IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Data Security Issues and Solutions in Cloud Computing

Data Security Issues and Solutions in Cloud Computing
View Sample PDF
Author(s): Abhishek Majumder (Tripura University, India), Sudipta Roy (Assam University, India) and Satarupa Biswas (Tripura University, India)
Copyright: 2015
Pages: 20
Source title: Handbook of Research on Security Considerations in Cloud Computing
Source Author(s)/Editor(s): Kashif Munir (King Fahd University of Petroleum & Minerals, Saudi Arabia), Mubarak S. Al-Mutairi (King Fahd University of Petroleum & Minerals, Saudi Arabia) and Lawan A. Mohammed (King Fahd University of Petroleum & Minerals, Saudi Arabia)
DOI: 10.4018/978-1-4666-8387-7.ch010

Purchase

View Data Security Issues and Solutions in Cloud Computing on the publisher's website for pricing and purchasing information.

Abstract

Cloud is considered as future of Information Technology. User can utilized the cloud on pay-as-you use basis. But many organizations are stringent about the adoption of cloud computing due to their concern regarding the security of the stored data. Therefore, issues related to security of data in the cloud have become very vital. Data security involves encrypting the data and ensuring that suitable policies are imposed for sharing those data. There are several data security issues which need to be addressed. These issues are: data integrity, data intrusion, service availability, confidentiality and non-repudiation. Many schemes have been proposed for ensuring data security in cloud environment. But the existing schemes lag in fulfilling all these data security issues. In this chapter, a new Third Party Auditor based scheme has been proposed for secured storage and retrieval of client's data to and from the cloud service provider. The scheme has been analysed and compared with some of the existing schemes with respect to the security issues. From the analysis and comparison it can be observed that the proposed scheme performs better than the existing schemes.

Related Content

Zaigham Mahmood. © 2021. 18 pages.
Zaigham Mahmood. © 2021. 17 pages.
Atakan Gerger. © 2021. 31 pages.
Kemi Ogunsola, Temilade Precious Olojo. © 2021. 27 pages.
Leu Fang Yie, Heru Susanto, Desi Setiana. © 2021. 18 pages.
Muthu Ramachandran, Pethuru Raj Chelliah, P. Beaulah Soundarabai. © 2021. 23 pages.
Natalija Najdova, Jasmina Belchovska Tasevska, Smilka Janeska Sarkanjac, Branislav Sarkanjac, Dimitar Trajanov. © 2021. 26 pages.
Body Bottom