Cloud-Based Data Management Security Models 1. Introduction Cloud Computing (CC), as an emerging technology of the next generation of computing has become extremely popular and has received significant interest from big data users. Cloud Computing evolved from other technologies like distributed computing, grid computing, virtualization, etc., and supports the theme of one application and many users. This was brought about due to rapid development of processing and storage intensive technologies. And with the success of the Internet, computing resources have become cheaper, more powerful and more ubiquitously available than ever before [1]. These resources: CPU and storage are provided as general utilities that can be leased and released by users through the Internet in an on-demand fashion. The emergence of cloud computing has made a tremendous impact on the Information Technology (IT) industry over the past few years, where large companies such as Google, Amazon and Microsoft strive to provide more powerful, reliable and cost-efficient cloud platforms, such that sectors and industries seek to reshape their business models to gain benefit from this new paradigm. Indeed, cloud computing provides several compelling features that make it attractive to sectors, industries and Governments. The main usage of cloud computing is data storage and computing [2].Governments, Industries and organizations are outsourcing their private and confidential data over the cloud which makes the Cloud users, and the data vulnerable to cyber threats [3][4][5]. The nature of cloud computing raises serious security issues regarding user Authentication, data/information Availability, integrity and confidentiality (AAIC), while transferring, storing and accessing the data from and to data centers with efficient performances issues [6][7] [8]. Most of the prevailing Cloud security uses Cryptographic encryption schemes [9][6]. The schemes are tightly coupled to the host-based Internet architecture that requires users to interact with numerous servers for authentication, license acquisition and retrieval of the protected content [7]. However, Organizations across industries are seekingmore effective ways to protect their data, infrastructure, people and reputations [10], in order to have full control of their own data [7][12], and restrict the Cloud providers/third party from sharing, updating, and querying a dataset [13]. In order to implement a system that optimizes the organizational security and privacy, the techniques needs to optimize speed and resistivity coupled with high level of performance [14] [15]. [9]Opines the need for a solution between user applications and database servers in the cloud initiated by the Organization to secure its Accessibility and data with guarantees they remain under Administrative control and are never exposed in storage or in transit.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2025 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.