Survey on Security Issues of Data Storage in Cloud Computing

Mamatha R.*
Department of MCA, Dayananda Sagar College of Engineering, Bengaluru, Karnataka, India.
Periodicity:January - June'2021
DOI : https://doi.org/10.26634/jcc.8.1.18453

Abstract

Cloud computing has gained momentum and people are now migrating their data to the cloud as data is growing in size and requires access from a variety of devices. Therefore, Cloud-based data storage has become the standard. However, there are several concerns about data storage in the cloud, starting with virtual machines, which are used to share resources in the cloud, resulting in cloud storage issues. This study identifies cloud data storage concerns such as data storage, data backup, data privacy and integrity, data recoverability, and cloud data recycling. Finally, we provide possible cloud-based solutions to the above-mentioned issues.

Keywords

Cloud Computing, Data Privacy, Data Integrity, NIST, SecCloud, FADE, Cloud Data Recycling.

How to Cite this Article?

Mamatha, R. (2021). Survey on Security Issues of Data Storage in Cloud Computing. i-manager's Journal on Cloud Computing, 8(1), 23-34. https://doi.org/10.26634/jcc.8.1.18453

References

[1]. Ali, M., Khan, S. U., & Vasilakos, A. V. (2015). Security in cloud computing: Opportunities and challenges. Information Sciences, 305, 357-383. https://doi.org/10. 1016/j.ins.2015.01.025
[2]. CSA. (2011). Security guidelines for critical areas of focus in cloud computing v3.0. Retrieved from https://downloads.cloudsecurityalliance.org/assets/resear ch/security-guidance/csaguide.v3.0.pdf
[3]. Erl, T., Puttini, R., & Mahmood, Z. (2013). Cloud Computing: Concepts, Technology, & Architecture. Prentice Hall.
[4]. Fu, Y., & Lin, Z. (2013). Exterior: Using a dual-vm based external shell for guest-os introspection, configuration, and recovery. ACM Sigplan Notices, 48(7), 97-110. https://doi. org/10.1145/2517326.2451534
[5]. Islam, S., Ouedraogo, M., Kalloniatis, C., Mouratidis, H., & Gritzalis, S. (2015). Assurance of security and privacy requirements for cloud deployment models. IEEE Transactions on Cloud Computing, 6(2), 387-400. https://doi.org/10.1109/TCC.2015.2511719
[6]. Mollah, M. B., Azad, M. A. K., & Vasilakos, A. (2017). Security and privacy challenges in mobile cloud computing: Survey and way ahead. Journal of Network and Computer Applications, 84, 38-54. https://doi.org/10. 1016/j.jnca.2017.02.001
[7]. Pearce, M., Zeadally, S., & Hunt, R. (2013). Virtualization: Issues, security threats, and solutions. ACM Computing Surveys (CSUR), 45(2), 1-39. https://doi.org/10. 1145/2431211.2431216
[8]. Rong, C., Nguyen, S. T., & Jaatun, M. G. (2013). Beyond lightning: A survey on security challenges in cloud computing. Computers & Electrical Engineering, 39(1), 47- 54. https://doi.org/10.1016/j.compeleceng.2012.04.015
[9]. Takabi, H., Joshi, J. B., & Ahn, G. J. (2010). Security and privacy challenges in cloud computing environments. IEEE Security & Privacy, 8(6), 24-31. https://doi.org/10.1109/MSP. 2010.186
[10]. Tang, Y., Lee, P. P., Lui, J. C., & Perlman, R. (2012). Secure overlay cloud storage with access control and assured deletion. IEEE Transactions on Dependable and Secure Computing, 9(6), 903-916.
[11]. Vaquero, L. M., Rodero-Merino, L., & MorĂ¡n, D. (2011). Locking the sky: a survey on IaaS cloud security. Computing, 91(1), 93-118. https://doi.org/10.1007/ s00607-010-0140-x
[12]. Wei, L., Zhu, H., Cao, Z., Dong, X., Jia, W., Chen, Y., & Vasilakos, A. V. (2014). Security and privacy for storage and computation in cloud computing. Information sciences, 258, 371-386. https://doi.org/10.1016/j.ins.2013.04.028
[13]. Xiao, Z., & Xiao, Y. (2012). Security and privacy in cloud computing. IEEE Communications Surveys & Tutorials, 15(2), 843-859. https://doi.org/10.1109/SURV. 2012.060912.00182
[14]. Zhou, M., Zhang, R., Xie, W., Qian, W., & Zhou, A. (2010, November). Security and privacy in cloud computing: A survey. In 2010, 6th International Conference on Semantics, Knowledge and Grids (pp. 105-112). IEEE. https://doi.org/10.1109/SKG.2010.19
If you have access to this article please login to view the article or kindly login to purchase the article

Purchase Instant Access

Single Article

North Americas,UK,
Middle East,Europe
India Rest of world
USD EUR INR USD-ROW
Online 15 15

Options for accessing this content:
  • If you would like institutional access to this content, please recommend the title to your librarian.
    Library Recommendation Form
  • If you already have i-manager's user account: Login above and proceed to purchase the article.
  • New Users: Please register, then proceed to purchase the article.