semanticscholar.org
DOI:10.4236/CN.2014.61003
Corpus ID: 51987072
Data Security Issues and Challenges in Cloud Computing: A Conceptual Analysis and Review
Osama Harfoushi, Bader M. AlFawwaz, +3 authorsHossam Faris
Published 2014
Computer Science

Communications and Network
Cloud computing is a set of Information Technology services offered to users over the web on a rented base. Such services enable the organizations to scale-up or scale-down their in-house… Expand
View PDF
Share This Paper




31 Citations
Highly Influential Citations
2
Background Citations
14
Methods Citations
1
Figures and Topics from this paper
Figure 1
Figure 2
Figure 3
Cloud computing
Scalability
Data security
Computation (action)
Confidentiality
Virtual reality
High-level programming language
Foundations
Organization administrative structures
Radiology Information Systems
benefit
Deploy
Acceptance testing
Service-level agreement
HL7PublishingSubSection <operations>
31 Citations
The Perception of Information Security Threats Surrounding the Cloud Computing Environment
H. Fadhil
Computer Science
2018
TLDR
This paper brings out a systematic literature evaluation by spotting the light on cloud computing security necessities and it is worth mentioning that solutions for the provision of information security in cloud computing has been discussed in this research. Expand
A brief review: security issues in cloud computing and their solutions
I. Ahmed
Computer Science
2019
TLDR
In this review paper, various security issues regarding data privacy and reliability, key factors which are affecting cloud computing, have been addressed and also suggestions on particular areas have been discussed.Expand
10 Citations
PDF
Storage Architecture for Network Security in Cloud Computing
Qusay Kanaan Kadhim, Hamid Sadeq Mahdi, Haitham Ail
Computer Science
2018
TLDR
This study suggests that designing new construction for the security of information storage with variety functions where information encrypted and split into many cipher blocks and disseminated between a large number of services suppliers locations instead of merely relying on only one supplier for information storage. Expand
3 Citations
PDF
Analytics on real time security attacks in healthcare, retail and banking applications in the cloud
K. Padmaja, R. Seshadri
Computer Science
Evol. Intell.

2021
TLDR
Based on the analysis of the research performed in the area of security issues in the cloud it is evident that a detailed analysis on the same will throw light on root causes and vulnerabilities and open up different perspectives of cloud security issues.Expand
1 Citation
Causal Understanding of Limited Adoption of Cloud Computing by Customers
Neeta Sharma, Mayank Singh, Dr Anuranjan Misra
Computer Science
2015
TLDR
This paper has tried to investigate the reason for of limited adoption of Cloud Computing by the consumers and findings. Expand
Security and management framework for an organization operating in cloud environment
Nasir Raza, Imran Rashid, Fazeel Ali Awan
Engineering, Computer Science
Ann. des Télécommunications
2017
TLDR
The proposed framework is a set of guidelines that will adequately secure the organization’s data and applications and incorporates a layered security architecture to achieve utmost level of security for nullifying the impact of threats. Expand
5 Citations
Comprehensive Analysis of Security Mechanisms Within Cloud Computing
Sumanpreet Kaur, Malkit Singh
2018
In to Cloud computing is the most extreme normal part utilized system so as to reserve the information by the machines which does not have adequate capacity abilities. The cloud computing will be the… Expand
A Prototype for Data Integrity in Cloud Environment
Shashi Shashi, Suryakant Yadav, Anuranjan Mishra
Computer Science
EAI Endorsed Trans. Cloud Syst.
2020
TLDR
Integrity is a method for protecting the consistency of the put away data in cloud server and guaranteeing the innovation of the data put away in the cloud server, which implies that the data can be altered just by approved people, expanding the certification, confirmation and dependability of the cloud service providers. Expand
Security challenges in cloud
Sonal Shukla, Surrendra Yadav, Bhramdutt Bohra
Computer Science
2015 International Conference on Green Computing and Internet of Things (ICGCIoT)
2015
TLDR
SaaS, IaaS and PaaS are the services of the cloud, generally provided by the third party, thus it faces few security challenges and also the security architecture needed for the same. Expand
1 Citation
Fog computing: Common security issues and proposed countermeasures
Praveen Kumar, Nabeel Zaidi, T. Choudhury
Computer Science
2016 International Conference System Modeling & Advancement in Research Trends (SMART)
2016
TLDR
The threat to security issues, especially with location privacy and data confidentiality, and the way service providers as well as government can access users data are dealt with.Expand
38 Citations
...
1
2
3
4
...
References
SHOWING 1-10 OF 27 REFERENCES
Cloud computing security issues and challenges
S. Kuyoro, F. Ibikunle, O. Awodele
Computer Science
2011
TLDR
A detailed analysis of the cloud computing security issues and challenges focusing on the cloud Computing types and the service delivery types is introduced. Expand
235 Citations
A survey on security issues in service delivery models of cloud computing
S. Subashini, V. Kavitha
Computer ScienceJ. Netw. Comput. Appl.
2011
TLDR
A survey of the different security risks that pose a threat to the cloud is presented and a new model targeting at improving features of an existing model must not risk or threaten other important features of the current model. Expand
2,501 Citations
PDF
On Technical Security Issues in Cloud Computing
Meiko Jensen, Jörg Schwenk, Nils Gruschka, Luigi Lo Iacono
Computer Science
2009 IEEE International Conference on Cloud Computing
2009
TLDR
This paper focuses on technical security issues arising from the usage of Cloud services and especially by the underlying technologies used to build these cross-domain Internet-connected collaborations. Expand
780 Citations
PDF
Cloud Security Issues
Balachandra Reddy Kandukuri, V. RamakrishnaPaturi, A. Rakshit
Computer Science
2009 IEEE International Conference on Services Computing
2009
TLDR
Some security issues that have to be included in service level agreements (SLA) are put forward to help some of the enterprises to look forward in using the cloud services. Expand
728 Citations
Addressing cloud computing security issues
Dimitrios Zissis, D. Lekkas
Computer ScienceFuture Gener. Comput. Syst.
2012
TLDR
This paper proposes introducing a Trusted Third Party, tasked with assuring specific security characteristics within a cloud environment, and presents a horizontal level of service, available to all implicated entities, that realizes a security mesh, within which essential trust is maintained. Expand
The management of security in Cloud computing
S. Ramgovind, M. Eloff, E. Smith
Computer Science
2010 Information Security for South Africa
2010
TLDR
Gartner's list on cloud security issues, as well the findings from the International Data Corporation enterprise panel survey based on cloud threats, will be discussed in this paper.Expand
An Analysis of the Cloud Computing Security Problem
M. Almorsy, J. Grundy, Ingo Müller
Computer Science
APSEC 2010

2010
TLDR
A detailed analysis of the cloud security problem is introduced and key features that should be covered by any proposed security solution are derived.Expand
352 Citations
PDF
Cloud computing security: The scientific challenge, and a survey of solutions
M. Ryan
Computer Science
J. Syst. Softw.

2013
TLDR
A method in which in-browser key translation allows a software-as-a-service application to run with confidentiality from the service provider to survey approaches to protecting data from a cloud infrastructure provider.Expand
357 Citations
PDF
PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD COMPUTING
T. V. Sree, M. Phil
Computer Science
2015
TLDR
The public key based homomorphic authenticator is utilized and uniquely integrate it with random mask technique to achieve a privacy-preserving public auditing system for cloud data storage security while keeping all above requirements in mind.Expand
436 Citations
Let me in the cloud: analysis of the benefit and risk assessment of cloud platform
A. Aleem, Christopher Ryan Sprott
Business
2012
Purpose – The purpose of this paper is to critically examine the vulnerabilities of the cloud platform affecting businesses trading on the internet. It aims to examine the appropriateness of the… Expand
63 Citations
...
1
2
3
...
SORT BY
Related Papers
Challenges and Issues Within Cloud Computing Technology
Omar Ali, J. Soar
Computer Science
CLOUD

2014
Abstract-Cloud computing refers to an emerging computing model where machines in large data centres can be used to deliv...
13 Citations
Cloud security issues and challenges: A survey
A. Singh, Kakali Chatterjee
Computer ScienceJ. Netw. Comput. Appl.
2017
The cloud computing provides on demand services over the Internet with the help of a large amount of virtual storage. Th...
193 Citations
Show More
2/10
Abstract
Figures and Topics
31 Citations
27 References
Related Papers
Stay Connected With Semantic Scholar
What Is Semantic Scholar?
Semantic Scholar is a free, AI-powered research tool for scientific literature, based at the Allen Institute for AI.
Learn More
About
About Us
Publishers
Beta Program
Contact
Research
Team
Datasets
Open Corpus
Supp.ai
Resources
Librarians
Tutorials
FAQ
API
Proudly built by AI2
Terms of ServicePrivacy Policy
By clicking accept or continuing to use the site, you agree to the terms outlined in our Privacy Policy, Terms of Service, and Dataset License
ACCEPT & CONTINUE