2021
DOI: 10.5815/ijieeb.2021.03.04
|View full text |Cite
|
Sign up to set email alerts
|

A Review of Data Security Challenges and their Solutions in Cloud Computing

Abstract: Cloud computing is the newest web based computing network that offers the users with convenient and flexible resources to access or function with different cloud applications. Cloud computing is the availability of the computer network services, mainly storing data and computational power, without explicit user active control. The data in cloud computing is stored and accessed on a distant server by using cloud service provider' applications. Providing protection is a main issue because information is transfer… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
6
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 15 publications
(6 citation statements)
references
References 17 publications
0
6
0
Order By: Relevance
“…• The [12] and [18] studies agreed that prevention of data leakage is regarded to be the most common critical problem with percentage 88% of the major challenges in CC. On the other hand, they disagreed on the other greatest data security problem with percentage 92% of major challenges; where [18] indicated that, it is represented in data remoteness and privacy. While [12] indicated that, it is represented in data segregation.…”
Section: Resultsmentioning
confidence: 99%
See 3 more Smart Citations
“…• The [12] and [18] studies agreed that prevention of data leakage is regarded to be the most common critical problem with percentage 88% of the major challenges in CC. On the other hand, they disagreed on the other greatest data security problem with percentage 92% of major challenges; where [18] indicated that, it is represented in data remoteness and privacy. While [12] indicated that, it is represented in data segregation.…”
Section: Resultsmentioning
confidence: 99%
“…-Specific Algorithms: Such as RSA algorithm in studies [12,13,15,18], decision tree algorithm in study [4], the anonymity algorithm in study [16], IDEA, AES algorithms in study [12], and SHA1 in study [15].…”
Section: Resultsmentioning
confidence: 99%
See 2 more Smart Citations
“…For data decryption, these attribute set must satisfy the specified condition in the access policy [3,4]. Each layer of cloud computing is found to highly responsible for specific services in which SaaS layer enable accession to desired software thereby avoids downloading to our system, IaaS controls networks, virtual machines etc., and PaaS offers facility to employ various applications or services with reduced cost and software governing difficulties [5,6]. The users of cloud computing must encrypt the data before sharing their data to the cloud in order to provide proper security from leaking the data [7,8].…”
Section: Introductionmentioning
confidence: 99%