A Critical Review of Data Security in Cloud Computing Infrastructure

International Journal of Advanced Studies of Scientific Research, Volume 3, Issue 9, 2018

6 Pages Posted: 29 Jan 2019

Rajesh Yadav

Mody university of science and technology, anand sharma.

Date Written: January 14, 2019

Cloud computing is a newly evolved technology for complex systems that allow on‐ demand, flexible, scalable, and low cost services with massive-scale services sharing among plentiful users. The wide receiver of the cloud computing idea has brought about significant effects in both fixed and mobile communication systems prompting frontline research to give fitting system protocols and network architecture, alongside resource administration/management components. In cloud computing, access control and security are two major problems. Therefore, Security of both services and users is a substantial issue for the uses and trust of the cloud computing. This paper audits recent works concentrating on security issues, solutions, and difficulties in cloud computing infrastructure.

Keywords: Cloud Computing, Cloud Security, Cloud Computing Infrastructure, User Authentication

Suggested Citation: Suggested Citation

Rajesh Yadav (Contact Author)

Lakshmangarh, Sikar 332311 India

Mody University of Science and Technology ( email )

Do you have a job opening that you would like to promote on ssrn, paper statistics, related ejournals, management of innovation ejournal.

Subscribe to this fee journal for more curated articles on this topic

Cybersecurity, Privacy, & Networks eJournal

Innovation law & policy ejournal.

  • DOI: 10.1109/ACCESS.2020.3009876
  • Corpus ID: 220835389

Data Security and Privacy Protection for Cloud Storage: A Survey

  • Pan Yang , N. Xiong , Jingli Ren
  • Published in IEEE Access 2020
  • Computer Science, Engineering, Law

Figures and Tables from this paper

figure 1

215 Citations

Improved security and privacy in cloud data security and privacy: measures and attacks, data privacy mechanisms development and performance evaluation for personal and ubiquitous blockchain-based storage, cost-efficient data privacy protection in multi cloud storage.

  • Highly Influenced

A Research Overview of Cloud Computing Data Transmission Security

Comprehensive review: security challenges and countermeasures for big data security in cloud computing, cryptographic approach for cloud data security, a novel data partitioning method for active privacy protection applied to medical records, efficient secured cloud storage system using dynamic multiple clouds cryptographic algorithm, fully homomorphic encryption for data security over cloud, data leakage, security, privacy issues and challenges in cloud computing services: a systematic survey, 118 references, efficient and secure big data storage system with leakage resilience in cloud computing, data security and privacy-preserving in edge computing paradigm: survey and open issues.

  • Highly Influential

Study on Data Security Policy Based on Cloud Storage

A secure iot cloud storage system with fine-grained access control and decryption key exposure resistance, efficient chameleon hashing-based privacy-preserving auditing in cloud storage, efficient attribute-based encryption with attribute revocation for assured data deletion, efficient id-based public auditing for the outsourced data in cloud storage, data security in mobile cloud computing paradigm: a survey, taxonomy and open research issues, secure data sharing in cloud computing using revocable-storage identity-based encryption, certificateless public auditing for data integrity in the cloud, related papers.

Showing 1 through 3 of 0 Related Papers

U.S. flag

An official website of the United States government

The .gov means it’s official. Federal government websites often end in .gov or .mil. Before sharing sensitive information, make sure you’re on a federal government site.

The site is secure. The https:// ensures that you are connecting to the official website and that any information you provide is encrypted and transmitted securely.

  • Publications
  • Account settings

Preview improvements coming to the PMC website in October 2024. Learn More or Try it out now .

  • Advanced Search
  • Journal List
  • Comput Intell Neurosci
  • v.2022; 2022

Logo of cin

This article has been retracted.

The rise of cloud computing: data protection, privacy, and open research challenges—a systematic literature review (slr), junaid hassan.

1 Department of Computer Science, National University of Computer and Emerging Sciences, Islamabad, Chiniot-Faisalabad Campus, Chiniot 35400, Pakistan

Danish Shehzad

2 Department of Computer Science, Superior University, Lahore 54000, Pakistan

Usman Habib

3 Faculty of Computer Sciences and Engineering, GIK Institute of Engineering Sciences and Technology, Topi, Swabi 23640, Khyber Pakhtunkhwa, Pakistan

Muhammad Umar Aftab

Muhammad ahmad, ramil kuleev.

4 Institute of Software Development and Engineering, Innopolis University, Innopolis 420500, Russia

Manuel Mazzara

Associated data.

The data used to support the findings of this study are provided in this article.

Cloud computing is a long-standing dream of computing as a utility, where users can store their data remotely in the cloud to enjoy on-demand services and high-quality applications from a shared pool of configurable computing resources. Thus, the privacy and security of data are of utmost importance to all of its users regardless of the nature of the data being stored. In cloud computing environments, it is especially critical because data is stored in various locations, even around the world, and users do not have any physical access to their sensitive data. Therefore, we need certain data protection techniques to protect the sensitive data that is outsourced over the cloud. In this paper, we conduct a systematic literature review (SLR) to illustrate all the data protection techniques that protect sensitive data outsourced over cloud storage. Therefore, the main objective of this research is to synthesize, classify, and identify important studies in the field of study. Accordingly, an evidence-based approach is used in this study. Preliminary results are based on answers to four research questions. Out of 493 research articles, 52 studies were selected. 52 papers use different data protection techniques, which can be divided into two main categories, namely noncryptographic techniques and cryptographic techniques. Noncryptographic techniques consist of data splitting, data anonymization, and steganographic techniques, whereas cryptographic techniques consist of encryption, searchable encryption, homomorphic encryption, and signcryption. In this work, we compare all of these techniques in terms of data protection accuracy, overhead, and operations on masked data. Finally, we discuss the future research challenges facing the implementation of these techniques.

1. Introduction

Recent advances have given rise to the popularity and success of cloud computing. It is a new computing and business model that provides on-demand storage and computing resources. The main objective of cloud computing is to gain financial benefits as cloud computing offers an effective way to reduce operational and capital costs. Cloud storage is a basic service of cloud computing architecture that allows users to store and share data over the internet. Some of the advantages of cloud storage are offsite backup, efficient and secure file access, unlimited data storage space, and low cost of use. Generally, cloud storage is divided into five categories: (1) private cloud storage, (2) personal cloud storage, (3) public cloud storage, (4) community cloud storage, and (5) hybrid cloud storage.

However, when we outsource data and business applications to a third party, security and privacy issues become a major concern [ 1 ]. Before outsourcing private data to the cloud, there is a need to protect private data by applying different data protection techniques, which we will discuss later in this SLR. After outsourcing the private data to the cloud, sometimes the user wants to perform certain operations on their data, such as secure search. Therefore, while performing such operations on private data, the data needs to be protected from intruders so that intruders cannot hack or steal their sensitive information.

Cloud computing has many advantages because of many other technical resources. For example, it has made it possible to store large amounts of data, perform computation on data, and many other various services. In addition, the cloud computing platform reduces the cost of services and also solves the problem of limited resources by sharing important resources among different users. Performance and resource reliability requires that the platform should be able to tackle the security threats [ 2 ]. In recent years, cloud computing has become one of the most important topics in security research. These pieces of research include software security, network security, and data storage security.

The National Institute of Standards and Technology (NIST) defines cloud computing as [ 3 ] “a model for easy access, ubiquitous, resource integration, and on-demand access that can be easily delivered through various types of service providers. The Pay as You Go (PAYG) mechanism is followed by cloud computing, in which users pay only for the services they use. The PAYG model gives users the ability to develop platforms, storage, and customize the software according to the needs of the end-user or client. These advantages are the reason that the research community has put so much effort into this modern concept [ 4 ].

Security is gained by achieving confidentiality, integrity, and data availability. Cloud users want assurance that their data must be saved while using cloud services. There are various types of attacks that launch on a user's private data, such as intrusion attacks, hacking, stealing the user's private data, and denial of service attacks. 57% of companies report security breaches using cloud services [ 5 ]. Data privacy is more important than data security because cloud service providers (CSPs) have full access to all cloud user's data and can monitor their activities, because of which the cloud user privacy is compromised. For example, a user is a diabetic, and the CSP is analyzing their activities, such as what he is searching for more and what kind of medicine he is using the most. Because of this access, CSP can get all the sensitive information about an individual user and can also share this information with a medicine company or an insurance company [ 6 ]. Another problem is that the user cannot fully trust CSP. Because of this reason, there are many legal issues. Users cannot store their sensitive data on unreliable cloud services because of this mistrust. As a result, many users cannot use cloud services to store their personal or sensitive data in the cloud. There are two ways to solve this problem. One is that the user installs a proxy on his side, and this proxy takes the user's data, encrypts and saves their data using some data protection techniques, and then sends it to the untrusted CSP [ 7 ].

The recent Google privacy policy is that any user can use any Google service free of cost; however, Google monitors their activity by monitoring their data to improve their services [ 8 ]. In this paper, we compare different types of data protection techniques that provide privacy and security over the data stored on the cloud. Many papers discuss outsourcing data storage on the cloud [ 9 , 10 ], however, we also discuss how we can secure the outsourced data on the cloud. Most of the paper describes the data security on the cloud vs the external intruder attacks [ 11 , 12 ]. This paper not only discusses the security attacks from outside intruders and securing mechanisms but also inner attacks from the CSP itself. Many surveys cover data privacy by applying cryptographic techniques [ 13 , 14 ]. These cryptographic techniques are very powerful for the protection of data and also provide a very significant result. However, there is a problem as these cryptographic techniques require key management, and some of the cloud functionalities are not working on these cryptographic techniques. In this paper, we also discuss some steganographic techniques. To the best of our knowledge, no study discusses all the conventional and nonconventional security techniques. Therefore, all the data protection techniques need to be combined in one paper.

The rest of this paper is organized as follows: Section 3 of the paper describes the research methodology that consists of inclusion, exclusion criteria, quality assessment criteria, study selection process, research questions, and data extraction process. Also, we discuss assumptions and requirements for data protection in the cloud. Section 4 presents all the cryptographic and also noncryptographic techniques that are used for data protection over the cloud. Also, we discuss the demographic characteristics of the relevant studies by considering the following four aspects: (i) publication trend, (ii) publication venues (proceeding and journals), (iii) number of citations, and (iv) author information. Section 4 also compares all these data protection techniques. Lastly, in Section 5 , we discuss results and present conclusion and future work.

2. Related Work

The first access control mechanism and data integrity in the provable data possession (PDP) model is proposed in the paper [ 15 ], and it provides two mobile applications based on the RSA algorithm. Like the PDP, the author in the paper [ 16 ] proposed a proof of retrievability (PoR) scheme that is used to ensure the integrity of remote data. PoR scheme efficiency is improved using a shorter authentication tag that is integrated with the PoR system [ 17 ]. A more flexible PDP scheme is proposed by the author of the paper [ 18 ] that uses symmetric key encryption techniques to support dynamic operations. A PDP protocol with some flexible functionality is developed, in which, we can add some blocks at run time [ 19 ]. A new PDP system with a different data structure is introduced, and it improves flexibility performance [ 20 ]. Similarly, another PDP model with a different data structure is designed to handle its data functionality [ 21 ]. To improve the accuracy of the data, the author of the paper [ 22 ] designed a multireplicas data verification scheme that fully supports dynamic data updates.

A unique data integration protocol [ 23 ] for multicloud servers is developed. The author of the paper [ 24 ] also considers the complex area where multiple copies are stored in multiple CSPs and builds a solid system to ensure the integrity of all copies at once. A proxy PDP scheme [ 25 ] is proposed, which supports the delegation of data checking that uses concessions to verify auditor consent. In addition, the restrictions of the verifier are removed that strengthened the scheme, and it proposes a separate PDP certification system [ 26 ]. To maintain the security of information, a concept for information security is proposed and a PDP protocol for public research is developed [ 27 ]. To resolve the certification management issue, the PDP system with data protection is introduced [ 28 ].

Identity-based cryptography is developed, in which a user's unique identity is used as input to generate a secret key [ 29 ]. Another PDP protocol is recommended to ensure confidentiality [ 30 ]. The author of the paper [ 31 ] proposed a scheme, in which tags are generated through the ring signature technique for group-based data sharing that supports public auditing and maintains user privacy. A new PDP system is introduced for data sharing over the cloud while maintaining user privacy [ 32 ]. Additionally, it supports the dynamic group system and allows users to exit or join the group at any time. Another PDP system [ 33 ] that is based on broadcast encryption and supports dynamic groups [ 34 ] is introduced. The issue of user revocation has been raised [ 35 ], and to address this issue, a PDP scheme has been proposed, which removes the user from the CSP using the proxy signature method. A PDP-based group data protocol was developed to track user privacy and identity [ 36 ]. A PDP system [ 37 ] is proposed for data sharing between multiple senders. The author of the paper [ 38 ] provides SEPDP systems while maintaining data protection. However, the author of the paper [ 39 ] proved that the scheme proposed in [ 38 ] is vulnerable to malicious counterfeiting by the CSP. A collision-resistant user revocable public auditing (CRUPA) system [ 40 ] is introduced for managing the data that is shared in groups. Another scheme [ 41 ] is introduced as a way to ensure the integrity of mobile data terminals in cloud computing.

To address the PKI issue, identity-based encryption [ 42 ] is designed to enhance the PDP protocol and maintain user privacy in a dynamic community. Before sharing user-sensitive data with third parties or researchers, data owners ensure that the privacy of user-sensitive data is protected. We can do this using data anonymization techniques [ 43 ]. In recent years, the research community has focused on the PPDP search area and developed several approaches for tabular data and SN [ 44 – 49 ]. There are two popular settings in PPDP: one is interactive, and the other is noninteractive [ 50 ]. The K-anonymity model [ 51 ] and its effects are most commonly used in the noninteractive setting of PPDP [ 52 – 56 ]. Differential privacy (DP) [ 57 ] and an interactive configuration of PPDP make extensive use of DP-based methods [ 58 – 60 ]. Meanwhile, several studies for a noninteractive setting reported a PD-dependent approach [ 61 ]. Researchers have expanded the concepts used to anonymize tabular data to protect the privacy of SN users [ 62 – 64 ].

Most images on the internet are in a compressed form. Hence, various studies design some techniques for AMBTC-compressed images. Data concealment has become an active research area. We can hide the data by adding confidential information to the cover image, and as a result, we get the stego image. There are two types of data hiding schemes: one is irreversible [ 65 – 68 ], and the other is a reversible data hiding scheme [ 69 – 71 ]. A cipher text designated for data collection can be re-encrypted as designated for another by a semitrusted proxy without decryption [ 72 ]. The first concrete construction of collusion-resistant unidirectional identity-based proxy re-encryption scheme, for both selective and adaptive identity, is proposed in the paper [ 73 ]. One of the data hiding schemes is the histogram shifting scheme [ 74 – 76 ], and it is the most widely used. A histogram-shifting data hiding scheme [ 77 ] that detects pixel histograms in the cover image is introduced. When big and diverse data are distributed everywhere, we cannot control the vicious attacks. Therefore, we need a cryptosystem to protect our data [ 78 – 80 ].

Some identity-based signature (IBS) schemes [ 81 – 84 ] are introduced that are based on bilinear pairing. However, the authentication schemes based on bilinear pairing over elliptic curve are more efficient and safer than traditional public key infrastructure [ 85 , 86 ]. The paper [ 87 ] proposed a preserving proxy re-encryption scheme for public cloud access control. A differential attack is performed on one-to-many order preserving encryption OPE by exploiting the differences of the ordered ciphertexts in [ 88 ]. Another scheme is proposed, which consists of a cancelable biometric template protection scheme that is based on the format-preserving encryption and Bloom filters [ 89 ]. Some of the researchers also use the concept of paring free identity-based signature schemes [ 90 – 93 ]. A lightweight proxy re-encryption scheme with certificate-based and incremental cryptography for fog-enabled e-healthcare is proposed in [ 94 ].

3. Research Methodology

The objective of this SLR is to evaluate, investigate, and identify the existing research in the context of data storage security in cloud computing to find and evaluate all the existing techniques. SLR is a fair and unbiased way of evaluating all the existing techniques. This way provides a complete and evidence-based search related to a specific topic. At this time, there is no SLR conducted on data storage security techniques that explains all the cryptographic and noncryptographic techniques. Hence, this SLR fulfills the gap by conducting itself. This SLR aims to provide a systematic method using the guidelines of an SLR provided by Kitchenham [ 95 ]. Furthermore, to increase the intensity of our evidence, we follow another study that is provided by [ 96 ]. Our SLR consists of three phases, namely planning, conducting, and reporting. By following these three phases, we conduct our SLR, as shown in Figure 1 .

An external file that holds a picture, illustration, etc.
Object name is CIN2022-8303504.001.jpg

Review procedure.

3.1. Research Questions

The primary research question of this systematic literature review is “What types of data protection techniques have been proposed in cloud computing?” This primary research question is further divided into four RQs. All these four questions are enlisted below.

  •   RQ1: what types of data protection techniques have been proposed in cloud computing?
  •   RQ2: what are the demographic characteristics of the relevant studies?
  •   RQ3: which data protection technique provides more data protection among all the techniques?
  •   RQ4: what are the primary findings, research challenges, and directions for future research in the field of data privacy in cloud computing?

3.2. Electronic Databases

Six electronic databases were selected to collect primary search articles. All these six electronic databases are well-reputed in the domain of cloud computing. Most of the relevant articles are taken from two electronic databases, namely IEEE and Elsevier. All the electronic databases that we use in this research process are given in Table 1 .

Databases sources.

Electronic databasesURL
IEEE xplore
Wiley
Springer link
ACM
Elsevier
Hindawi

3.3. Research Terms

First of all, the title base search is done on the different electronic databases, which are given in Table 1 . After that, most related studies/articles are taken. Search is done using the string (p1 OR p2. . . . . .OR pn.) AND (t1 OR t2. . . . . . OR tn.). This string/query is constructed using a population, intervention, control, and outcomes (PICO) structure that consists of population, intervention, and outcome. Database search queries are given in Table 2 .

  •   Population : “cloud computing”
  •   Intervention : “data security,” “data privacy,” “data integrity”
  •   Using the PICO structure, we construct a general query for the electronic database. Generic: ((“Document Title”: cloud∗) AND (“Document Title”: data AND (privacy OR protect∗ OR secure∗ OR integrity∗))).

Databases search query.

Database nameSearch query
IEEE xplore((“Document Title”: cloud∗) AND (“Document Title”: data AND (privacy OR protect∗ OR secure∗ OR integrity∗)))
Wiley“Cloud computing” in Title and “data AND (privacy OR protect∗ OR secure∗ OR integrity∗)” in Title
Springer link((“Document Title”: cloud∗) AND (“Document Title”: data AND (privacy OR protect∗ OR secure∗ OR integrity∗)))
ACMacmdlTitle:(+“cloud computing” +data privacy protect∗ secure∗ integrity∗)
Elsevier((Document Title: cloud computing∗) AND (Document Title: data AND (privacy OR protect∗ OR secure∗)))
Hindawi((“Document Title” cloud) AND (“Document Title” data AND (privacy OR protect OR secure OR integrity)))

3.4. Procedure of Study Selection

The procedure of study selection is described in Figure 2 . This procedure has three phases: the first one is exclusion based on the title, in which articles are excluded based on the title, and the relevant titles are included. The second is exclusion based on the abstract in which articles are excluded. By reading the abstract of the articles, the most relevant abstract is included, and the last one is exclusion based on a full text that also includes quality assessment criteria.

An external file that holds a picture, illustration, etc.
Object name is CIN2022-8303504.002.jpg

Study selection procedure.

3.5. Eligibility Control

In this phase, all the selected papers are fully readied, and relevant papers are selected to process our SLR further. Table 3 shows the final selected papers from each database based on inclusion and exclusion criteria. The related papers are selected based on inclusion and exclusion criteria, which are given in Table 4 .

Results from electronic databases.

IdentifierDatabaseInitial resultsAfter title screeningAfter abstract screeningAfter exclusion and inclusion
ED1IEEE9422233824
ED2ACM3371272800
ED3Elsevier78521711
ED4Springer45311809
ED5Wiley5345402
ED6Hindawi449301
ED7Others17153405

Inclusion and exclusion criteria.

Inclusion criteriaExclusion criteria
(a). Articles proposing data protection techniques in the context of cloud computing.(a). Articles other than the English language.
(b). Peer-reviewed articles only.(b). Articles that are not supported the research questions.
(c). Take the latest study if there are several papers with the same objectives.(c). Articles providing no validation of proposed techniques.
(d). Comparative studies that compare one or more data protection techniques in cloud computing.(d). Articles that do not clearly define findings and unbiased results.
(e). Journal papers with impact factors only.(e). Duplicate studies concerning title or content.
(f). Ranked conference papers only.(f). Editorials, short papers, posters, technical reports, patents, and reviews.

3.6. Inclusion and Exclusion Criteria

We can use the inclusion and exclusion criteria to define eligibility for basic study selection. We apply the inclusion and exclusion criteria to those studies that are selected after reading the abstract of the papers. The criteria for inclusion and exclusion are set out in Table 4. Table 4 outlines some of the conditions that we have applied to the articles. After applying the inclusion and exclusion criteria, we get relevant articles, which we finally added to our SLR. The search period is from 2010 to 2021, and most of the papers included in our SLR are from 2015 to onward.

We apply inclusion and exclusion criteria in the third phase of the study selection process, and we get 139 results. After that, we also apply quality criteria, and finally, we get 52 articles, which are included in this SLR. Most of the articles are taken from Elsevier and IEEE electronic databases. IEEE is the largest Venus for data storage security in cloud computing. The ratio of the selected articles from different electronic databases is shown in Figure 3 .

An external file that holds a picture, illustration, etc.
Object name is CIN2022-8303504.003.jpg

Percentage of selected studies.

3.7. Quality Assessment Criteria

Quality checking/assessment is done in the 3 rd phase of the study selection process. A scale of 0-1 is used for the quality assessment (QA) of the articles.

Poor-quality articles get 0 points on the scale, and good-quality articles get 1 point on the scale. The articles with 1 point on the scale are included in this SLR. Hence, by applying the quality checking/assessment criteria on all the articles, we finally get 52 articles. All the selected papers have validity and novelty for different data protection techniques, and also, we find the relevance of the articles in the quality assessment criteria, which ensures that all the articles are related to the SLR (data storage protection and privacy in cloud computing). The quality checking (QC) criteria are given in Table 5 .

Quality checking criteria.

QC1Are the goals and objectives of the paper described?
QC2Are there any concise and clear limitations and statements?
QC3Does the research design support state objectives?
QC4Is the proposed technique providing any validation?

3.8. Taxonomy of the Data Protection Techniques

In this section, all the data protection techniques are depicted in Figure 4 . All the data protection techniques are arranged and classified in their related categories. The purpose of the taxonomy is to give a presentational view of all the data protection techniques. The data protection techniques are mainly divided into two categories, namely (1) noncryptographic techniques and (2) cryptographic techniques.

An external file that holds a picture, illustration, etc.
Object name is CIN2022-8303504.004.jpg

Taxonomy of the data protection techniques.

4. Results and Discussions

Data protection on the cloud is done by developing a third-party proxy that is trusted by the user. The trusted proxy is not a physical entity. It is a logical entity that can be developed on the user end (like on the user's personal computer) or at that location on which the user can trust. Mostly, all the local proxies are used as an additional service or as an additional module (like browser plugins). To fulfill the objective of data protection by proxies, some requirements are needed to fulfill necessarily. The requirements are given below:

  • User privilege. There are several objectives of user privilege or user empowerment, however, the main objective is to increase the trust of the users in data protection proxies used by the cloud.
  • Transparency. Another important objective is that when users outsource their sensitive data to trusted proxies, their data should remain the same and should not be altered.
  • Cloud computing provides large computing power and cost saving resources. However, one concern is that if we increase data security, computation overhead should not increase. We want to minimize the computation overhead over the proxies.
  • Cloud functionalities preservation. Cloud functionalities preservation is the most important objective. The users encrypt their sensitive data on their personal computers by applying different encryption techniques to increase the protection of their data, however, by applying these different encryption techniques, they are not able to avail some of the cloud functionalities because of compatibility issues [ 97 ]. Hence, it is the main issue.

Figure 5 provides a data workflow for protecting sensitive data on the cloud using a local proxy. There are different types of the assumption that are made for data protection, and some of them are discussed below.

  • Curious CSPs, the most commonly used model in cloud computing, is given in the literature [ 98 ]. The cloud service provider honestly fulfills the responsibilities, i.e., they do not interfere in the user activities, and they only follow the stander protocols. The CSP is honest, however, sometimes, it is curious to analyze the users' queries and analyze their sensitive data, which is not good because it is against the protocol. Also, by this, the privacy of the user is compromised. Hence, we can avoid these things by applying some data protection techniques on the user end to protect the users' sensitive data from the CSPs.
  • In some cases, CSPs may collaborate with data protection proxies that are present on the users' sides to increase the level of trust between the users and CSPs because better trust can motivate more users to move to the cloud. This collaboration can be done if CSPs provide some services to the users with a stable interface for storing, searching, and computing their data.
  • A multicloud approach to cloud computing infrastructure has also been proposed to improve their performance. In this regard, multiple cloud computing services are provided in the same heterogeneous architecture [ 19 ]. A multicloud gives the user multiple different places to store their data at their desired location. There are several benefits to use a multicloud, e.g., it reduces reliance on a single CSP, which increases flexibility.

An external file that holds a picture, illustration, etc.
Object name is CIN2022-8303504.005.jpg

Data workflow on cloud using local proxy.

4.1. RQ1: What Type of Data Protection Techniques has Been Proposed in Cloud Computing?

In this session, we will discuss all the techniques for data storage security over the cloud. All these techniques are divided into two main categories, namely (i) cryptographic techniques and (ii) noncryptographic techniques. The local proxy uses different techniques to protect data that are stored on the cloud. Because of this reason, we cannot gain all the advantages of cloud services. Therefore, we analyze and compare all these techniques based on different criteria. These different criteria are as follows: (i) the data accuracy of all the techniques, (ii) the data protection level of all the techniques, (iii) all the functionalities these schemes allow on masked and unmasked data, and (iv) the overhead to encrypt and decrypt data over the cloud.

4.1.1. Noncryptographic Techniques

There are some noncryptographic techniques, and we discuss them in this paper as follows:

(1) Data Anonymization . Data anonymization is a data privacy technique used to protect a user's personal information. This technique hides the person's personal information by hiding the person's identifier or attributes that could reveal a person's identity. Data anonymization can be done by applying various mechanisms, for example, by removing or hiding identifiers or attributes. It can also be done by encrypting the user's personal information. The main purpose of performing data anonymization is that we can hide the identity of the person in any way. Data anonymity can be defined as the user's personal data being altered in such a way that we cannot directly or indirectly identify that person, and the CSP cannot retrieve any person's personal information. Data anonymization techniques have been developed in the field of statistical control disclosure. These techniques are most often used when we want to outsource sensitive data for testing purposes. Data anonymization is graphically represented in Figure 6 .

An external file that holds a picture, illustration, etc.
Object name is CIN2022-8303504.006.jpg

Data anonymization flow diagram.

Data anonymization techniques are most often used when we want to outsource sensitive data for testing purposes. For example, if some doctors want to diagnose certain diseases, some details of these diseases are required for this purpose. This information is obtained from the patients that suffer from these diseases, but it is illegal to share or disclose anyone's personal information. However, for this purpose, we use data anonymization technique to hide or conceal the person's personal information before outsourcing the data. In some cases, however, the CSP wants to analyze the user's masked data. In the data anonymization technique, attributes are the most important part. Attributes can include name, age, gender, address, salary, etc. Table 6 shows the identifiers classification.

Identifiers classification.

IdentifierCategoricalNumerical
Name×
Age×
Gender×
Address×
Zip-code×
Designation×
Salary information×
Diseases×

Data anonymization can be performed horizontally or vertically on this table and also on the record or group of records. The attributes are further classified into the following categories.

  • Sensitive Attributes: sensitive attributes possess sensitive information of the person, such as salary, disease information, phone number, etc. These attributes are strongly protected by applying some protection techniques.
  • Nonsensitive Attributes: these types of attributes do not belong to any type of category. Hence, they do not disclose the identity of a person.
  • Identifiers: identifier belongs to the identity of a person, such as Id card, name, social security number, etc. Because of the presence of these identifiers, the relationship between different attributes can be detected. Hence, these identifiers must be replaced or anonymized.
  • Quasi-Identifiers: quasi-identifiers are the group of identifiers that are available publicly, such as zip-code, designation, gender, etc. Separately, these identifiers cannot reveal the personal identity, however, by combining them, they may reveal the identity of the person. Hence, we want to separate these quasi-identifiers to avoid the discloser.

There are two main categories of data masking: (1) perturbative masking and (2) nonperturbative masking.

  • (1) Perturbative Masking
  • In perturbation, masking data is altered or masked with dummy datasets. Original data is replaced with dummy data, however, this data looks like the original data with some noise addition. The statistical properties of the original data are present in the masked data, however, nonperturbative masking does not contain the statistical properties of original data, because in perturbation masking, data is altered or masked with physically same but dummy data.
  • Data swapping
  • In data swapping, the data is randomly changed with the same but dummy data between different records [ 99 ]. However, if the numerical values are present in the dataset, then in certain limits, the values can be changed. Otherwise, the meaning of the data is changed. The masked data cannot look like the original data. For those attributes that can be ranked, the attribute is replaced with the nearby ranked attributes, and a very large difference between ranks is not suitable [ 100 ]. In data swapping, higher-level attributes are swapped [ 101 ] and individual values are not changed.
  • Noise Addition
  • In this mechanism, some noise is added to the original dataset to alter the original data. Noise is only added to the data that is continuous and divided into categories [ 102 ]. The noise is added into all the attributes that are present in the original dataset, such as sensitive attributes and also quasi-attributes.
  • Microaggregation
  • In this technique, all the relevant data is stored into different groups, and these different groups release average values from each record [ 103 ]. If a large number of similar records is present in different groups, then more data utility is done. We can cluster the data in many ways, e.g., in categorical versions [ 104 ]. Microaggregation is done on a quasi-attribute to protect these attributes from reidentification, and the quasi-attributes protect all the other attributes from reidentification. We can also minimize reidentification by data clustering [ 105 ].
  • Pseudonymization
  • In this method, the original data is replaced with artificial datasets [ 106 ]. In this technique, each attribute present in the original data is a pseudonym, and by doing this, data is less identifiable.
  • (2) Nonperturbative Masking
  • Nonperturbative masking does not change or alter the original data, however, it changes the statistical properties of the original data. Mask data is created by the reduction of the original data or suppressions of the original data [ 107 ].
  • Bucketization
  • In this method, original data is stored in different buckets, and these buckets are protected through encryption [ 108 ]. We can protect the sensitive attributes through bucketization.
  • Data slicing is a method in which a larger group of data is divided into smaller slices or segments [ 109 ]. Hence, we can slice the data, and in this way, the sensitive attribute and the quasi-attributes are divided into different slices. By identifying the individual slice, the identity of the person cannot be disclosed.
  • Sampling is a technique in which the population and sample concept is present. The entire data is called population, and the masked data is called a sample. In this technique, we make different samples of the original data. A smaller data sample provides more protection [ 110 ].
  • Generalization
  • It is a technique in which some additional attributes are added to the record. If the number of quasi-attributes is less rare, then some dummy attributes are added into the record, which look like the quasi-attributes. Hence, by doing this, reidentification becomes more difficult [ 111 ]. By applying generalization on data, we can protect the identity of a person because it hides the relationship between the quasi-attributes.

The summary of data anonymization techniques is given in Table 7 .

The summary of data anonymization techniques.

MethodReferencesOperations supportedUsabilityPrivacy
Swapping[ – ]Research and application testingApplicable for any type of attributes
Noise addition[ ]Research and application testingUsed for the numerical data setDifferential privacy
Microaggregation[ – ]Research and application testingUsed for categorical attributes and numerical data sets -Anonymity. -Diversity. -Closeness
Pseudonymization[ ]Research and application testingUsed for the numerical data set
Bucketization[ ]Research and application testingUsed for categorical attributes and numerical data setsSegmentation
Slicing[ ]Research and application testingUsed for categorical attributesClustering
Sampling[ ]Research and application testingLarge utility loss
Generalization[ ]Research and application testingGranularity and utility loss -Anonymity. -Diversity. -Closeness

(2) Data Splitting . Data splitting is a technique in which sensitive data is divided into different fragments [ 112 ] to protect it from unauthorized access. In this technique, we first split the data into different fragments, then these fragments are randomly stored on different clouds. Even if the intruder gains access to a single fragment in any way, still the intruder will not be able to identify the person. For example, if an intruder gets a fragment from the cloud that contains the salary information of an organization, it is useless until he knows which salary belongs to which person. Hence, data splitting is a very useful technique for protecting data stored on the cloud.

Local proxies outsource data to the cloud without splitting the data, and they can also split the data first and then outsource to the same cloud using different accounts in the same CSP. It can also store data on different cloud platforms that run through different CSPs but provide some of the same services. Data is split before storing in different locations because even if some part or piece of data is known to an intruder, they will not be able to identify anyone.

Firstly, the local proxy retrieves sensitive data from the user and then calculates the risk factor for disclosure. In this method, the user can define the privacy level, and this privacy level provides information about all the sensitive attributes that can reveal someone's identity. These sensitive attributes are called quasi-attributes or quasi-identifiers. Next, the local proxy decides the number of pieces into which the sensitive data will be split and the number of locations that will be needed to store those pieces. Therefore, no one can reveal a person's identity, and all this information about the data splitting mechanism is stored at the local proxy. However, the system must be able to function properly and respond to the queries on time. After that, the local proxy stores these different data fragments in different cloud databases, and now, they are free from disclosure. The data-splitting mechanism supports almost all the functions of the cloud. Hence, we can use almost all the services provided by CSP using the data-splitting mechanism for storing data in the cloud.

When the users want to retrieve the original data, they process a query on a local proxy. The query is processed, and the data storage locations are retrieved from the local database. After that, the query is replicated as many times as the data is split into fragments, and these queries are forwarded to the relevant CSPs. As a result, each CSP provides a set of results that represent a partial view of the complete result. Finally, the proxy collects partial results according to the criteria used to split the data and provides the complete result to the user. Mostly, all these fragments are stored on different cloud databases in their original structure. Therefore, computation on these fragments can be performed easily. However, there is a problem if we want to perform computation separately on the individual fragment. Then, there is no algorithm that exists for this computation. Therefore, some algorithms are required to perform these types of computation as this computation requires communication between different CSPs. The redundancy of proxy metadata and backup policies must be essential to ensure the robustness of the mechanism. The data-splitting is graphically represented in Figure 7 .

An external file that holds a picture, illustration, etc.
Object name is CIN2022-8303504.007.jpg

Data-splitting flow diagram.

The summary of the data-splitting is given in Table 8 . Different data-splitting techniques are used for the protection of data stored on the cloud. Some of these are given below.

  • Byte level splitting
  • In this type, all the sensitive data is converted into bytes [ 113 ]. Then, these bytes are randomly shuffled with each other. After that, all the bytes are recombined. Fixed length fragments are made, and then, these fragments are stored on a different cloud.
  • Privacy level splitting
  • In this mechanism, the user chose the privacy level of each file [ 114 ] that is to be stored on a cloud database. Hence, a privacy level is attached with the file that is to be stored on the cloud. Using this privacy level, the user can decide that the higher privacy level files should be stored on the trusted cloud.
  • Byte level splitting with replication
  • Byte-level data splitting is combined with data replication to improve both performance and security. The author of the paper [ 115 ] proposed an algorithm to store the data fragments on different clouds, so that they are at a certain distance and by doing this; we can avoid confabulation attacks where the intruder can aggregate the split fragments.
  • Byte level splitting with encryption
  • Firstly, byte-level data splitting [ 116 , 117 ] is proposed. In this scheme, every fragment of data is encrypted to enhance the security of sensitive data. In this mechanism, the data is split into bytes, and these bytes are randomly shuffled and finally recombined. This type of data splitting is suitable for binary or multimedia files that are not processed through the cloud.
  • Another problem is the length of a fragment in which we can say that the data cannot be reidentified or the identity of a person cannot be revealed. If the length is too short, then the probability of disclosure increases, and if the length is too long, then it is difficult to handle these fragments. Hence, it should have a certain length so that we can also protect the identity of a person.
  • There is another type of data splitting in which we split data into attributes. The attribute level splitting is performed in two ways: one is horizontal splitting and the second is vertical splitting. These types of splitting are mostly done on structural databases, and they provide strong privacy.
  • Vertical splitting
  • In vertical data splitting [ 118 , 119 ], we divide quasi-identifiers or quasi-attributes in such a way that all the risky attributes are divided into different fragments to secure the reidentification. Some of the sensitive fragments required encryption on it. Hence, we can encrypt these fragments by applying some encryption algorithms or by applying some other privacy methods to increase the security level.

The summary of the data-splitting techniques.

Splitting techniquesReferencesOperations supportedUsabilityPrivacy
Byte level splitting[ ]Storage and retrievalUseful for binary files. Provides week data privacyProvides a low level of privacy
Privacy level splitting[ ]Storage and retrievalUsed for sensitive data. Provides strong protectionFragments stored on the trusted locations. Provides a high level of privacy
Byte level splitting with replication[ ]Storage and retrievalProvides fast retrievalData duplication provides low levels of privacy.
Byte level splitting with encryption[ , ]Storage and retrievalProvides very strong protectionCiphertext provides a very high level of privacy
Vertical splitting[ – ]Storage, retrieval, search, computationUseful for structural dataProvides a low level of privacy

A solution for sensitive data splitting without performing encryption on fragments is proposed [ 120 ]. This mechanism is suitable for data on which we want to perform some computation, because on encrypted data, we cannot perform computation directly. Another technique has been proposed [ 121 ], which demonstrates the redaction and sanitization of a document that identifies all sensitive attributes and protects the data in most documents.

The schemes that use vertical splitting to protect data are faster than other splitting techniques because data fragments consist of a single attribute or multiple attributes. It does not involve data masking or encryption. Hence, the computation is easy. There is another type of encryption in which we do not encrypt and decrypt every time to perform computation. It is called homomorphic encryption. In this case, all data modification is done on encrypted data, and actual data is not changed, however, the final result is preserved [ 122 ].

(3) Steganography . Steganography is the practice of concealing a message within another message or a physical object. In computing contexts, video, audio, image, message, or computer file is concealed within another image, message, or file. The steganography flow diagram is depicted in Figure 8 . There are two main types of steganography, namely (1) linguistic steganography and (2) technical steganography. These techniques are given as follows:

  • (1) Linguistic Steganography
  • It uses images and symbols alone to cover the data. There are two types of Semagrams [ 123 ]. The first is a visual Semagram. In this type, we can visualize the massage. The second type is a text Semagram. In this type, we change the font, color, or symbols of the text message.
  • In this case, we hide the real message from the intruder by installing the original massage in an authorized carrier [ 124 ]. Open code technique is further divided into two types: one is jargon code, and the second is covered ciphers.
  • (2) Technical Steganography
  • Text steganography
  • In this type, we change some textual characteristics of text, such as the font, color, or symbols of the text message [ 127 ]. Three coding techniques are used to change these textual features, which are as follows: (1) line-shift coding, (2) word-shift coding, and (3) feature coding.
  • Image steganography
  • It is the most popular type of steganography. Image steganography refers to the process of hiding sensitive data inside an image file [ 128 ]. The transformed image is expected to look very similar to the original image because the visible features of the stego image remain the same. The image steganography is divided into three parts, namely (1) least significant bits coding, (2) masking and filtering, and (3) transformations.
  • Audio steganography
  • Audio steganography is a technique that is used to transmit secret data by modifying a digitalized audio signal in an imperceptible manner [ 129 ]. Following types of audio steganography are given: (1) least significant bits coding, (2) phase coding, (3) spread spectrum, and (4) echo hiding.
  • Video steganography
  • In video steganography, both image and audio steganography are used [ 130 ]. A video consists of many frames. Hence, video steganography hides a large amount of data in carrier images. In this type of steganography, we select the specific frame in which we want to hide the sensitive data.
  • (ii) Methods
  • Frequency Domain
  • A frequency-domain steganography technique is used for hiding a large amount of data with no loss of secret message, good invisibility, and high security [ 131 ]. In the frequency domain, we change the magnitude of all of the DCT coefficients of the cover image. There are two types of frequency domain: (1) discrete cosine transformation and (2) discrete wavelet transformation.
  • Spatial Domain
  • The spatial domain is based on the physical location of pixels in an image [ 132 ]. A spatial domain technique gives the idea of pixel regulation, which minimizes the progressions of a stego image created from the spread image. Some methods of the spatial domain are given as follows: (1) least significant bit, (2) pixel value differencing, (3) pixel indicator, (4) gray level modification, and (5) quantized indexed modulation.

An external file that holds a picture, illustration, etc.
Object name is CIN2022-8303504.008.jpg

Steganography flow diagram.

The summary of the steganographic techniques is given in Table 9 .

The summary of the steganographic techniques.

Steganographic techniquesReferencesOperations supportedUsabilityPrivacy
Semagrams[ ]Storage and retrievalOnly uses images and symbols to cover the dataProvides a low level of privacy
Open code[ ]StorageUsed to hide the message from the intruderLow level of privacy as compared to cryptographic techniques
Text steganography[ ]Storage and retrievalUsed to change some textual characteristics of the textVery low level of privacy
Image steganography[ ]Storage and retrievalUsed to hide sensitive data inside an image fileProvides a medium level of privacy
Audio steganography[ ]Storage and retrievalModifying a digitalized audio signalProvides a high level of privacy
Video steganography[ ]Storage and retrievalUses both image and audio steganographyDepends on the video resolution. Higher the resolution, greater the privacy
Frequency Domain[ ]Only storageHiding a large amount of data with no loss of secret messageProvides a high level of privacy as compared to other steganographic techniques
Spatial Domain[ ]Storage and retrievalThe used physical location of pixels in an imageDepends on the image resolution. Higher the resolution, greater the privacy

4.1.2. Cryptographic Techniques

Cryptography is the most important and most widely used technique for security purposes. In cryptography, the plain text is converted into ciphertext using a key and some encryption algorithms. Cryptographic techniques are the most secure techniques among all the other security techniques. Hence, these cryptography techniques are widely used in data storage security over the cloud. The present day's cryptography techniques are more realistic. We can achieve different objectives by applying these cryptographic techniques, for example, data confidentiality and data integrity. Because of an increase in the number of data breaches in the last few years, some cloud service provider companies are shifting toward cryptographic techniques to achieve more security. The most commonly used cryptographic technique is AES [ 133 ]. Key management is an important issue in cryptographic techniques because if the key is hacked by an intruder, then all the data will be hacked or stolen by this intruder. Hence, key protection or key management is a very important issue. Therefore, it is mostly the responsibility of CSP to manage the key and also provide the protection of key. Cryptographic techniques also protect the user from an untrusted CSP because sometimes the CSP outsources sensitive data without taking the permission of users, and it is an illegal activity. Hence, to avoid these things and protect our sensitive data from untrusted CSPs, we use cryptographic techniques, and it is the best option for users. However, there are some difficulties the user has to face while using cryptographic techniques, i.e., if a user wants to update a small amount of data, the user needs to decrypt the data and then perform this minor update. Hence, this work is very costly. Over time, implementing cryptographic techniques gives us a higher level of security, however, we compromise on performance or speed. It all depends on the user, the standard, the performance, or the high level of security the user wants to achieve. In this paper, we are focusing on the four main functionalities that are required or needed on cloud computing when using cryptographic techniques. Figure 9 shows the flow diagram of encryption.

An external file that holds a picture, illustration, etc.
Object name is CIN2022-8303504.009.jpg

Encryption flow diagram.

Some of the main functionalities of cryptographic functions are given below.

  • Search on encrypted data
  • If a user wants to retrieve their data stored in a cloud database, they generate a query and run the query on a local proxy server and search for the data they want. Searching for encrypted data is a very important part of cryptography because every user who stores their sensitive data in a cloud database wants to retrieve it, and it is done by searching their sensitive data through queries. Therefore, the procedure of retrieving their data is very difficult.
  • Storage control
  • Sometimes the user wants to store data in a desired location or trusted database. Hence, the user must have full control over the storage of data.
  • Access control
  • It is a very important control and is referred to as data access restriction. Sometimes, the user does not want to share a private file publicly. Hence, access control is an important functionality.
  • Computation on data
  • Data computation is the main functionality of cloud computing. Sometimes, the user wants to perform some computation on data that are stored on a cloud database. For example, if a user wants to perform computation on encrypted data that is stored on cloud databases, then there are two ways. One is that the user, firstly, decrypts the entire data, performs computation on the data, and finally, the user encrypts the entire data and stores on the cloud database. This process is very expensive in terms of computation.

Some of the cryptographic techniques are as follows:

(1) Homomorphic Encryption . Homomorphic encryption is a form of encryption that permits users to perform computations on encrypted data without decrypting it. These resulting computations are left in an encrypted form, which, when decrypted, result in an identical output to that produced had the operations been performed on the unencrypted data. There are some types of homomorphic encryption that are described below.

  • Partial Homomorphic Encryption
  • In partial homomorphic encryption, only one arithmetic function addition or multiplication is performed at one time. If the resultant ciphertext is the addition of the plain text, then it is called an additive homomorphic scheme, and if the resultant ciphertext is the multiplication of the plaintext, then it is called the multiplicative homomorphic scheme. Two multiplicative homomorphic schemes are given as in [ 134 , 135 ]. There is one additive homomorphic scheme that is called Paillier [ 136 ].
  • Somewhat Homomorphic Encryption
  • This technique allows the user to perform the multiplication and subtraction mathematical operations. However, this scheme allows a limited number of arithmetic operations, because if it allows a large number of arithmetic operations, then it produces noise. This noise changes the structure of the original data. Hence, limited numerical math operations are allowed. There is a somewhat homomorphic encryption scheme that is presented by the authors of the papers [ 137 , 138 ]. In this scheme, the time of encryption and decryption is increased when multiplication operations are increased. To avoid this increase in time, we allow only a limited number of mathematical operations.
  • Fully Homomorphic Encryption
  • This technique allows a large number of arithmetic operations, namely multiplication and subtraction. Multiplication and addition in this technique are performed in the form of XOR and AND gates [ 139 ]. Completely homomorphic encryption techniques require a higher computation time to encrypt and decrypt data. Therefore, this technique is not applicable in real-life applications for implementation. This technique uses a bootstrapping algorithm when a large number of multiplication operations is performed on data and also for the decryption of the data it is used. Homomorphic encryption, on the other hand, represents the trade-off between operations and speed performance. Only a limited number of arithmetic operations are allowed if someone wants low computation, and a large number of arithmetic operations are allowed if someone wants high security. It depends on the needs of the user.

(2) Searchable Encryption . A searchable encryption technique is proposed by the author of the paper [ 140 ]. In this technique, before storing data on a cloud database, encryption is performed, and after that, it is stored on the cloud. The advantage of this technique is that when we search for some data over the cloud database, this technique provides a secure search over the cloud database.

  • Searchable Asymmetric Encryption
  • Over the past two decades, we have focused on searchable encryption. Much of the work is related to the multiwriter and single-reader cases. Searchable encryption is also called public keyword search encryption along with keyword search (PEKS) [ 141 ].
  • Searchable Symmetric Encryption
  • Symmetric-key algorithms use the same key for massage encryption and ciphertext decryption. The keys can be the same, or there can be a simple transformation to go between the two keys. Verifiable searchable symmetric encryption, as a key cloud security technique, allows users to retrieve encrypted data from the cloud with keywords and verify the accuracy of the returned results. Another scheme is proposed for keyword search over dynamic encrypted cloud data with a symmetric-key-based verification scheme [ 142 ].

(3) Encryption . In cryptography, encryption is the process of encoding information. This process converts the original representation of the information, known as plaintext, into an alternative form known as ciphertext. Ideally, only authorized parties can decipher a ciphertext back to plaintext and access the original information.

  • Symmetric Key Encryption
  • Only one key is used in symmetric encryption to encrypt and decrypt the message. Two parties that communicate through symmetric encryption should exchange the key so that it can be used in the decryption process. This method of encryption differs from asymmetric encryption, where a pair of keys is used to encrypt and decrypt messages. A secure transmission method of network communication data based on symmetric key encryption algorithm is proposed in [ 143 ].
  • Public Key Encryption
  • The public-key encryption scheme is proposed by the author of the paper [ 144 ]. In this scheme, a public key pair is created by the receiver. This public key pair consists of two keys. One is called a public key, which is known publicly to everyone, and the second is the private key, which is kept a secret. Hence, in this scheme, the sender performs encryption on the data using the public key of the receiver and then sends this encrypted data to the receiver. After receiving this encrypted data, the receiver can decrypt this data using the private key. Hence, in this way, we can perform secure communication between two parties.
  • Identity-Based Encryption
  • Identity-based encryption is proposed by the author of the paper [ 145 ]. In this technique, a set of users is registered on the database and a unique identity is assigned to all the registered users by an admin that controls this scheme. The identity of the users can be represented by their name or their e-mail address. Just like in a public-key encryption, there is a public key pair that consists of one public key, which is the identity of the user, and one private key, which is a secret key. Just like in public-key encryption, the receiver cannot generate their public key in identity-based encryption. The identity cannot be generated by the user. There is a central authority that generates and manage the user's identity. The identity-based encryption is improved by the author [ 146 ]. The main advantage of identity-based encryption is that anyone can generate the public key of a given identity with the help of the central main authority.
  • Attribute-Based Encryption
  • The authors of the papers [ 147 , 148 ] propose a technique called attribute-based encryption. Similar to identity-based encryption, attribute-based encryption also depends on the central main authority. The central main authority generates the private key and distributes it to all the registered users. It can be encrypting the messages, however, if it does not have this designation, then it cannot be generating the messages. Attribute-based encryption is used when the number of registered users is very large. Then, the attribute-based encryption is useful. The attribute-based encryption consists of two schemes, which are key policy and ciphertext policy.
  • Functional Encryption
  • A functional encryption technique [ 149 , 150 ] consists of identity-based encryption, attribute-based encryption, and public-key encryption. All the functionalities of these three techniques combinedly make function encryption. In this technique, all the private keys are generated by the central main authority, which is associated with a specific function. Functional encryption is a very powerful encryption technique that holds all the functionalities of three encryption techniques. A functional encryption technique is used in many applications.

(4) Signcryption . Cryptography is publicly open-source, and it functions simultaneously as a digital signature and cipher. Cryptography and digital signatures are two basic encryption tools that can ensure confidentiality, integrity, and immutability. In [ 151 ], a new scheme called signature, encryption and encryption is proposed, based on effectively verifiable credentials. The system not only performs encryption and encryption but also provides an encryption or signature form only when needed [ 152 ]. The paper proposes lightweight certificate-based encryption using a proxy cipher scheme (CSS) for smart devices connected to an IoT network to reduce computing and communications costs. To ensure the security and efficiency of the proposed CBSS project, we used a cipher system encoded with 80 bit subparameters. Reference [ 153 ] proposes an input control scheme for the IoT environment using a cryptographic scheme corresponding to the efficiency and robustness of the UK security system. The proposed scheme shows that besides security services, such as protection against attacks, confidentiality, integrity, nonblocking, nondisclosure, and confidentiality, accounting and communication costs are low compared to the current scheme. Document [ 154 ] gives the informal and formal security proof of the proposed scheme. Automated Validation of Internet Security Protocols and Applications (AVISPA) tool is used for formal security analysis, which confirms that the proposed CB-PS scheme can potentially be implemented for resource-constrained low-computing electronic devices in E-prescription systems. The proposed scheme [ 155 ] introduced a new concept that does not require a reliable channel. The main production center sends a part of the private key to the public consumers. The summary of the cryptographic schemes is given in Table 10 .

The summary of the cryptographic techniques.

Cryptography techniquesReferencesSupported operationsUsabilityPrivacy
Identity-based encryption[ , ]Use for data access controlRequired a valid password to access dataProvides a high level of privacy
Symmetric-key encryption[ ]Encryption and Decryption of data using the same keyNo functionality can be performed on encrypted dataProvides a high level of privacy
Public-key encryption[ ]Use for data access controlRequired a valid public key for encryption and private key for decryptionNo key exchange is required. Provides a very high level of privacy
Attribute-based encryption[ , ]Data access control based on attributesLess secure than public-key encryptionProvides lesser privacy than public-key encryption
Functional encryption[ , ]Used for selected plaintextRequired a valid functionPrivacy depends on the function
Fully HE[ ]Allows all the arithmetic operationsPractically not useableProvides a very high level of privacy
Somewhat HE[ , ]Allows more addition and one multiplicationUseable for limited arithmetic operationsProvides a medium level of privacy
Partially HE[ – ]Allows only one arithmetic operationUseable for limited arithmetic operationsProvides a low level of privacy
Searchable encryption[ – ]Allows query search on encrypted dataUseable on encrypted dataProvides a high level of privacy
Signcryption[ – ]Used for user authenticationUseable when efficient authentication is requiredProvides a high level of privacy

All data storage protection on cloud computing is discussed in session 3. There are a lot of data protection techniques, however, all these techniques are only divided into three main categories, namely (i) data splitting, (ii) data anonymization, and (iii) cryptography. From different points views, we discuss all these techniques, e.g., overhead on the local proxy, computation cost, search on encrypted data, data accuracy all these techniques retained, and data protection level all these techniques have, and all the masked data techniques have the functionalities. These are some different views, and by considering them, we can analyze all the data protection techniques. Cryptography provides high-level security but limited cloud functionalities and a high cost of performing computation on cloud data. Data splitting provide low computation cost but a low level of security. Data anonymization is of two types: one is perturbative masking, and the second is nonperturbative masking. Hence, in perturbative masking, data is altered with dummy data. Hence, security is high, however, we cannot perform some functionalities.

4.2. RQ2: What are the Demographic Characteristics of the Relevant Studies?

We answer this question by considering the four following aspects: (i) publication trend, (ii) publication venues (proceeding and journals), (iii) number of citations, and (iv) author information.

4.2.1. Publication Trend

From 2010 to 2021, we found 52 papers that were of top ranked journals and conferences. From 2010 to 2017, there is linear work in cloud computing, however, after 2017, a lot of work is done in cloud computing data security. From 2018 to 2021, 37 papers are published. After 2018, the trend about data security in cloud computing increased very vastly. Most of the work is done in 2021. High-ranked studies are published in 2021. Figure 10 shows all trends of all the publications from 2010. Most of the articles are published in journals venue, and the highest number of papers have been published in IEEE Access journal. 6 papers were published in this journal.

An external file that holds a picture, illustration, etc.
Object name is CIN2022-8303504.010.jpg

Number of publications per year.

4.2.2. Publication Venues

There are different types of publication venues, and some of them are book articles, conference proceedings, journals, workshop proceedings, and symposium proceedings. Hence, in our SLR, the number of publications in a different venue is given in Figure 11 . We have a total of 52 papers after applying the inclusion and exclusion criteria in Section 2 .

An external file that holds a picture, illustration, etc.
Object name is CIN2022-8303504.011.jpg

Publication venues.

Out of 52 papers, 0 papers are published in book chapters. 1 paper is published in workshop proceedings. 0 papers are published in symposium proceedings. 43 papers are published in journals. 8 papers are published in conference proceedings. There are some most active journals in cloud data security, which are enlisted in Table 11 .

Top 5 most active journals.

TitleNumber of papers
IEEE access6
Journal of cryptology3
Information fusion3
Information science2
IEEE transactions on knowledge and Data engineering2

The most active journal is the IEEE Access. In this journal, 6 papers are published. Journal of Cryptology is the second most active journal in the field of data storage, security, and privacy in cloud computing. In this journal, 3 papers are published. In the third journal, i.e., in the Journal of Information Fusion, 3 papers are published. The fourth journal is the Information Science. In this journal, 2 papers are published. The fifth journal is IEEE Transactions on Knowledge and Data Engineering, and in this journal, 2 papers are published. Most active conferences are given in Table 12 .

Top 5 most active conferences.

TitleNumber of papers
International conference on privacy in statistical databases1
International conference on database systems for advanced applications1
International conference on high performance and smart computing1
International conference on mechatronic sciences, electric engineering, and computer1
Conference on computer vision and pattern recognition1

4.2.3. Number of Citations

The number of citations of a paper also tells the quality of the paper. The more the number of citations, the higher the quality, and the fewer the number of citations of the paper, the lower the paper quality. Table 13 shows the most influential authors, and Figure 12 shows the number of citations of all the papers that we have used in this SLR. Few papers have citations of more than 100. Hence, it shows that papers have a very high quality, and hence, the citation of those papers is very high. These papers are [ 105 , 118 , 124 , 139 ].

An external file that holds a picture, illustration, etc.
Object name is CIN2022-8303504.012.jpg

Number of citations of the papers.

Top 10 most influential authors in data protection in cloud computing.

NameInstitutionNumber of papers
Insaf UllahDepartment of information Technology, Hazara University, mansehra 21120, Pakistan4
Rodríguez-Hoyos ADepartamento de electrónica, telecomunicaciones y redes de Información, escuela politécnica Nacional, ladrón de Guevara2
Yang JJTsinghua National laboratory for information science and Technology, tsinghua University2
Ahmad Al BadawiFaculty of engineering, National University of Singapore, Singapore1
Nicolas GamaLaboratoire de mathématiques de versailles1
Xinrui GeX. Ge is with the college of computer science and Technology, Qingdao University1
Hua DengCollege of computer science and electronic engineering, Hunan University1
Jiguo LiFujian provincial key laboratory of network security and cryptology1
Gil SegevSchool of computer science and engineering, Hebrew University of Jerusalem1
Andreea BDepartment of electrical and systems engineering, University of Pennsylvania1

4.2.4. Author Information

Some authors are most active in their publication. To identify these authors, we enlist the names of the top 10 authors that are more active in the field of data protection and privacy in cloud computing. Hence, we enlist the names of the top 10 authors and also their numbers of publications in Table 13 .

4.3. RQ3: Which Data Protection Technique Provides More Data Protection among all the Techniques?

We answer this question by considering the following four aspects: (i) publication trend, (ii) publication venues (proceeding and journals), (iii) number of citations, and (iv) author information.

4.3.1. Comparison of Data Protection Techniques

In this section, we compare all the data protection techniques that are discussed in this SLR, and finally, we review which technique is better and provides more protection among all these data protection techniques. We compare these techniques based on different functionalities, which are given as (i) local proxy overhead, (ii) data accuracy retain, (iii) level of data protection, (iv) transparency, and (v) operation supported, and finally, we discuss RQ2. Table 14 depicts a comparison of all the data protection techniques and provides a brief comparison of all the data protection techniques discussed in this SLR. Now, we discuss all these five functionalities one by one in more detail.

  • The overhead on the local proxy for encryption is very high because the data is encrypted. If the user wants to update the data, firstly, the user decrypts the data and then updates the data. After that, the user encrypts the data again. Hence, this operation requires a lot of time, and all this work is performed by the local proxy. It is the reason the overhead on the local proxy for encryption is very high for encryption.
  • Data Splitting
  • The overhead on a local proxy for data splitting is very low. The local proxy overhead remains constant while splitting data into fragments.
  • Anonymization
  • The overhead on a local proxy for anonymization is average because most of the anonymization methods require quasilinear computation in the number of records to generate the anonymized data set. Whenever the anonymized data is generated and stored in the cloud database, then there is no overhead on the local proxy.
  • Homomorphic Encryption
  • The overhead on local proxies for homomorphic encryption is very high because homomorphic encryption involves a large number of mathematical operations. Therefore, there is a lot of overhead on local proxies for homomorphic encryption.
  • Steganography
  • The overhead on the local proxy for steganography is not too much as the data is concealed inside the cover for secure communication. However, based on the complexity of the operation in the transformed domain technique, the local proxy overhead is more than the spatial domain technique.
  • Signcryption
  • The overhead on the local proxy for signcryption is high compared to the simple encryption because in signcryption, hashing and encryption are performed in a single logical step. Because of an extra operation in signcryption, the overhead on the local proxy is higher than the simple encryption.
  • The data accuracy level for encryption is very high because data is encrypted by applying some algorithms. The sensitive data is encrypted by the sender, and this data is decrypted by the receiver using a key. This data cannot be read by anyone who does not have the secret key. Therefore, data accuracy is very high for encryption.
  • The data accuracy level for data splitting is average because data-splitting data is present in the form of fragments. Therefore, CSP can easily access the fragments of data. Both encryption and data splitting are irreversible methods. Hence, we can retrieve the original data easily.
  • The data accuracy level for data anonymization is very low because anonymization is not irreversible. In anonymization, data is replaced with dummy data, and it cannot be retrieved back. Therefore, anonymization has a very low level of data accuracy.
  • The data accuracy level for homomorphic encryption is very high because data is encrypted by applying some algorithms.
  • The data accuracy level for steganography is very low as compared to the other cryptographic techniques because data is embedded inside the cover of another medium. Any change in the cover during transmission results in the change of the concealed data. Therefore, it is hard to ensure a high accuracy level in steganography. The stego image contains the secrete data that is transmitted over the communication channel. Data concealed by the sender is extracted from the cover by the receiver. Therefore, the concealment of data results in accurate data transmission.
  • The data accuracy level for signcryption is also very high, because in signcryption, confidentiality and authentication are achieved. Therefore, we can also verify the identity of the sender.
  • The level of data protection is very high for encryption techniques, because in encryption, data is changed into ciphertext, which cannot be understood. Therefore, we can say that the identification of data is impossible without decryption using a secret key because encryption is a one-way function that is easy to execute in one direction, however, it is impossible to execute in the opposite direction.
  • The level of data protection for data splitting is less high as compared to cryptographic techniques because data is split into different fragments, and these fragments contain original forms of data. Hence, if an intruder hacks or steal these fragments, then the untired data can be easily read. Hence, the data protection level is not high as compared to encrypted methods.
  • The level of data protection for data anonymization is less high as compared to cryptographic techniques, because in anonymization techniques, quasi-identifiers are protected if the quasi-identifiers are not protected strongly. Then, there is a change in the reidentification of person-sensitive data.
  • The level of data protection is very high for homomorphic encryption techniques because encryption data is changed into ciphertext, which cannot be understood.
  • The data protection level for steganography is medium because data is embedded inside the cover of another medium. The stego image contains the secrete data that is transmitted over the communication channel. Data concealed by the sender is extracted from the cover by the receiver. Therefore, the concealment of data results in secure data transmission.
  • The data protection level for signcryption is also very high, because in signcryption, both confidentiality and authentication are achieved. Therefore, we can also verify the identity of the sender.
  • There is no transparency for the encrypted data, because in encryption, there is a need for key management. Hence, the local proxy needs to keep the records of all the keys and manage all these keys. Therefore, there is no transparency for the encrypted data.
  • There is no transparency for the data-splitting mechanism, because in the data-splitting mechanism, data is split into different fragments, and the local proxy stores these fragments in different locations. Hence, there is a need to keep the record of the location of all the fragments that are stored on different locations.
  • Anonymization is fully transparent, because in anonymization, there is no need to keep the record of data storage by the local proxy. In anonymization, data is statistically similar to the original data. Hence, CSP also performs computation and some analysis on the anonymized data.
  • There is no transparency for the homomorphically encrypted data, because in encryption, there is a need for key management. Hence, the local proxy needs to keep the records of all the keys.
  • In steganography, as compared to other data protection techniques, the main aim is to transmit data without letting the attacker know about the data transmission as it is concealed inside the cover of another medium. The data transmission in steganography is fully transparent. No key management is required, and there is no need to keep track of data storage.
  • There is no transparency for the signcrypted data, because in signcryption, there is a need for key management. Hence, the local proxy needs to keep the records of all the keys and also manage all these keys.
  • Only the data storage operation is supported on the encrypted data, because if the user wants to update some encrypted data that are stored on a cloud database, firstly, the user needs to decrypt this data, and then the user performs an update on this data. We cannot perform any modification operation on encrypted data.
  • All the operations cloud be performed on data splitting, because in data splitting, the data is present in their original structure. Hence, we can perform data storage, search, data update, and also data computation.
  • In anonymization, there are two types of data anonymization: one is data masking, and the second is data nonmasking. If data is nonmasked, then we can perform data storage and search on this data. Otherwise, we can only perform data storage.
  • Only the data storage operation is supported on the encrypted data, because if the user wants to update some encrypted data that are stored on the cloud database, firstly, the user needs to decrypt this data, and then the user performs some updates on this data.
  • A stego image only supports data storage operations because if the user wants to update the data hidden in a stego image, the user, firstly, retrieves that data from the stego image, and the user can perform any modification on this data.
  • Only the data storage operation is supported on the signcrypted data, because if the user wants to update signcrypted data that are stored on the cloud database, firstly, the user needs to unsign this data, and then the user can perform any update on this data.

Comparison of data protection techniques.

TechniquesLocal proxy overheadData accuracy retainsLevel of data protectionTransparencyOperation supportedApplicable condition
EncryptionLarge overhead on proxy because of encryption and decryptionProvides a high level of data accuracyProvides a very high level of data protection using encryptionRequires management of keyOnly storageApplicable when user wants high-level security and low-level performance
AnonymizationQuasi-attribute splitting overheadLow-level data accuracy depends on masking methodsThe average level of data protection depends on the anonymization methodsFully transparent for CSP and local proxyStorage, search on nonmasked data, and computationApplicable when testing over the statistical original data is required
SplittingRemains the same in all operationsProvides a high level of accuracy for the user and CSPProvides no guarantee about the protection of data fragmentsNot transparent for local proxy, keeps record of the fragments' locationAll the operation cloud be performedApplicable when user wants high-level computation performance and low-level data security
Homomorphic encryptionLarge overhead on proxy because of large numbers of arithmetic operationsProvides a high level of accuracyProvides a high level of data protectionRequires management of keyStorage and arithmetic operation computationApplicable when the user wants high-level computation performance and also high-level data security
SigncryptionLarge overhead on proxy because of signcryption and unsigncryptionProvides a high level of data accuracyProvides a very high level of data protection like confidentiality and authenticationRequires management of keyOnly storageApplicable when user wants data confidentiality and authentication with high protection
SteganographyNo overhead on the local proxyProvides very low accuracy as compared to the other cryptographic techniquesProvides a medium level of data protectionFully transparent for CSP and local proxyOnly storageApplicable when the user wants a medium level of data protection with low computation

5. Conclusion and Future Work

5.1. rq4: what are the primary findings, research challenges, and direction for future work in the field of data privacy in cloud computing, 5.1.1. conclusion and research challenges.

In this SLR, we have presented all the data privacy techniques related to data storage on cloud computing systematically, and we also present a comparison among all the protection techniques concerning the five finalities, which are the (i) local proxy overhead, (ii) data accuracy retains, (iii) level of data protection, (iv) transparency, and (v) operation supported. There are some research gaps we found in all these techniques of data splitting, anonymization, steganography, encryption, homomorphic encryption, and signcryption.

  • There is a very strong need to develop some ad hoc protocols for the communication of data splitting fragments that are stored on different CSPs, and also, there is a strong need to develop some protocol for the communication between different CSPs. Noncryptographic techniques are faster on different CSPs but do not provide enough security. Hence, we can improve security by developing some methods for data-splitting techniques.
  • Anonymity techniques work very effectively on a small amount of data but not for big data. Hence, there is a search gap in which we can develop some anonymity techniques to achieve more efficient performance. Therefore, some anonymous schemes need to be developed, which provide stronger protection to the quasi-identifier. Current anonymity techniques are very immature.
  • One of the limitations of steganography is that one can only use it to defend against a third party who does not know steganography. If the third party knows steganography, it can extract the data in the same way that the recipient extracts it. Therefore, we always use encryption with steganography. Therefore, there is a need to develop such steganography techniques that can protect sensitive data from third parties.
  • There is a need to develop some cryptographic techniques that can take less time than the existing cryptographic techniques to perform search and computation operation on encrypted data. Cryptographic techniques provide high security but low computational utility. Therefore, it is a search gap to develop some techniques that provide both high security with more efficiency.
  • The complexity of homomorphic encryption and decryption is far greater than that of normal encryption and decryption, and it is not applicable to many applications, such as healthcare and time-sensitive applications. Therefore, there is an urgent need to develop such homomorphic encryption schemes that have low complexity and computation cost.
  • Signcryption is used to verify and authenticate users. We can obtain confidentiality and authentication using signcryption, however, the main limitation of signcryption is that the calculation costs of the encryption algorithm used in signcryption are very high. Therefore, there is a need to develop such signcryption schemes that use such encryption algorithms, which have low computation cost.

Acknowledgments

This research was financially supported by The Analytical Center for the Government of the Russian Federation (Agreement nos. 70-2021- 00143 dd. 01.11.2021, IGK 000000D730321P5Q0002).

Data Availability

Conflicts of interest.

The authors declare that there are no conflicts of interest regarding the publication of this paper.

Data Security in Cloud Computing Using a Hybrid Algorithm Approach

  • Conference paper
  • First Online: 03 March 2022
  • Cite this conference paper

data security in cloud computing research papers 2019

  • Kolawole Damilare Abel 40 ,
  • Sanjay Misra 41 ,
  • Oluranti Jonathan 40 ,
  • Akshat Agrawal 42 ,
  • Rytis Maskeliunas 43 &
  • Robertas Damasevicius 43  

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 834))

707 Accesses

2 Citations

Cloud computing is a technology that provides users with computing resources and storage. It removes the need for businesses and institutes to maintain expensive computing facilities and improves organizations by its services. This paper aims to use cryptography techniques to enhance data security in the cloud by implementing the provided algorithms. The work in this paper is majors on implementing a hybrid algorithm (symmetric and asymmetric algorithms). We proposed a hybrid cryptosystem that comprises symmetric and asymmetric algorithms using 3DES, RSA, and SHA-3 algorithms to enable tight security in the cloud. 3DES is for encryption RSA for authentication and SHA-3 for integrity.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save.

  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
  • Available as EPUB and PDF
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
  • Durable hardcover edition

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

data security in cloud computing research papers 2019

Hybrid Security for Data in Cloud Computing: A Review

data security in cloud computing research papers 2019

An Analysis of Cloud Computing Issues on Data Integrity, Privacy and Its Current Solutions

data security in cloud computing research papers 2019

Hybrid Cryptography for Cloud Security: Methodologies and Designs

I. Odun-Ayo, S. Misra, N. Omoregbe, E. Onibere, Y. Bulama, R. Damaševičius, Cloud-based security driven human resource management system. Front Artif Intel Appl Vol Adv Digit Technol 295 , 96–106 (2017)

Google Scholar  

K. Handa, U. Singh, Data security in cloud computing using encryption and steganography. Int. J. Comput. Sci. Mob. Comput. 4 (5), 786–791 (2015)

R. Chatterjee, Cryptography in cloud computing: a basic approach to ensure security in cloud cryptography in cloud computing: a basic approach to ensure security in cloud. Int. J. Eng. Sci. Comput. 7 (5), 11818–11821 (2017)

M. Olowu, C. Yinka-Banjo, S. Misra, H. Florez, A secured private-cloud computing system, in Applied Informatics. ICAI 2019. Communications in Computer and Information Science , vol. 1051, ed. by H. Florez, M. Leon, J. Diaz-Nafria (2019)

A. Bhardwaj, G.V.B. Subrahmanyam, V. Avasthi, H. Sastry, Security Algorithms for cloud computing. Procedia - Procedia Comput. Sci. 85 , 535–542 (2016)

S.D. Rihan, S.E.F. Osman, A performance comparison of encryption algorithms AES and DES. Int. J. Eng. Res. Technol. (IJERT) 4 (12), 151–154 (2015)

S. Rajendirakumar, A. Marimuthu, Cryptographic algorithms used in cloud computing—an analysis and comparison. Int. J. Res. Appl. Sci. Eng. Technol. 6 (I), 2718–2728 (2018)

P. Kalpana, Data security in cloud computing using RSA algorithm. Int. J. Res. Comput. Commun. Technol. 1 (4), 143–146 (2012)

K.V. Nasarul Islam, K.V. Mohamed Riyas, Analysis of various encryption algorithms in cloud computing. Int. J. Comput. Sci. Mob. Comput. 6 (7), 90–97 (2017)

D. Nanda et al., An efficient algorithm for data security in cloud storage, in Proceedings of 2016 6th International Conference—Cloud System and Big Data Engineering (Confluence) , vol. 3 (Nciccnda, 2017), pp. 517–525

A. Azougaghe, Z. Kartit, M. Hedabou, M. Belkasmi, M. El Marraki, An efficient algorithm for data security in cloud storage, in IEEE International Conference on Communication International Conference on Intelligent System Design and Engineering Application ISDA , vol. 2016-June, no. 15 (2016), pp. 421–427

A. Bhandari, A. Gupta, D. Das, Secure algorithm for cloud computing and its applications, in IEEE Proceedings of 2016 6th International Conference on Cloud System and Big Data Engineering (Confluence), vol. 8, no. 16 (2016), pp. 188–192

M.B. Yassein, S. Aljawarneh, E. Qawasmeh, W. Mardini, Comprehensive study of symmetric key and asymmetric key encryption algorithms, in IEEE ICET 2017 , Antalya, Turkey, vol. 17 (2017), pp. 1–7

K. Chachapara, S. Bhadlawala, Secure sharing with cryptography in cloud computing, in IEEE 2013 Nirma University International Conference on Engineering NUiCONE 2013 , vol. 13, no. 4 (2013), pp. 1–3

G. Kaur, M. Mahajan, Analyzing data security for cloud computing using cryptographic algorithms. Int. J. Eng. Res. Appl. 3 (5), 782–786 (2013)

A. Behl, Emerging security challenges in cloud computing: an insight to cloud security challenges and their mitigation, in IEEE Proceedings of 2011 World Congress on Information and Communication Technologies, WICT 2011 , vol. 8, no. 11 (2011), pp. 217–222

S. Belguith, L. Lip, Enhancing data security in cloud computing using a lightweight cryptographic algorithm, Elev. Int. Conf. Auton. Auton. Syst. ICAS , vol. 3, no. c (2015), pp. 98–103

S. Chandra, S. Paira, S.S. Alam, G. Sanyal, A comparative survey of symmetric and asymmetric key cryptography, in 2014 international conference on communication, computing engineering, ICECCE 2014 , vol. 4, no. 14 (2014), pp. 83–93

D.P. Timothy, A.K. Santra, A hybrid cryptography algorithm for cloud computing security, in 2017 IEEE International Conference on Microelectronic Devices, Circuits and Systems. ICMDCS 2017 , vol. 2017, no. 8, (2017) pp. 1–5

Download references

Acknowledgements

The authors appreciate the sponsorship from Covenant University through its Centre for Research, Innovation and Discovery, Covenant University, Ota Nigeria.

Author information

Authors and affiliations.

Center of ICT/ICE, Covenant University Ota, Ogun, Nigeria

Kolawole Damilare Abel & Oluranti Jonathan

Department of Computer Science and Communication, Ostfold University College, Halden, Norway

Sanjay Misra

Amity University Haryana, Gurgaon, India

Akshat Agrawal

Silesian University of Technology, Gliwice, Poland

Rytis Maskeliunas & Robertas Damasevicius

You can also search for this author in PubMed   Google Scholar

Corresponding author

Correspondence to Sanjay Misra .

Editor information

Editors and affiliations.

BioAxis DNA Research Centre, Hyderabad, India

Department of Electrical and Computer Engineering, University of Louisville, Louisville, KY, USA

Jacek M. Zurada

Department of Computer Science and Engineering, CMR Institute of Technology, Kandlakoya, India

Vinit Kumar Gunjan

Department of Computer Science and Engineering, Indian Institute of Technology Roorkee, Roorkee, Uttarakhand, India

Raman Balasubramanian

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Cite this paper.

Abel, K.D., Misra, S., Jonathan, O., Agrawal, A., Maskeliunas, R., Damasevicius, R. (2022). Data Security in Cloud Computing Using a Hybrid Algorithm Approach. In: Kumar, A., Zurada, J.M., Gunjan, V.K., Balasubramanian, R. (eds) Computational Intelligence in Machine Learning. Lecture Notes in Electrical Engineering, vol 834. Springer, Singapore. https://doi.org/10.1007/978-981-16-8484-5_45

Download citation

DOI : https://doi.org/10.1007/978-981-16-8484-5_45

Published : 03 March 2022

Publisher Name : Springer, Singapore

Print ISBN : 978-981-16-8483-8

Online ISBN : 978-981-16-8484-5

eBook Packages : Intelligent Technologies and Robotics Intelligent Technologies and Robotics (R0)

Share this paper

Anyone you share the following link with will be able to read this content:

Sorry, a shareable link is not currently available for this article.

Provided by the Springer Nature SharedIt content-sharing initiative

  • Publish with us

Policies and ethics

  • Find a journal
  • Track your research

New & Notable

Fix for Azure Health Bot vulnerabilities prevents exploitation

Fix for Azure Health Bot vulnerabilities prevents exploitation

Researchers disclosed two Azure Health Bot vulnerabilities to Microsoft for which fixes were deployed before the flaws could be exploited.

Latest healthcare cyberattacks highlight operational risks

Latest healthcare cyberattacks highlight operational risks

Recent cyberattacks against OneBlood and McLaren Health Care shed light on the operational challenges that targeted organizations face.

HHS settles HIPAA right of access case with EMS company

HHS settles HIPAA right of access case with EMS company

HHS imposed a $115K civil monetary penalty against American Medical Response over alleged HIPAA right of access failures.

Ransomware attack hits blood donation nonprofit

Ransomware attack hits blood donation nonprofit

Blood donation nonprofit OneBlood is operating at a "significantly reduced capacity" due to a ransomware attack affecting its software system.

Insights is the research division of Xtelligent Healthcare Media. Our work aims to leverage Xtelligent’s diverse readership of healthcare professionals across various sectors of the industry to understand real-world challenges and identify effective solutions.

data security in cloud computing research papers 2019

Value-Based Care for Providers

data security in cloud computing research papers 2019

Healthcare Staffing Challenges

data security in cloud computing research papers 2019

The New Medicare Advantage

Healthcare strategies: a podcast.

A podcast for healthcare professionals seeking solutions to today's and tomorrow's top challenges. Hosted by the editors of Xtelligent Healthcare Media, this podcast series focuses on real-world use cases that are leading to tangible improvements in care quality, outcomes, and cost.

Guests from leading provider, payer, government, and other organizations share their approaches to transforming healthcare in a meaningful and lasting way.

Latest News

Average cost of a healthcare data breach sits at $9.77M

Average cost of a healthcare data breach sits at $9.77M

Healthcare data breach costs fell by 10.6% in 2024 but remain higher than in any other industry, IBM found in its yearly report.

Pharmacy group sues UHG over Change Healthcare data breach

Pharmacy group sues UHG over Change Healthcare data breach

The National Community Pharmacists Association and dozens of providers sued UnitedHealth Group and its subsidiaries over losses suffered due to the Change Healthcare data breach.

OIG audit: HHS secretary must improve cloud security controls

OIG audit: HHS secretary must improve cloud security controls

HHS-OIG auditors recommended that the HHS Office of the Secretary address gaps in its cloud security controls to better safeguard its cloud information systems.

Global IT outage forces hospitals to cancel appointments

Global IT outage forces hospitals to cancel appointments

A global IT outage resulting from a faulty update to CrowdStrike's threat detection platform forced hospitals to cancel non-urgent appointments and surgeries.

Industry groups express concern over proposed CIRCIA reporting requirements

Industry groups express concern over proposed CIRCIA reporting requirements

Industry groups such as the AHA and MGMA suggested that CISA’s proposed CIRCIA reporting requirements are redundant and burdensome for healthcare entities.

Change Healthcare publishes data breach notice

Change Healthcare publishes data breach notice

Change Healthcare has begun mailing data breach notification letters to affected individuals.

What health IT pros can learn from the CrowdStrike outage

What health IT pros can learn from the CrowdStrike outage

Following the CrowdStrike outage, experts recommended that health IT security practitioners focus on building resilience and tackling third-party risk.

What is the Health Breach Notification Rule, Who Does It Apply To?

What is the Health Breach Notification Rule, Who Does It Apply To?

The Federal Trade Commission’s Health Breach Notification Rule applies to vendors of personal health records, including health apps and other non-HIPAA-covered entities.

Breaking Down the NIST Cybersecurity Framework, How It Applies to Healthcare

Breaking Down the NIST Cybersecurity Framework, How It Applies to Healthcare

Healthcare organizations can strengthen their overall security postures by using the NIST Cybersecurity Framework's collection of standards and best practices.

How HHS-OIG conducts cybersecurity audits

How HHS-OIG conducts cybersecurity audits

Healthcare organizations and HHS entities can use the recommendations provided in HHS-OIG cybersecurity audit reports to strengthen the security of their systems.

Key considerations for selecting an EHR vendor include assessing practice needs, conducting a thorough market scan and evaluating...

The proposed rule, which is available for public comment until October 8, 2024, would require HHS contractors to use certified ...

The Traverse Exchange interoperability network supports nationwide health information exchange (HIE) for MEDITECH customers, ...

Synthetic data generation and use can bolster clinical research, application development and data privacy protection efforts in ...

New research demonstrates the potential of an approach to address faithfulness hallucinations in artificial ...

As nurses face increasing levels of burnout, researchers are exploring how large language models could streamline clinical ...

IEEE Account

  • Change Username/Password
  • Update Address

Purchase Details

  • Payment Options
  • Order History
  • View Purchased Documents

Profile Information

  • Communications Preferences
  • Profession and Education
  • Technical Interests
  • US & Canada: +1 800 678 4333
  • Worldwide: +1 732 981 0060
  • Contact & Support
  • About IEEE Xplore
  • Accessibility
  • Terms of Use
  • Nondiscrimination Policy
  • Privacy & Opting Out of Cookies

A not-for-profit organization, IEEE is the world's largest technical professional organization dedicated to advancing technology for the benefit of humanity. © Copyright 2024 IEEE - All rights reserved. Use of this web site signifies your agreement to the terms and conditions.

  • Partner Portal

Cloud computing trends: Flexera 2024 State of the Cloud Report

Cloud computing trends: Flexera 2024 State of the Cloud Report

The thirteenth annual Flexera 2024 State of the Cloud Report (previously known as the RightScale State of the Cloud Report ) highlights the latest cloud computing trends and statistics, including strategies, challenges and initiatives from a broad cross-section of industries and organizations. The cloud computing report explores the thinking of 753 IT professionals and executive leaders from a survey conducted in late Q4 2023 and highlights the year-over-year (YoY) changes to help identify trends. The respondents—global cloud decision makers and users—revealed their experiences with cloud migration, cloud computing and their thoughts about the public, private and multi-cloud market.

Select highlights of the report on cloud computing are included below.

Terminology used:

  • Large enterprises  are public- or private-sector organizations with 10,000 or more employees
  • Enterprises  are public- or private-sector organizations with 1,000 or more employees
  • SMBs  are small to midsized businesses with fewer than 1,000 employees
  • Organizations  refers to the combination of enterprises and SMBs participating in the survey

Managing cloud spending remains the top challenge over security

This marks the second year in a row that managing cloud spending is the top challenge facing organizations. As in previous years, there needs to be more resources/expertise. More than a quarter of respondents spend over $12 million a year on cloud (29%), and nearly a quarter (22%) spend that much on SaaS.

data security in cloud computing research papers 2019

Organizations are embracing multi-cloud

Respondents saw a slight increase in multi-cloud usage, up from 87% last year to 89% this year.

data security in cloud computing research papers 2019

Enterprises turn to multi-cloud FinOps and security tools

Sixty-one percent of large enterprises use multi-cloud security, and 57% use multi-cloud FinOps (cost optimization) tools.

data security in cloud computing research papers 2019

Siloed apps and disaster recovery (DR)/failover are the top multi-cloud implementations

The top two multi-cloud implementations are: apps siloed on different clouds, DR/failover between clouds. Apps siloed on different clouds increased the most (up to 57% from 44% YoY). Data integration between clouds increased to 45% from 37% YoY as organizations looked for the best fit for applications and data analysis.

data security in cloud computing research papers 2019

AWS and Azure still lead overall

Adoption grew for Amazon Web Services (AWS), Microsoft Azure and Google Cloud. Forty-nine percent of respondents reported using AWS for significant workloads, while 45% reported using Azure and 21% reported using Google Cloud Platform. In contrast, Oracle Cloud Infrastructure, IBM and Alibaba Cloud usage is substantially lower and relatively unchanged compared to the previous year.

data security in cloud computing research papers 2019

Cloud faces headwinds with small and medium-sized businesses

SMBs are the highest cloud adopters, but fell off slightly from the previous year, with 61% (a drop from 67% last year) of workloads and 60% of data in the public cloud for both years.

data security in cloud computing research papers 2019

There are big plans for AI

Nearly all platform-as-a-service (PaaS) offerings saw a gain in usage, with the most prominent being in the data warehouse (up to 65% from 56% YoY). Container-as-a-service (52%) and serverless (function-as-a-service) (48%) are both up nine percentage points this year. Machine learning/artificial intelligence (ML/AI) had a modest gain at 41%, up from 36% last year. However, ML/AI is the PaaS offering getting the most attention from companies experimenting (32%) or planning to use it (17%).

data security in cloud computing research papers 2019

Sustainability trails cost optimization

Forty-eight percent of respondents say they already have defined sustainability initiatives that include tracking the carbon footprint of cloud usage. When asked how sustainability compares to cost optimization, 59% prioritized cost optimization, though an additional 29% say that both cloud cost optimization and sustainability are equally prioritized.

data security in cloud computing research papers 2019

Don’t let economic volatility slow innovation

The world has experienced extraordinary disruption in the past few years, and while organizations of all sizes are prioritizing every dollar of spend, the cloud and technology will weather economic storms. Enterprises that remain focused on digital transformation, seizing new opportunities and evolving strategic initiatives through a cost-conscious lens will be better positioned for success than their competitors.

Get the latest insights in cloud computing trends and cloud migration statistics by viewing the complete survey results here.

  • FinOps supporting cloud GreenOps—sustainability as standard
  • IT asset management trends and statistics: Flexera 2023 State of ITAM Report
  • Navigating the future of IT investments: Flexera 2023 Tech Spend Pulse
  • Flexera One FinOps: Cloud Cost Optimization year in review

Want to know more?

Technology is evolving rapidly—and it's important to stay on top of the latest trends and critical insights. Check out the latest blogs related to FinOps below.

2024 State of the Cloud

2024 State of the Cloud

March 12, 2024

Cloud Cost Optimization demo

Cloud Cost Optimization demo

February 22, 2023

Practical Guide for a Successful Cloud Journey

Practical Guide for a Successful Cloud Journey

February 9, 2022

Cloud Migration and Modernization Datasheet

Cloud Migration and Modernization Datasheet

Flexera named as a leader in Cloud Cost Management and Optimization (CCMO) according to Forrester Wave™

Flexera named as a leader in Cloud Cost Management and Optimization (CCMO) according to Forrester Wave™

August 5, 2024

Snow saves 9% of total compute Azure bill with BYOL data insights

Snow saves 9% of total compute Azure bill with BYOL data insights

May 24, 2024

Get updates delivered to your inbox

How can we help?

  • Skip to main content
  • Skip to search
  • Skip to footer

Products and Services

2 persons sitting in front of laptop

Cisco Security

Master your goals. innovate. we'll tackle threats..

Get powerful security across all your networks, cloud, endpoints, and email to protect everything that matters, from anywhere.

If it's connected, you're protected

Hacker working at multiple computer screens

Cisco Security “The Hacker”

More connected users and devices creates more complexity. Cisco Security Cloud makes security easier for IT and safer for everyone anywhere security meets the network.

Deliver smarter, stronger security

Protect your organization across a multicloud environment, while simplifying security operations, improving scalability, and driving data-informed outcomes, powered by Cisco Talos.

Unlock better user experiences

Create a seamless experience that frustrates attackers, not users, by granting access from any device, anywhere, and adding more proactive security controls.

Deliver cost-effective defenses

Improve ROI by consolidating vendors, reducing complexity and integrating your security.

Strengthen security resilience

Unified, end-to-end protection maximizes value, minimizes risk, and closes security gaps everywhere to defend against evolving threats. Protect access, apps, and innovation across your network to secure your future.

data security in cloud computing research papers 2019

Cisco Secure Firewall

Better visibility and actionable insights across networks, clouds, endpoints, and email allows users to respond confidently to the most sophisticated threats at machine scale.

Featured security products

Cisco hypershield.

A new groundbreaking security architecture that makes hyperscaler technology accessible to enterprises of all sizes and delivers AI-native security for modern data centers and cloud.

Cisco Secure Access (SSE)

A converged cybersecurity solution, grounded in zero trust, that radically reduces risk and delights both end users and IT staff by safely connecting anything to anywhere.

Detect the most sophisticated threats sooner across all vectors and prioritize by impact for faster responses.

Cisco Multicloud Defense

Gain multidirectional protection across clouds to stop inbound attacks, data exfiltration, and lateral movement.

Secure applications and enable frictionless access with strong MFA and more. Establish user and device trust, gain visibility into devices, and enable secure access to all apps.

Cisco Identity Services Engine (ISE)

Simplify highly secure network access control with software-defined access and automation.

Security Suites delivered by Cisco Security Cloud

User Protection Suite

Cisco User Protection Suite

Get secure access to any application, on any device, from anywhere. Defend against threats targeting users and deliver seamless access for hybrid work.

Cloud Protection Suite

Cisco Cloud Protection Suite

Secure your apps and data with a powerful, flexible framework for a hybrid and multicloud world.

Breach Protection Suite

Cisco Breach Protection Suite

Secure your business by investigating, prioritizing, and resolving incidents through unified defense and contextual insights from data-backed, AI-powered security.

Customer stories and insights

Global partnerships fight to end child exploitation together.

Marriott International

"Marriott has long championed human rights and human trafficking awareness. Combating CSAM is an important extension of that work. The IWF provided the level of rigor we needed in a URL list, and Cisco's security technology provided the means to easily apply it."

Abbe Horswill, Director, Human Rights and Social Impact

Company: Marriott International

The NFL relies on Cisco

NFL logo

"From securing stadiums, broadcasts, and fans to protecting the largest live sporting event in America, the right tools and the right team are key in making sure things run smoothly, avoiding disruptions to the game, and safeguarding the data and devices that make mission-critical gameday operations possible."

Add value to security solutions

Cisco Security Enterprise Agreement

Instant savings

Experience security software buying flexibility with one easy-to-manage agreement.

Services for security

Let the experts secure your business

Get more from your investments and enable constant vigilance to protect your organization.

Sharpen your security insights

Cisco Cybersecurity Viewpoints

Set your vision to a more secure future with Cisco Cybersecurity Viewpoints. With specialized content from podcasts to industry news, you'll walk away with a deeper understanding of the trends, research, and topics in our rapidly changing world.

IMAGES

  1. 😂 Thesis on cloud computing data security. Cloud Computing Security

    data security in cloud computing research papers 2019

  2. (PDF) An Overview on Data Security in Cloud Computing

    data security in cloud computing research papers 2019

  3. (PDF) DATA SECURITY IN CLOUD COMPUTING

    data security in cloud computing research papers 2019

  4. (PDF) SECURITY IN CLOUD COMPUTING

    data security in cloud computing research papers 2019

  5. (PDF) A STUDY ON DATA SECURITY IN CLOUD COMPUTING

    data security in cloud computing research papers 2019

  6. What is Data Security in Cloud Computing- Cyfuture Cloud

    data security in cloud computing research papers 2019

COMMENTS

  1. A Systematic Literature Review on Cloud Computing Security: Threats and

    Cloud computing benefits both cloud services providers (CSPs) and consumers. The security challenges associated with cloud computing have been widely studied in the literature. This systematic literature review (SLR) is aimed to review the existing research studies on cloud computing security, threats, and challenges.

  2. Security and privacy protection in cloud computing: Discussions and

    Abstract. With the development of cloud computing, privacy security issues have become increasingly prominent, which is of concern to industry and academia. We review the research progress on privacy security issues from the perspective of several privacy security protection technologies in cloud computing.

  3. Privacy Protection and Data Security in Cloud Computing: A Survey

    In recent years, there are many research schemes of cloud computing privacy protection based on access control, attribute-based encryption (ABE), trust and reputation, but they are scattered and lack unified logic.

  4. Data Security and Privacy Issues in Cloud Computing: Challenges and

    This research report systematically investigates various challenges and vulnerabilities in cloud computing, focusing on security and privacy issues.

  5. LITERATURE REVIEW ON DATA SECURITY IN CLOUD COMPUTING

    This paper presents literature survey on variety of approaches for implementing data security in cloud computing. Content uploaded by Abraham Ekow Dadzie Author content

  6. Exploring Data Security Issues and Solutions in Cloud Computing

    This paper explores the different data security issues in cloud computing in a multi-tenant environment and proposes methods to overcome the security issues. This paper also describes Cloud computing models such as the deployment models and the service delivery models.

  7. Cloud computing security: A survey of service-based models

    Our research studied the last decade of service-based cloud computing security issues through a comprehensive analysis of high-quality published papers. This study aimed to provide a summary of the current research status and establish a taxonomy that maps vulnerabilities to proper countermeasures.

  8. A Critical Review of Data Security in Cloud Computing Infrastructure

    In cloud computing, access control and security are two major problems. Therefore, Security of both services and users is a substantial issue for the uses and trust of the cloud computing. This paper audits recent works concentrating on security issues, solutions, and difficulties in cloud computing infrastructure.

  9. Data Security and Privacy Issues in Cloud Computing: Challenges and

    This research report systematically investigates various challenges and vulnerabilities in cloud computing, focusing on security and privacy issues. This study comprehensively examines potential threats, from data breaches to unauthorized access, and assesses the impact of these challenges on user trust and data integrity in cloud infrastructure.

  10. A Review on Data Security and Emerging Threats in Cloud Computing

    Therefore, the. aim of this paper is to review systematically literature on data. security and emerging threats in cloud computing posed from set. policies, technology, controls and procedures and ...

  11. Data Security and Privacy in Cloud Computing

    In this paper, we make a comparative research analysis of the existing research work regarding the data security and privacy protection techniques used in the cloud computing.

  12. Cyber security threats, challenges and defence mechanisms in cloud

    In light of this, the present study explores the various threats to cloud computing, in addition to outlining defence mechanisms against these threats. It was found that there is a major threat concerning data breaches because of the lack of management understanding of the use of cloud computing services and their defence mechanisms.

  13. Enhancement of Data Security for Cloud Computing with ...

    Data security is crucial in cloud computing because cloud computing involves storing and processing data on remote servers, often belonging to third-party providers. This means that data is transmitted and stored outside of the user's immediate control, making it more vulnerable to security breaches and cyberattacks.

  14. A New Secure Model for Data Protection over Cloud Computing

    It provides security and scalability of data sharing for users on the cloud computing. Our model achieves the security functions over cloud computing such as identification and authentication, authorization, and encryption.

  15. Data Security and Privacy: Concepts, Approaches, and Research

    Data are today an asset more critical than ever for all organizations we may think of. Recent advances and trends, such as sensor systems, IoT, cloud computing, and data analytics, are making possible to pervasively, efficiently, and effectively collect data. However for data to be used to their full power, data security and privacy are critical.

  16. Clouded data: Privacy and the promise of encryption

    Abstract Personal data is highly vulnerable to security exploits, spurring moves to lock it down through encryption, to cryptographically 'cloud' it. But personal data is also highly valuable to corporations and states, triggering moves to unlock its insights by relocating it in the cloud. We characterise this twinned condition as 'clouded data'. Clouded data constructs a political and ...

  17. Data Security and Privacy Protection for Cloud Storage: A Survey

    This paper makes a comprehensive review of the literatures on data security and privacy issues, data encryption technology, and applicable countermeasures in cloud storage system, and gives an overview of cloud storage, including definition, classification, architecture and applications.

  18. (PDF) Data Security and Privacy in Cloud Computing: Concepts and

    This paper envisages a discussion of cloud environment, its utilities, challenges, and emerging research trends confined to secure processing and sharing of data. Fog Computing

  19. The Rise of Cloud Computing: Data Protection, Privacy, and Open

    Cloud computing is a long-standing dream of computing as a utility, where users can store their data remotely in the cloud to enjoy on-demand services and high-quality applications from a shared pool of configurable computing resources. Thus, the privacy ...

  20. Data Security in Cloud Computing Using a Hybrid Algorithm ...

    The work in this paper is majors on implementing a hybrid algorithm (symmetric and asymmetric algorithms). We proposed a hybrid cryptosystem that comprises symmetric and asymmetric algorithms using 3DES, RSA, and SHA-3 algorithms to enable tight security in the cloud. 3DES is for encryption RSA for authentication and SHA-3 for integrity.

  21. Data security in cloud computing

    This paper discusses the security of data in cloud computing. It is a study of data in the cloud and aspects related to it concerning security. The paper will go in to details of data protection methods and approaches used throughout the world to ensure maximum data protection by reducing risks and threats. Availability of data in the cloud is beneficial for many applications but it poses ...

  22. PDF Data Security in Cloud Computing

    An intruder can provide malicious threat to the cloud data. The developments of standards are still a concern in security of the cloud. Though there is increasing research done to enhance the security, new issue arises, or the security method becomes inappropriate for the scalable services.

  23. Blockchain‐Based Piecewise Regressive Kupyna Cryptography for Secure

    Cloud security is also known as cloud computing security. Cloud security is a set of security measures determined to guard the cloud-based infrastructure, applications, and data. ... Few previous blockchain studies were focused on cloud security in cloud computing. The motivation of this paper is to develop a novel Davies-Meyer Kupyna ...

  24. Healthtech Security Information, News and Tips

    White Papers; Sponsored Sites; Follow: ... HHS-OIG auditors recommended that the HHS Office of the Secretary address gaps in its cloud security controls to better safeguard its cloud information systems. ... Synthetic data generation and use can bolster clinical research, application development and data privacy protection efforts in ...

  25. Cloud Security

    Cloud security at Tenable starts with a unified CNAPP powerful enough to manage posture, secure workloads, govern identity & access management, and much more.

  26. Cloud Computing Security

    The aim of this paper was to analyze the issue of the Cloud security solutions as well as to design a secure access for a demonstrative cloud application. Several security items have been chosen for a secure access to the Cloud; moreover, the application has been implemented to Heroku, from Sales force company, with the use of the existing cloud technologies. The created application shows the ...

  27. Cloud computing trends: Flexera 2024 State of the Cloud Report

    The respondents—global cloud decision makers and users—revealed ...

  28. Cisco Security Products and Solutions

    Security solutions for networking, data center, cloud, and collaboration, powered by a unified platform with easy integration for third-party apps and solutions.