Abstract
One of the gravest concerns related to cloud computing pertains to data security. As businesses start on digital transformation, there is a clear requirement for privacy and data protection. Organizations today have more data, applications, and websites than they have ever had before. Data security has risen to the top of the priority list for cloud computing security. Although numerous solutions have been put forward, most of them exclusively target individual stages within the data life cycle, such as storage. This approach proves inadequate in effectively tackling the security challenges of cloud data, given that threats can arise at any phase of the data life cycle. Any security breach occurring during any stage of the data life cycle process has the potential to compromise overall data security. Hence, it becomes imperative to address data security across all phases of the data life cycle. This article’s primary contribution lies in introducing a novel viewpoint concerning data security solutions aligned with the data life cycle. This perspective holds significant importance and can serve as a road map for crafting a comprehensive security strategy. The article conducts an exhaustive review of the complete data life cycle and identifies a research gap comprising unresolved challenges that could potentially serve as research inquiries for our forthcoming endeavors.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Michelin, R.A., et al.: SpeedyChain: a framework for decoupling data from blockchain for smart cities. In: Proceedings of the 15th 750 EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services, pp. 145–154. ACM (2018)
Wang, H., Song, Y.: Secure cloud-based EHR system using attribute-based 595 cryptosystem and blockchain. J. Med. Syst. 42(8), 152 (2018)
Eltayieb, N., Elhabob, R., Hassan, A., Li, F.: A blockchain-based attribute-based signcryption scheme to secure data sharing in the cloud. J. Syst. Architect. 102, 101653 (2020)
Gowri, M.K., Sowjanya, L., Durga, D.K.: Secure data sharing in cloud server using data revocation and identity based encryption. IEEE Trans. Cloud Comput. 6(4), 1136–1148 (2018)
Zhou, Y., Deng, H., Wu, Q., Qin, B., Liu, J.: Identity-based Proxy ReEncryption Version 2: making mobile access easy in cloud. Future Gener. Comput. Syst. 62, 128–139 (2016)
Shao, J., Wei, G., Ling, Y., **e, M.: Identity-based conditional proxy reencryption. In: Proceedings of 2011 IEEE International Conference on Communications (ICC 2011), pp. 1–5 (2011)
Liang, K., Chu, C., Tan, X., Wong, D., Tang, C., Zhou, J.: Chosen-ciphertext secure multi-hop identity-based conditional proxy re-encryption with constant-size ciphertexts. Theoret. Comput. Sci. 539, 87–105 (2014)
Liang, K., et al.: A secure and efficient ciphertext-policy attribute-based proxy re-encryption for cloud data sharing. Futur. Gener. Comput. Syst. 2015(52), 95–108 (2015)
Rivest, R., Shamir, A., Wagner, D.: Time Lock Puzzles and Timed-release Crypto. Massachusetts Institute of Technology, MA, USA (1996)
Huang, Q., Yue, W., He, Y., Yang, Y.: Secure identity-based data sharing and profile matching for mobile healthcare social networks in cloud computing. IEEE Access 6, 36584–36594 (2018)
Xu, P., Jiao, T., Wu, Q., Wang, W., **, H.: Conditional identity-based broadcast proxy re-encryption and its application to cloud email. IEEE Trans. Comput. 65(1), 66–79 (2016)
Liang, K., et al.: A secure and efficient ciphertext-policy attribute-based proxy re-encryption for cloud data sharing. Future Generat. Comput. Syst. 52, 95–108 (2015)
Yang, Y., Zhu, H., Lu, H., Weng, J., Zhang, Y., Choo, K.: Cloud based data sharing with fine-grained proxy re-encryption. Pervasive Mob. Comput. 28, 122–134 (2016)
Qiu, S., Liu, J., Shi, Y., Li, M., Wang, W.: Identity-based private matching over outsourced encrypted datasets. IEEE Trans. Cloud Comput. 6(3), 747–759 (2015). https://doi.org/10.1109/TCC.2015.2511723
Ma, S.: Identity-based encryption with outsourced equality test in cloud computing. Inf. Sci. 328, 389–402 (2016)
Wu, L., Zhang, Y., Choo, K., He, D.: Efficient and secure identity-based encryption scheme with equality test in cloud computing. Future Generat. Comput. Syst. 73, 22–31 (2017)
Zhou, Y., Deng, H., Wu, Q., Qin, B., Liu, J., Ding, Y.: Identity-based proxy re-encryption version 2: making mobile access easy in cloud. Future Generat. Comput. Syst. 62, 128–139 (2016)
Wang, W., Xu, P., Yang, L.T.: Secure data collection, storage and access in cloud-assisted IoT. IEEE Cloud Comput. 5(4), 77–88 (2018)
Fu, J.S., Liu, Y., Chao, H.C., Bhargava, B.K., Zhang, Z.J.: Secure data storage and searching for industrial IoT by integrating fog computing and cloud computing. IEEE Trans. Industr. Inf. 14(10), 4519–4528 (2018)
Liu, G., Dong, H., Yan, Z., Zhou, X., Shimizu, S.: B4SDC: a blockchain system for security data collection in MANETs. IEEE Trans. Big Data 8(3), 739–752 (2020)
Tao, H., Bhuiyan, M.Z.A., Abdalla, A.N., Hassan, M.M., Zain, J.M., Hayajneh, T.: Secured data collection with hardware-based ciphers for IoT-based healthcare. IEEE Internet Things J. 6(1), 410–420 (2018)
Zhang, P., Wang, S., Guo, K., Wang, J.: A secure data collection scheme based on compressive sensing in wireless sensor networks. Ad Hoc Netw. 70, 73–84 (2018)
Yang, C., Chen, X., **ang, Y.: Blockchain-based publicly verifiable data deletion scheme for cloud storage. J. Netw. Comput. Appl. 103, 185–193 (2018)
Yu, Y., Xue, L., Li, Y., Du, X., Guizani, M., Yang, B.: Assured data deletion with fine-grained access control for fog-based industrial applications. IEEE Trans. Industr. Inf. 14(10), 4538–4547 (2018)
Yang, C., Liu, Y., Tao, X., Zhao, F.: Publicly verifiable and efficient fine-grained data deletion scheme in cloud computing. IEEE Access 8, 99393–99403 (2020)
Hao, F., Clarke, D., Zorzo, A.F.: Deleting secret data with public verifiability. IEEE Trans. Dependable Secure Comput. 13(6), 617–29 (2015)
Yang, C., Chen, Q., Liu, Y.: Fine-grained outsourced data deletion scheme in cloud computing. Int. J. Electron. Inf. Eng. 11(2), 81–98 (2019)
Xue, L., Yu, Y., Li, Y.N., Au, M.H., Du, X.J., Yang, B.: Efficient attribute-based encryption with attribute revocation for assured data deletion. Inf. Sci. 479, 640–650 (2019)
IBM, Wrangling big data: fundamentals of data lifecycle management (2013)
Lin, L., Liu, T., Hu, J., Zhang, J.: A privacy-aware cloud service selection method toward data life-cycle. In: 2014 20th IEEE International Conference on Parallel and Distributed Systems (ICPADS), pp. 752–759. IEEE (2014)
Bouteiller, S.: Business data challenges. How to manage company data to create value? CIGREF (2014)
Ma, X., Fox, P., Rozell, E., West, P., Zednik, S.: Ontology dynamics in a data lifecycle: challenges and recommendations from a geoscience perspective. J. Earth Sci. 25(2), 407–412 (2014)
Michota, A., Katsikas, S.: Designing a seamless privacy policy for social networks. In: Proceedings of the 19th Panhellenic Conference on Informatics, pp. 139–143. ACM (2015)
Chaki, S.: The lifecycle of enterprise information management. In: Enterprise Information Management in Practice, pp. 7–14. Springer, Cham (2015). https://doi.org/10.1007/978-1-4842-1218-9_2
Khan, N., et al.: Big data: survey, technologies, opportunities, and challenges. Sci. World J. 2014, 18 (2014)
El Arass, M., Tikito, I., Souissi, N.: Data lifecycles analysis: towards intelligent cycle. In: 2017 Intelligent Systems and Computer Vision (ISCV), pp. 1–8. IEEE, April 2017
Reed, A., Rezek, C., Simmonds, P.: Security Guidance for Critical Area of Focus in Cloud Computing V3.0, Cloud Security Alliance (CSA), pp. 1–177 (2011)
Yu, X., Wen, Q.: A view about cloud data security from data life cycle. In: International Conference on Computational Intelligence and Software Engineering (CiSE), pp. 1–4 (2010)
Demchenko, Y., De Laat, C., Membrey, P.: Defining architecture components of the Big Data Ecosystem. In: International Conference on Collaboration Technologies and Systems (CTS), pp. 104–112 (2014)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2024 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Chaoui, K., Kabachi, N., Harbi, N., Badir, H. (2024). Comprehensive Data Life Cycle Security in Cloud Computing: Current Mastery and Major Challenges. In: Tabaa, M., Badir, H., Bellatreche, L., Boulmakoul, A., Lbath, A., Monteiro, F. (eds) New Technologies, Artificial Intelligence and Smart Data. INTIS INTIS 2022 2023. Communications in Computer and Information Science, vol 1728. Springer, Cham. https://doi.org/10.1007/978-3-031-47366-1_15
Download citation
DOI: https://doi.org/10.1007/978-3-031-47366-1_15
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-47365-4
Online ISBN: 978-3-031-47366-1
eBook Packages: Computer ScienceComputer Science (R0)