Skip to main content

A Quick Survey of Security and Privacy Issues in Cloud and a Proposed Data-Centric Security Model for Data Security

  • Conference paper
  • First Online:
Evolutionary Computing and Mobile Sustainable Networks

Part of the book series: Lecture Notes on Data Engineering and Communications Technologies ((LNDECT,volume 53))

Abstract

Cloud is being utilized by the majority of Internet users. Businesses storing their critical information in the cloud have increased over the ages due to simplistic and attractive features the cloud possesses. In spite of cloud utilization, there are concerns raised by users regarding cloud security. Hackers are using this opportunity to steal data stored in the cloud. In this regard, researchers have proposed techniques to provide security and privacy to the cloud. Some researchers focused on securing the cloud server, while others concentrated on securing the data transmitted to the cloud. In this research, a comparative analysis is done on papers that were published between 2013 and 2019. Based on the challenges identified in those techniques, a well-secured scheme is proposed to provide extensive security to data before it is transmitted to the cloud. The proposed technique is Data-Centric Security (DCS), and it utilizes Attribute-Based Encryption (ABE) as its framework. This scheme is at the implementation stage, and we believe it will come to address the security and privacy flaws observed.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Bodrul ABM, Mohammed Z, Anwar H (2017) A reliability-based resource allocation approach for cloud computing. In: 2017 IEEE 7th international symposium on cloud and service computing, pp 147, 249–252

    Google Scholar 

  2. Al-Said A, Andras P (2019) Scalability analysis comparisons of cloud-based software services. J Cloud Comput: Adv Syst Appl 8(10):1–17

    Google Scholar 

  3. Investopedia. www.investopedia.com/terms/c/cloud-computing.asp, Accessed 20 Nov 2019

  4. Ahmed A et.al (2019) Experts reviews of a cloud forensic readiness framework for organizations. J Cloud Comput: Adv, Syst Appl 8(11):1–14

    Google Scholar 

  5. Gururaj R, Mohsin I, Farrukh AK (2017) A comprehensive survey on security in cloud computing. In: The 3rd international workshop on cyber security and digital investigation (CSDI 2017), vol 110, pp 465–472

    Google Scholar 

  6. Mahesh USC, Ambika VP (2015) Security and privacy in cloud computing: a survey. In: Proceedings of the 3rd international conference on frontiers of ıntelligent computing (FICTA), vol 2, pp 1–2

    Google Scholar 

  7. Giweli N, Shahrestani S, Cheung H (2013) Enhancing data privacy and access anonymity in cloud computing. Commun IBIMA 1–10

    Google Scholar 

  8. Saravana K, Raiva L, Balamurugan B (2014) Enhanced attribute based encryption for cloud computing. In: International conference on information and communication technologies (ICICT 2014), vol 2015, pp 689–696

    Google Scholar 

  9. Yang Y (2015) Attribute-based data retrieval with semantic keyword search for e-health cloud. J Cloud Comput: Adv Syst Appl 1–6

    Google Scholar 

  10. Hussein MK et al (2019) A placement architecture for a container as a service (CaaS) in a cloud environment. J Cloud Comput: Adv Syst Appl 8(7):1–15

    Google Scholar 

  11. Sarojini G, Vijayakumar A, Selvamani K (2016) Trusted and reputed services using enhanced mutual trusted and reputed access control algorithm in cloud. In: 2nd international conference on intelligent computing, communication and convergence (ICCC-2016), vol 92, pp 506–512

    Google Scholar 

  12. Songyang W, Yong Z (2016) Efficient verification of data possession in cloud computing. In: Conference of computational interdisciplinary sciences (CCIS 2016), pp 424–428

    Google Scholar 

  13. Yuh-Min T et.al (2016) Identity-based encryption with cloud revocation authority and its applications. IEEE Trans Cloud Comput 1–14

    Google Scholar 

  14. Victor C, Muthu R (2016) Towards achieving data security with the cloud computing adoption framework. IEEE Trans Serv Comput 9:138–151

    Article  Google Scholar 

  15. Lalitha VP et.al (2017) Data security in cloud. In: International conference on energy, communications, data analytics and soft computing (ICECDS-2017), pp 3604–3608

    Google Scholar 

  16. Sosa R et al (2018) Offloading execution from edge to cloud: a dynamic node-RED based approach. In: 2018 IEEE international conference on cloud computing technology and science (CloudCom), pp 1–4

    Google Scholar 

  17. Sridhar S, Smys S (2016) A survey on cloud security issues and challenges with possible measures. In: International conference on inventive research in engineering and technology, vol 4

    Google Scholar 

  18. Yujiao S et al (2019) Efficient attribute-based encryption with privacy-preserving key generation and its application in industrial cloud. Hindawi Secur Commun Netw pp 1–10

    Google Scholar 

  19. El-Moursy AA et al (2019) Multi-dimensional regression host utilization algorithm (MDRHU) for host overload detection in cloud computing in: journal of cloud computing: advances. Syst Appl 8(8):1–17

    Google Scholar 

  20. Sengupta N, Chinnasamy R (2019) Contriving hybrid DESCAST algorithm for cloud security. In: Eleventh international multi-conference on information processing (IMCIP-2015). Procedia Comput Sci 54:47–56

    Google Scholar 

Download references

Competing Interest

The authors declare that they have no conflict of interest.

Informed consent

Informed consent was obtained from all individual participants included in the study.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Abraham Ekow Dadzie .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Dadzie, A.E., Kant, S. (2021). A Quick Survey of Security and Privacy Issues in Cloud and a Proposed Data-Centric Security Model for Data Security. In: Suma, V., Bouhmala, N., Wang, H. (eds) Evolutionary Computing and Mobile Sustainable Networks. Lecture Notes on Data Engineering and Communications Technologies, vol 53. Springer, Singapore. https://doi.org/10.1007/978-981-15-5258-8_41

Download citation

  • DOI: https://doi.org/10.1007/978-981-15-5258-8_41

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-15-5257-1

  • Online ISBN: 978-981-15-5258-8

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics