Part of the book series: Smart Innovation, Systems and Technologies ((SIST,volume 273))

  • 558 Accesses

Abstract

Cloud computing refers to computing services provided on demand to the user. The services can be servers, storage, databases, networking etc. These services are provided by the service providers whose duty is to ensure the availability of service on demand and protect the data the user has stored on the cloud. One of the major issue is data security in cloud computing because the data is present at different locations all over the globe. The techniques used by providers for data security ensures confidentiality, availability and integrity of data. But with an expansion in the cyber world there is an increase in cyber-attacks. Organizations face a lot of data breaches from clouds. The present study discusses the data security concept and techniques used by service providers and why there is a need to introduce new security techniques as the hackers are advancing with new techniques in stealing data from cloud servers.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
EUR 32.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or Ebook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
EUR 29.95
Price includes VAT (Germany)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
EUR 181.89
Price includes VAT (Germany)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
EUR 235.39
Price includes VAT (Germany)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free ship** worldwide - see info
Hardcover Book
EUR 235.39
Price includes VAT (Germany)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free ship** worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. P. Srivastava, R. Khan, A review paper on cloud computing. Int. J. Adv. Res. Comput. Sci. Softw. Eng. (2018). https://doi.org/10.23956/ijarcsse.v8i6.711

    Article  Google Scholar 

  2. D.G. Pradnya, B. Godhankar, Review of cloud storage security and cloud computing challenges. Int. J. Comput. Sci. Inf. Technol. 5 (2014)

    Google Scholar 

  3. S. Aldossary, W. Allen, Data security, privacy, availability and integrity in cloud computing: issues and current solutions. Int. J. Adv. Comput. Sci. Appl. (2016). https://doi.org/10.14569/ijacsa.2016.070464

    Article  Google Scholar 

  4. S.K. Sood, A combined approach to ensure data security in cloud computing. J. Netw. Comput. Appl. (2012). https://doi.org/10.1016/j.jnca.2012.07.007

    Article  Google Scholar 

  5. S.-E. M. Mohamed, E. Hatem S. Abdelkader, Enhanced data security model for cloud computing

    Google Scholar 

  6. B.S.K.V. Spoorthy, M. Mamatha, A survey on data storage and security in cloud computing. Int. J. Comput. Sci. Mob. Comput. 3(6), 306–313 (2014)

    Google Scholar 

  7. R. Piyare et al., Integrating Wireless Sensor Network into Cloud services for real-time data collection (2013). https://doi.org/10.1109/ICTC.2013.6675470.

  8. L.M. Kaufman, Data security in the world of cloud computing. IEEE Secur. Priv. (2009). https://doi.org/10.1109/MSP.2009.87

    Article  Google Scholar 

  9. G. W. Albugmi, Ahmed, Madini O. Alassafi, R. Walters, Data security in cloud computing

    Google Scholar 

  10. Y. Sun, J. Zhang, Y. **ong, G. Zhu, Data security and privacy in cloud computing. Int. J. Distrib. Sens. Netw. (2014). https://doi.org/10.1155/2014/190903

    Article  Google Scholar 

  11. A.Z. Lynda Kacha, An overview on data security in cloud computing

    Google Scholar 

  12. V. Chang, M. Ramachandran, Towards achieving data security with the cloud computing adoption framework. IEEE Trans. Serv. Comput. (2016). https://doi.org/10.1109/TSC.2015.2491281

    Article  Google Scholar 

  13. K. Hashizume, D.G. Rosado, E. Fernández-Medina, E.B. Fernandez, An analysis of security issues for cloud computing. J. Internet Serv. Appl. (2013). https://doi.org/10.1186/1869-0238-4-5

  14. M.D.H.P.R. Sridaran, An analysis of security challenges in cloud computing. Int. J. Adv. Comput. Sci. Appl. 4 (2013)

    Google Scholar 

  15. K. Jakimoski, Security techniques for data protection in cloud computing. Int. J. Grid Distrib. Comput. 9 (2016)

    Google Scholar 

  16. Y. Tang, P.P.C. Lee, J.C.S. Lui, R. Perlman, Secure overlay cloud storage with access control and assured deletion. IEEE Trans. Dependable Secur. Comput. (2012). https://doi.org/10.1109/TDSC.2012.49

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Saraswat, P. (2022). Data Security Techniques in Cloud Computing. In: García Márquez, F.P. (eds) International Conference on Intelligent Emerging Methods of Artificial Intelligence & Cloud Computing. IEMAICLOUD 2021. Smart Innovation, Systems and Technologies, vol 273. Springer, Cham. https://doi.org/10.1007/978-3-030-92905-3_34

Download citation

Publish with us

Policies and ethics

Navigation