Abstract
Cloud computing refers to computing services provided on demand to the user. The services can be servers, storage, databases, networking etc. These services are provided by the service providers whose duty is to ensure the availability of service on demand and protect the data the user has stored on the cloud. One of the major issue is data security in cloud computing because the data is present at different locations all over the globe. The techniques used by providers for data security ensures confidentiality, availability and integrity of data. But with an expansion in the cyber world there is an increase in cyber-attacks. Organizations face a lot of data breaches from clouds. The present study discusses the data security concept and techniques used by service providers and why there is a need to introduce new security techniques as the hackers are advancing with new techniques in stealing data from cloud servers.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
P. Srivastava, R. Khan, A review paper on cloud computing. Int. J. Adv. Res. Comput. Sci. Softw. Eng. (2018). https://doi.org/10.23956/ijarcsse.v8i6.711
D.G. Pradnya, B. Godhankar, Review of cloud storage security and cloud computing challenges. Int. J. Comput. Sci. Inf. Technol. 5 (2014)
S. Aldossary, W. Allen, Data security, privacy, availability and integrity in cloud computing: issues and current solutions. Int. J. Adv. Comput. Sci. Appl. (2016). https://doi.org/10.14569/ijacsa.2016.070464
S.K. Sood, A combined approach to ensure data security in cloud computing. J. Netw. Comput. Appl. (2012). https://doi.org/10.1016/j.jnca.2012.07.007
S.-E. M. Mohamed, E. Hatem S. Abdelkader, Enhanced data security model for cloud computing
B.S.K.V. Spoorthy, M. Mamatha, A survey on data storage and security in cloud computing. Int. J. Comput. Sci. Mob. Comput. 3(6), 306–313 (2014)
R. Piyare et al., Integrating Wireless Sensor Network into Cloud services for real-time data collection (2013). https://doi.org/10.1109/ICTC.2013.6675470.
L.M. Kaufman, Data security in the world of cloud computing. IEEE Secur. Priv. (2009). https://doi.org/10.1109/MSP.2009.87
G. W. Albugmi, Ahmed, Madini O. Alassafi, R. Walters, Data security in cloud computing
Y. Sun, J. Zhang, Y. **ong, G. Zhu, Data security and privacy in cloud computing. Int. J. Distrib. Sens. Netw. (2014). https://doi.org/10.1155/2014/190903
A.Z. Lynda Kacha, An overview on data security in cloud computing
V. Chang, M. Ramachandran, Towards achieving data security with the cloud computing adoption framework. IEEE Trans. Serv. Comput. (2016). https://doi.org/10.1109/TSC.2015.2491281
K. Hashizume, D.G. Rosado, E. Fernández-Medina, E.B. Fernandez, An analysis of security issues for cloud computing. J. Internet Serv. Appl. (2013). https://doi.org/10.1186/1869-0238-4-5
M.D.H.P.R. Sridaran, An analysis of security challenges in cloud computing. Int. J. Adv. Comput. Sci. Appl. 4 (2013)
K. Jakimoski, Security techniques for data protection in cloud computing. Int. J. Grid Distrib. Comput. 9 (2016)
Y. Tang, P.P.C. Lee, J.C.S. Lui, R. Perlman, Secure overlay cloud storage with access control and assured deletion. IEEE Trans. Dependable Secur. Comput. (2012). https://doi.org/10.1109/TDSC.2012.49
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Saraswat, P. (2022). Data Security Techniques in Cloud Computing. In: GarcÃa Márquez, F.P. (eds) International Conference on Intelligent Emerging Methods of Artificial Intelligence & Cloud Computing. IEMAICLOUD 2021. Smart Innovation, Systems and Technologies, vol 273. Springer, Cham. https://doi.org/10.1007/978-3-030-92905-3_34
Download citation
DOI: https://doi.org/10.1007/978-3-030-92905-3_34
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-92904-6
Online ISBN: 978-3-030-92905-3
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)