Data Security and Privacy-Preserving in Cloud Computing Paradigm: Survey and Open Issues

Data Security and Privacy-Preserving in Cloud Computing Paradigm: Survey and Open Issues

Abhineet Anand, Arvindhan Muthusamy
Copyright: © 2020 |Pages: 35
DOI: 10.4018/978-1-7998-1294-4.ch006
OnDemand:
(Individual Chapters)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

Cloud computing is a new technique that has been widely spread recently due to the services provided to users according to their need. Being a pay-for-what-you-use service, it provides a much-encapsulated set of services. Cloud computing acts as a main attraction for the business owners. Whether they are big or small, they can choose from the required services. Management of heavy flow data is very likely to be managed under this with the confidentiality and security of the data attached. Having all these features may attract everyone, but every technique always comes with some issues. The main aim of this survey chapter is to gain a better understanding of security issues that can occur in cloud computing.
Chapter Preview
Top

Introduction

Before coining of the system of cloud computing, there was centralized storage which used to contain all the data on the server side, in which if a client needed to acknowledge the data it has to establish a connection to the server side. After this centralized system, a distributed system came along where many systems which are connected together through the network can use shared resources.

Later, to overcome the disadvantages of both the system mentioned above cloud computing was introduced. Much before when the technology was not even up to mark to implement the cloud computing the idea was given by John McCarthy in 1961 at the speech at MIT. Hence, after some time the idea was able to be implemented by salesforce.com in 1999, as they provided some applications to the users using the internet through their website. In 2002, amazon web services provided the service of storage and computation to the users and started Elastic Compute Cloud in 2006 which was open to everybody and it was a truly commercial service. Google Apps started providing these services in 2009. After that many mainstream companies join the queue of providing different services using cloud computing as a platform. (Dong,et al., 2018) The main contributions of this article are summarized as follows:

  • 1.

    An itemized examination of elements for edge figuring is condensed from the comprehensive point of view. A exhaustively audit of edge registering definition what's more, engineering are introduced.

  • 2.

    The information security and protection necessities are outlined in light of five basic measurements, including the classification, accessibility, uprightness, verification and access control, and protection necessities.

Top

Cloud Computing Services

There are many ways in which cloud computing and services are defined. It consists of both the software and hardware components where software acts services provided to the user and hardware are the components connecting the server to the system to perform the services. Delivering various types of services like storage and access to data through the internet to the user instead of using hardware is the main motto of cloud. (Zhang, et.al 2018).

Computing. Due to the fast generation of data through the internet and the need for managing and access to data in a secure environment with other services are provided in cloud computing. According to NIST,the definition of cloud computing is “Cloud computing is a model for enabling a convenient, on-demand network access to a shared pool of configurable computing resources(e.g. networks, servers, storage, applications and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction. Table 1 shows the major services in Cloud Computing .

Grid Computing- It follows a distributed computing technique which proves very useful in following cloud computing services as resources are divided over the network and can be called when needed.

Utility Computing- It is the technique of cloud computing where one has to pay for the usage of the services when one needs to use other specific services rather than the basic ones.

Virtualization- This technique basically minimizes the use of hardware. It uses the server called virtual machine which helps in performing the tasks based over the virtualization that is collecting all the resources on different servers on one and performing the required tasks as and when needed.

Autonomic Computing- IBM coined this term in 2001, this is where the system itself takes the decision based on the statistics as required. (Li WenLI et.al.. 2015)

Main Characteristics of Cloud Computing Are

  • 1-On-demand self-service- Different services provided to the user based on their needs that is storage, services provided by the software.

  • 2-Broad network access- Many thick and thin clients can able to access the server equally and easily with a good speed.

  • 3-Resource pooling- Gathering of many computer resources at one place to make it useful for multiple users providing multitasking.

  • 4-Rapid elasticity- Availability of resources at any time as well as with same quality and quantity expanded as the user needed.

  • 5-Measured services- Quality of the resources are optimized based on the services and it does not affect the quality of the data.

Complete Chapter List

Search this Book:
Reset