A Study on Data Storage Security Issues in Cloud Computing
Keywords:
Cloud Computing, security issues in cloud computingAbstract
Cloud computing , a remote service platform used to store information and execute applications. It lets you run services and data online by request via a simple internet connection. Cloud computing is a relatively new technology that will become more widespread. The adoption of this technology is not without its challenges and risks. With the cloud model, you lose control over physical security. In a public cloud, you are sharing computing resources with other companies. In a shared pool outside the enterprise, you don’t have any knowledge or control of where the resources run. Exposing your data in an environment shared with other companies could give the government “reasonable cause” to seize your assets because another company has violated the law. Simply because you share the environment in the cloud, may put your data at risk of seizure. Storage services provided by one cloud vendor may be incompatible with another vendor’s services should you decide to move from one to the other. Vendors are known for creating what the hosting world calls “sticky services”—services that an end user may have difficulty transporting from one cloud vendor to another (e.g., Amazon’s “Simple Storage Service” [S3] is incompatible with IBM’s Blue Cloud, or Google, or Dell). This study aims to review and classify the issues that surround the implementation of cloud computing which a hot area that needs to be addressed by future research.
References
[1] V.S. Varnika, “ Cloud Computing Advantages and Challenges for Developing Nations”, International Journal of Scientific Research in Computer Science and Engineering Vol.6, Issue.3, pp.51-55 , June (2018)
[2] Ramona Carr, “Top Challenges in Cloud Security”, 2018
[3] Naresh vurukonda, B.Thirumala Rao, “A Study on Data Storage Security Issues in Cloud Computing”,2nd International Conference on Intelligent Computing, Communication & Convergence (ICCC-2016).
[4] Ilango Sriram, Ali Khajeh-Hosseini, “Research Agenda in Cloud Technologies”.
[5] John W. Rittinghouse and James F. Ransome, “Cloud Computing, Implementation, Management, and Security”, © 2010 by Taylor and Francis Group, LLC.
[6] Dr. Ramalingam Sugumar, K.Raja, “A Study on Enhancing Data Security in Cloud Computing Environment”, Dr. Ramalingam Sugumar et al, International Journal of Computer Science and Mobile Applications, Vol.6 Issue. 3, March- 2018, pg. 44-49.
[7] Prof. Syed Neha Samreen, Prof. Neha Khatri-Valmik, Prof. Supriya Madhukar Salve, Mr. Pathan Nouman Khan,“Introduction to Cloud Computing”, International Research Journal of Engineering and Technology (IRJET), Volume: 05 Issue: 02 | Feb-2018.
[8] Qusay Kanaan Kadhim , Robiah Yusof , Hamid Sadeq Mahdi, Sayed Samer Ali Al-shami , Siti Rahayu Selamat, “A Review Study on Cloud Computing Issues”, 1st International Conference on Big Data and Cloud Computing (ICoBiC) 2017 .
[9] Everaldo Aguiar, Yihua Zhang, and Marina Blanton,” An Overview of Issues and Recent Developments in Cloud Computing and Storage Security”.
[10] M.B. Jayalekshmi and S.H. Krishnaveni, “A Study of Data Storage Security Issues in Cloud Computing”, Indian Journal of Science and Techonology, Vol 8(24), DOI:10.17485/ijst/2015/v8i24/84229, September 2015.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
