A Study on Data Security and Privacy Protection Issues in Cloud Computing

Authors

  • N Chandramouli Dept of CSE, Vaageswari College of Engineering, Karimnagar, India
  • B Manjula Dept of Computer Science, Kakatiya University, Warangal, India

DOI:

https://doi.org/10.26438/ijcse/v5i10.307313

Keywords:

Cloud Computing, Security Issues and challenges, Cloud Architecture, Data Privacy

Abstract

Data security has a vital issue in cloud enlisting condition; it transforms into a noteworthy issue due to the data which is secured diversely completed the cloud. Data protection and security are the two essential parts of customer's stress in cloud information innovation. Different techniques as for these points of view are grabbing thought over the cloud preparing conditions and are investigated in both endeavors and scholastics. Data protection and security protection are transforming into the most enormous points of view for the future update and headway of cloud figuring innovation in the field of business and government parts. Thusly, in this paper, the cloud figuring security techniques are reviewed and its troubles as for data protection are discussed. The rule purpose of this proposed work is to update the data protection and security for the trustworthy cloud condition. This close research examination of the ebb and flow cloud security approach as for the data protection and security techniques utilized as a part of the cloud enrolling. It will be significant to enhance the security of data stockpiling in a cloud space.

References

Nitesh Jain, Pradeep Sharma, "A Security Key Management Model for Cloud Environment", International Journal of Scientific Research in Computer Science and Engineering, Vol.5, Issue.1, pp.45-48, 2017.

V.K. Saxena, S. Pushkar, "Privacy Preserving using Encryption Proxy in Data Security", International Journal of Scientific Research in Computer Science and Engineering, Vol.5, Issue.2, pp.36-41, 2017.

Rakesh Prasad Sarang and Rajesh Kumar Bunkar, "Study of Services and Privacy Usage in Cloud Computing", International Journal of Scientific Research in Computer Science and Engineering, Vol.1, Issue.6, pp.7-12, 2013.

Abhinay B.Angadi, Akshata B.Angadi, Karuna C.Gull, "Security Issues with Possible Solutions in Cloud Computing-A Survey",International Journal of Advanced Research in Computer Engineering and Technology (IJARCET), Vol.2, Issue 2, 2013.

Rachna Jain, Sushila Madan and Bindu Garg, "Analyzing Various Existing Security Techniques to Secure Data Access in Cloud Environment", International Journal of Computer Sciences and Engineering, Vol.3, Issue.1, pp.130-135, 2015.

Yinqian Zhang,Ari Juels, Michael K. Reiter, "CrossVM side channels and their utilization to remove private keys",ACM meeting on Computer and interchanges security,PP. 305-316,2012.

BhruguSevak, "Security against Side Channel Attack in Cloud Computing",International Journal of Engineering and Advanced Technology (IJEAT), Vol-2, Issue-2, 2012.

Aye Thu, "Incorporated Intrusion Detection and Prevention System with Honeypot on Cloud Computing Environment", International Journal of Computer Applications,Vol. 67– No.4, 2013.

R.Piplode, P. Sharma and U.K. Singh, "Study of Threats, Risk and Challenges in Cloud Computing", International Journal of Scientific Research in Computer Science and Engineering, Vol.1, Issue.1, pp.26-30, 2013.

Mitchell Cochran,Paul D. Witman, "Administration And Service Level Agreement Issues In A Cloud Computing Environment",Journal of Information Technology Management, Vol. XXII, Number 2, 2011.

Grispos, G., Glisson, W.B., and Storer, T., "Cloud Security Challenges: Investigating Policies, Standards, and Guidelines in a Fortune 500 Organization", 21st European Conference on Information Systems, 5-8, 2013. [12]Bijayalaxmi Purohit,PawanPrakash Singh, "Information spillage examination on cloud computing", International Journal of Engineering Research and Applications, Vol. 3, Issue 3, 2013.

V. Shobana, M. Shanmugasundaram, "Information Leakage Detection Using Cloud Computing",I nternational Journal of Emerging Technology and Advanced Engineering, Vol.3, Special Issue 1, 2013.

Manas M N, Nagalakshmi C K, Shobha G, "Cloud Computing Security Issues And Methods to Overcome",International Journal of Advanced Research in Computer and Communication Engineering,Vol. 3, Issue 4, 2014.

Tomoyoshi Takebayashi, Hiroshi Tsuda, TakayukiHasebe, RyusukeMasuoka, "Information Loss Prevention Technologies", FUJITSU Sci. Tech, vol.46, No.1, PP 47-55, 2010.

Downloads

Published

2025-11-12
CITATION
DOI: 10.26438/ijcse/v5i10.307313
Published: 2025-11-12

How to Cite

[1]
N. Chandramouli and B. Manjula, “A Study on Data Security and Privacy Protection Issues in Cloud Computing”, Int. J. Comp. Sci. Eng., vol. 5, no. 10, pp. 307–313, Nov. 2025.