Abstract
Cloud is being utilized by the majority of Internet users. Businesses storing their critical information in the cloud have increased over the ages due to simplistic and attractive features the cloud possesses. In spite of cloud utilization, there are concerns raised by users regarding cloud security. Hackers are using this opportunity to steal data stored in the cloud. In this regard, researchers have proposed techniques to provide security and privacy to the cloud. Some researchers focused on securing the cloud server, while others concentrated on securing the data transmitted to the cloud. In this research, a comparative analysis is done on papers that were published between 2013 and 2019. Based on the challenges identified in those techniques, a well-secured scheme is proposed to provide extensive security to data before it is transmitted to the cloud. The proposed technique is Data-Centric Security (DCS), and it utilizes Attribute-Based Encryption (ABE) as its framework. This scheme is at the implementation stage, and we believe it will come to address the security and privacy flaws observed.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Bodrul ABM, Mohammed Z, Anwar H (2017) A reliability-based resource allocation approach for cloud computing. In: 2017 IEEE 7th international symposium on cloud and service computing, pp 147, 249–252
Al-Said A, Andras P (2019) Scalability analysis comparisons of cloud-based software services. J Cloud Comput: Adv Syst Appl 8(10):1–17
Investopedia. www.investopedia.com/terms/c/cloud-computing.asp, Accessed 20 Nov 2019
Ahmed A et.al (2019) Experts reviews of a cloud forensic readiness framework for organizations. J Cloud Comput: Adv, Syst Appl 8(11):1–14
Gururaj R, Mohsin I, Farrukh AK (2017) A comprehensive survey on security in cloud computing. In: The 3rd international workshop on cyber security and digital investigation (CSDI 2017), vol 110, pp 465–472
Mahesh USC, Ambika VP (2015) Security and privacy in cloud computing: a survey. In: Proceedings of the 3rd international conference on frontiers of ıntelligent computing (FICTA), vol 2, pp 1–2
Giweli N, Shahrestani S, Cheung H (2013) Enhancing data privacy and access anonymity in cloud computing. Commun IBIMA 1–10
Saravana K, Raiva L, Balamurugan B (2014) Enhanced attribute based encryption for cloud computing. In: International conference on information and communication technologies (ICICT 2014), vol 2015, pp 689–696
Yang Y (2015) Attribute-based data retrieval with semantic keyword search for e-health cloud. J Cloud Comput: Adv Syst Appl 1–6
Hussein MK et al (2019) A placement architecture for a container as a service (CaaS) in a cloud environment. J Cloud Comput: Adv Syst Appl 8(7):1–15
Sarojini G, Vijayakumar A, Selvamani K (2016) Trusted and reputed services using enhanced mutual trusted and reputed access control algorithm in cloud. In: 2nd international conference on intelligent computing, communication and convergence (ICCC-2016), vol 92, pp 506–512
Songyang W, Yong Z (2016) Efficient verification of data possession in cloud computing. In: Conference of computational interdisciplinary sciences (CCIS 2016), pp 424–428
Yuh-Min T et.al (2016) Identity-based encryption with cloud revocation authority and its applications. IEEE Trans Cloud Comput 1–14
Victor C, Muthu R (2016) Towards achieving data security with the cloud computing adoption framework. IEEE Trans Serv Comput 9:138–151
Lalitha VP et.al (2017) Data security in cloud. In: International conference on energy, communications, data analytics and soft computing (ICECDS-2017), pp 3604–3608
Sosa R et al (2018) Offloading execution from edge to cloud: a dynamic node-RED based approach. In: 2018 IEEE international conference on cloud computing technology and science (CloudCom), pp 1–4
Sridhar S, Smys S (2016) A survey on cloud security issues and challenges with possible measures. In: International conference on inventive research in engineering and technology, vol 4
Yujiao S et al (2019) Efficient attribute-based encryption with privacy-preserving key generation and its application in industrial cloud. Hindawi Secur Commun Netw pp 1–10
El-Moursy AA et al (2019) Multi-dimensional regression host utilization algorithm (MDRHU) for host overload detection in cloud computing in: journal of cloud computing: advances. Syst Appl 8(8):1–17
Sengupta N, Chinnasamy R (2019) Contriving hybrid DESCAST algorithm for cloud security. In: Eleventh international multi-conference on information processing (IMCIP-2015). Procedia Comput Sci 54:47–56
Competing Interest
The authors declare that they have no conflict of interest.
Informed consent
Informed consent was obtained from all individual participants included in the study.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Dadzie, A.E., Kant, S. (2021). A Quick Survey of Security and Privacy Issues in Cloud and a Proposed Data-Centric Security Model for Data Security. In: Suma, V., Bouhmala, N., Wang, H. (eds) Evolutionary Computing and Mobile Sustainable Networks. Lecture Notes on Data Engineering and Communications Technologies, vol 53. Springer, Singapore. https://doi.org/10.1007/978-981-15-5258-8_41
Download citation
DOI: https://doi.org/10.1007/978-981-15-5258-8_41
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-15-5257-1
Online ISBN: 978-981-15-5258-8
eBook Packages: EngineeringEngineering (R0)