Comprehensive Data Life Cycle Security in Cloud Computing: Current Mastery and Major Challenges

  • Conference paper
  • First Online:
New Technologies, Artificial Intelligence and Smart Data (INTIS 2022, INTIS 2023)

Abstract

One of the gravest concerns related to cloud computing pertains to data security. As businesses start on digital transformation, there is a clear requirement for privacy and data protection. Organizations today have more data, applications, and websites than they have ever had before. Data security has risen to the top of the priority list for cloud computing security. Although numerous solutions have been put forward, most of them exclusively target individual stages within the data life cycle, such as storage. This approach proves inadequate in effectively tackling the security challenges of cloud data, given that threats can arise at any phase of the data life cycle. Any security breach occurring during any stage of the data life cycle process has the potential to compromise overall data security. Hence, it becomes imperative to address data security across all phases of the data life cycle. This article’s primary contribution lies in introducing a novel viewpoint concerning data security solutions aligned with the data life cycle. This perspective holds significant importance and can serve as a road map for crafting a comprehensive security strategy. The article conducts an exhaustive review of the complete data life cycle and identifies a research gap comprising unresolved challenges that could potentially serve as research inquiries for our forthcoming endeavors.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
EUR 32.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or Ebook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (Canada)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 59.99
Price excludes VAT (Canada)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 79.99
Price excludes VAT (Canada)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free ship** worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Michelin, R.A., et al.: SpeedyChain: a framework for decoupling data from blockchain for smart cities. In: Proceedings of the 15th 750 EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services, pp. 145–154. ACM (2018)

    Google Scholar 

  2. Wang, H., Song, Y.: Secure cloud-based EHR system using attribute-based 595 cryptosystem and blockchain. J. Med. Syst. 42(8), 152 (2018)

    Article  MathSciNet  Google Scholar 

  3. Eltayieb, N., Elhabob, R., Hassan, A., Li, F.: A blockchain-based attribute-based signcryption scheme to secure data sharing in the cloud. J. Syst. Architect. 102, 101653 (2020)

    Article  Google Scholar 

  4. Gowri, M.K., Sowjanya, L., Durga, D.K.: Secure data sharing in cloud server using data revocation and identity based encryption. IEEE Trans. Cloud Comput. 6(4), 1136–1148 (2018)

    Article  Google Scholar 

  5. Zhou, Y., Deng, H., Wu, Q., Qin, B., Liu, J.: Identity-based Proxy ReEncryption Version 2: making mobile access easy in cloud. Future Gener. Comput. Syst. 62, 128–139 (2016)

    Article  Google Scholar 

  6. Shao, J., Wei, G., Ling, Y., **e, M.: Identity-based conditional proxy reencryption. In: Proceedings of 2011 IEEE International Conference on Communications (ICC 2011), pp. 1–5 (2011)

    Google Scholar 

  7. Liang, K., Chu, C., Tan, X., Wong, D., Tang, C., Zhou, J.: Chosen-ciphertext secure multi-hop identity-based conditional proxy re-encryption with constant-size ciphertexts. Theoret. Comput. Sci. 539, 87–105 (2014)

    Article  MathSciNet  MATH  Google Scholar 

  8. Liang, K., et al.: A secure and efficient ciphertext-policy attribute-based proxy re-encryption for cloud data sharing. Futur. Gener. Comput. Syst. 2015(52), 95–108 (2015)

    Article  Google Scholar 

  9. Rivest, R., Shamir, A., Wagner, D.: Time Lock Puzzles and Timed-release Crypto. Massachusetts Institute of Technology, MA, USA (1996)

    Google Scholar 

  10. Huang, Q., Yue, W., He, Y., Yang, Y.: Secure identity-based data sharing and profile matching for mobile healthcare social networks in cloud computing. IEEE Access 6, 36584–36594 (2018)

    Article  Google Scholar 

  11. Xu, P., Jiao, T., Wu, Q., Wang, W., **, H.: Conditional identity-based broadcast proxy re-encryption and its application to cloud email. IEEE Trans. Comput. 65(1), 66–79 (2016)

    Article  MathSciNet  MATH  Google Scholar 

  12. Liang, K., et al.: A secure and efficient ciphertext-policy attribute-based proxy re-encryption for cloud data sharing. Future Generat. Comput. Syst. 52, 95–108 (2015)

    Article  Google Scholar 

  13. Yang, Y., Zhu, H., Lu, H., Weng, J., Zhang, Y., Choo, K.: Cloud based data sharing with fine-grained proxy re-encryption. Pervasive Mob. Comput. 28, 122–134 (2016)

    Article  Google Scholar 

  14. Qiu, S., Liu, J., Shi, Y., Li, M., Wang, W.: Identity-based private matching over outsourced encrypted datasets. IEEE Trans. Cloud Comput. 6(3), 747–759 (2015). https://doi.org/10.1109/TCC.2015.2511723

    Article  Google Scholar 

  15. Ma, S.: Identity-based encryption with outsourced equality test in cloud computing. Inf. Sci. 328, 389–402 (2016)

    Article  MATH  Google Scholar 

  16. Wu, L., Zhang, Y., Choo, K., He, D.: Efficient and secure identity-based encryption scheme with equality test in cloud computing. Future Generat. Comput. Syst. 73, 22–31 (2017)

    Article  Google Scholar 

  17. Zhou, Y., Deng, H., Wu, Q., Qin, B., Liu, J., Ding, Y.: Identity-based proxy re-encryption version 2: making mobile access easy in cloud. Future Generat. Comput. Syst. 62, 128–139 (2016)

    Article  Google Scholar 

  18. Wang, W., Xu, P., Yang, L.T.: Secure data collection, storage and access in cloud-assisted IoT. IEEE Cloud Comput. 5(4), 77–88 (2018)

    Article  Google Scholar 

  19. Fu, J.S., Liu, Y., Chao, H.C., Bhargava, B.K., Zhang, Z.J.: Secure data storage and searching for industrial IoT by integrating fog computing and cloud computing. IEEE Trans. Industr. Inf. 14(10), 4519–4528 (2018)

    Article  Google Scholar 

  20. Liu, G., Dong, H., Yan, Z., Zhou, X., Shimizu, S.: B4SDC: a blockchain system for security data collection in MANETs. IEEE Trans. Big Data 8(3), 739–752 (2020)

    Article  Google Scholar 

  21. Tao, H., Bhuiyan, M.Z.A., Abdalla, A.N., Hassan, M.M., Zain, J.M., Hayajneh, T.: Secured data collection with hardware-based ciphers for IoT-based healthcare. IEEE Internet Things J. 6(1), 410–420 (2018)

    Article  Google Scholar 

  22. Zhang, P., Wang, S., Guo, K., Wang, J.: A secure data collection scheme based on compressive sensing in wireless sensor networks. Ad Hoc Netw. 70, 73–84 (2018)

    Article  Google Scholar 

  23. Yang, C., Chen, X., **ang, Y.: Blockchain-based publicly verifiable data deletion scheme for cloud storage. J. Netw. Comput. Appl. 103, 185–193 (2018)

    Article  Google Scholar 

  24. Yu, Y., Xue, L., Li, Y., Du, X., Guizani, M., Yang, B.: Assured data deletion with fine-grained access control for fog-based industrial applications. IEEE Trans. Industr. Inf. 14(10), 4538–4547 (2018)

    Article  Google Scholar 

  25. Yang, C., Liu, Y., Tao, X., Zhao, F.: Publicly verifiable and efficient fine-grained data deletion scheme in cloud computing. IEEE Access 8, 99393–99403 (2020)

    Article  Google Scholar 

  26. Hao, F., Clarke, D., Zorzo, A.F.: Deleting secret data with public verifiability. IEEE Trans. Dependable Secure Comput. 13(6), 617–29 (2015)

    Article  Google Scholar 

  27. Yang, C., Chen, Q., Liu, Y.: Fine-grained outsourced data deletion scheme in cloud computing. Int. J. Electron. Inf. Eng. 11(2), 81–98 (2019)

    Google Scholar 

  28. Xue, L., Yu, Y., Li, Y.N., Au, M.H., Du, X.J., Yang, B.: Efficient attribute-based encryption with attribute revocation for assured data deletion. Inf. Sci. 479, 640–650 (2019)

    Article  MATH  Google Scholar 

  29. IBM, Wrangling big data: fundamentals of data lifecycle management (2013)

    Google Scholar 

  30. Lin, L., Liu, T., Hu, J., Zhang, J.: A privacy-aware cloud service selection method toward data life-cycle. In: 2014 20th IEEE International Conference on Parallel and Distributed Systems (ICPADS), pp. 752–759. IEEE (2014)

    Google Scholar 

  31. Bouteiller, S.: Business data challenges. How to manage company data to create value? CIGREF (2014)

    Google Scholar 

  32. Ma, X., Fox, P., Rozell, E., West, P., Zednik, S.: Ontology dynamics in a data lifecycle: challenges and recommendations from a geoscience perspective. J. Earth Sci. 25(2), 407–412 (2014)

    Article  Google Scholar 

  33. Michota, A., Katsikas, S.: Designing a seamless privacy policy for social networks. In: Proceedings of the 19th Panhellenic Conference on Informatics, pp. 139–143. ACM (2015)

    Google Scholar 

  34. Chaki, S.: The lifecycle of enterprise information management. In: Enterprise Information Management in Practice, pp. 7–14. Springer, Cham (2015). https://doi.org/10.1007/978-1-4842-1218-9_2

    Chapter  Google Scholar 

  35. Khan, N., et al.: Big data: survey, technologies, opportunities, and challenges. Sci. World J. 2014, 18 (2014)

    Google Scholar 

  36. El Arass, M., Tikito, I., Souissi, N.: Data lifecycles analysis: towards intelligent cycle. In: 2017 Intelligent Systems and Computer Vision (ISCV), pp. 1–8. IEEE, April 2017

    Google Scholar 

  37. Reed, A., Rezek, C., Simmonds, P.: Security Guidance for Critical Area of Focus in Cloud Computing V3.0, Cloud Security Alliance (CSA), pp. 1–177 (2011)

    Google Scholar 

  38. Yu, X., Wen, Q.: A view about cloud data security from data life cycle. In: International Conference on Computational Intelligence and Software Engineering (CiSE), pp. 1–4 (2010)

    Google Scholar 

  39. Demchenko, Y., De Laat, C., Membrey, P.: Defining architecture components of the Big Data Ecosystem. In: International Conference on Collaboration Technologies and Systems (CTS), pp. 104–112 (2014)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Kenza Chaoui .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2024 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Chaoui, K., Kabachi, N., Harbi, N., Badir, H. (2024). Comprehensive Data Life Cycle Security in Cloud Computing: Current Mastery and Major Challenges. In: Tabaa, M., Badir, H., Bellatreche, L., Boulmakoul, A., Lbath, A., Monteiro, F. (eds) New Technologies, Artificial Intelligence and Smart Data. INTIS INTIS 2022 2023. Communications in Computer and Information Science, vol 1728. Springer, Cham. https://doi.org/10.1007/978-3-031-47366-1_15

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-47366-1_15

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-47365-4

  • Online ISBN: 978-3-031-47366-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics

Navigation