributed system to allow large amount of resource access, distributed over large network and pooled as per scaled requirement. The National Institute of Standard & Technology (NIST) (Mell et al., 2011) explain cloud computing as a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources. This all can be achieved through the use of Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS). Users are able to acquire their required computing resources, services over Internet as per their need. Resource elasticity facilities, for computing resources are also supported by cloud. All these tasks are managed and controlled by Cloud Service Provider (CSP).
Nowadays, cloud computing concept is used by almost each and every application related to software services such as social networking (Gupta et al., 2018, Li et al., 2018), photo editing, image processing, word processing, online presentation etc. and also in combination with other techniques such as IoT (Stergiou et al., 2018), mobile computing (Raja et al., 2018) Big Data (Gupta et al., 2018), etc. Use of cloud computing allows the data owner to store their confidential and sensitive data over Internet and abolish the burden of its management and security. Afterwards, CSPs are totally responsible for data storage, management, distribution and security from any malicious attacker and its leakage. Today many organizations in banking, education and healthcare domain are utilizing the facility of cloud computing for storage of their sensitive data as well as access of the data by authorized users from anywhere across the globe at any time via the internet Many big, medium and small companies such as Google, Amazon, Yahoo, and Microsoft, etc., are also providing various kinds of cloud services to their users for fast, safe and easy access of data. They all have their own defined security policies and model. Gupta et al. (2016) defined security policies as a set of rules that provide the guidelines for behaviour of different entities that are related to an organization. Unfortunately, cloud technology will not always come alone, it compels various security issues related to owner’s data security. Broadly, these issues can be divided into data confidentiality, integrity and its access control.
Access control requires that only the authorized users who are fulfilling the access criteria, defined by the owner, can only get the required data. This feature is used to ensure that owner’s critical and sensitive data will not be disclosed to any unauthorized user. Integrity requirement arise to maintain a trust level between different communicating parties to ensure that the data has not been altered by sender. Integrity plays an important role between CSP and cloud user. User accesses their required data from CSP not from the owner. Here data integrity gives user a belief that received data is intact without any alteration. Integrity of data can be checked in two parts- i) signature generated by the owner and ii) data verification by receiver.