MATHEMATICAL FOUNDATIONS OF DATA SECURITY IN CLOUD ENVIRONMENT

Authors:

Nidhi Arora,K. D. Sharma,Ashok Sharma,Tania Bose,Renu Bala,Madhu Aneja,

DOI NO:

https://doi.org/10.26782/jmcms.spl.11/2024.05.00015

Keywords:

Cloud Computing,Cloud environment,data security,Confidentiality,integrity,Mathematical modelling,Threats in a cloud environment,

Abstract

Cloud computing is a prominent technology that allows clients to access the required data to accomplish their tasks on any machine with an internet connection. Although it is an emerging technique in the information technology world, it is facing some challenges also. Data security has become a big hindrance in the growth and promotion of cloud services. As data resides in different places all over the world, data security and privacy have become major areas of concern about cloud technology. Mathematical modelling acts as an important aid to examine and alleviate possible attacks or hazards on cloud models. The paper reviews several security areas and issues related to the cloud computing environment. It also aims to focus mathematical models on security issues that arise from the use of cloud services. Various threats to the data security for a faithful cloud environment are also discussed. Various methods that ensure cloud privacy and security of the data are also reviewed.

Refference:

I. A. Seccombe, A. Hutton, A. Meisel, A. Windel, A. Mohammed, & A. Licciardi. : ‘Security guidance for critical areas of focus in cloud computing’. Cloud Security Alliance. Vol. 2(1), 2009.
II. A. Behl. : ‘Emerging security challenges in cloud computing: an insight to cloud security challenges and their mitigation’. Proceedings of the World Congress on Information and Communication Technologies (WICT ’11), IEEE. pp. 217–222, December 2011. 10.1109/WICT.2011.6141247
III. AL-Museelem Waleed, Li Chunlin. : ‘User Privacy and Security in Cloud Computing’. International Journal of Security and Its Applications. Vol. 10(2), pp.341-352, 2016.
IV. A NGENZI et al., : ‘Applying mathematical models in cloud computing: A survey’. IOSR Journal of Computer Engineering. Vol. 16(5), pp. 36-46, 2014. 10.9790/0661-16523646
V. A. Pandey, R. M. Tugnayat, and A. K. Tiwari. : ‘Data Security Framework for Cloud Computing Networks’. International Journal of Computer Engineering & Technology. vol. 4(1), pp. 178–181, 2013.
VI. D. Chen and H. Zhao. : ‘Data security and privacy protection issues in cloud computing’. Proceeding of the International Conference on Computer Science and Electronics Engineering (ICCSEE ’12), Hangzhou, China. vol. 1, pp. 647–651, March 2012. 10.1109/ICCSEE.2012.193
VII. E. Anwar J. Alzaid. : ‘Cloud Computing: An Overview’. International Journal of Advanced Research in Computer and Communication Engineering. September 2013.
VIII. F. Gilbert. : ‘Proposed EU data protection regulation: the good, the bad, and the unknown’. In: Journal of Internet Law. Vol. 15 (10), pp. 20-34, 2012.
IX. H. Zwingelberg, M. Hansen. : ‘Privacy Protection Goals and Their Implications for eID Systems’. In Camenisch, J. (Ed.): Privacy and Identity Management for Life. Springer, Berlin. pp. 14-31, 2012.
X. J. Schiffman, T. Moyer, H. Vijayakumar, T. Jaeger, and P. McDaniel. : ‘Seeding clouds with trust anchors’. Proceedings of the ACM workshop on Cloud computing security workshop (CCSW ’10), ACM. pp. 43–46, October 2010. 10.1145/1866835.1866843

XI. K. D. Bowers, A. Juels, and A. Oprea. : ‘HAIL: a high-availability and integrity layer for cloud storage’. Proceedings of the 16th ACM conference on Computer and Communications Security, ACM, Chicago, Ill, USA, pp. 187–198, November 2009. https://eprint.iacr.org/2008/489
XII. K. D. Bowers, A. Juels, and A. Oprea. : ‘Proofs of retrievability: theory and implementation’. Proceedings of the ACM Workshop on Cloud Computing Security (CCSW’09), pp. 43–53,November 2009. 10.1145/1655008.1655015
XIII. L. Tawalbeh, N.S. Darwazeh, R.S. Al-Qassas and F. AlDosari. : ‘A secure cloud computing model based on data classification’. Elsevier. Vo. 52, pp 1153-1158, 2015. 10.1016/j.procs.2015.05.150
XIV. M. A. Shah, R. Swaminathan, and M. Baker. : ‘Privacy-preserving audit and extraction of digital contents’. IACR Cryptology EPrint Archive, vol. 186, 2008. https://eprint.iacr.org/2008/186
XV. M. Z. Meetei. : ‘Mathematical model of security approaches on cloud computing’. International Journal of Cloud Computing. Vol. 6 (3), pp.187 – 210, 2017. 10.1504/IJCC.2017.086710
XVI. P. Mell and T. Grance. : ‘The nistdefinition of cloud computing’. National Institute of Standards and Technology. vol. 53(6), article 50, 2009. https://nvlpubs.nist.gov/nistpubs/legacy/sp/nistspecialpublication800-145.pdf
XVII. R. Latif, H. Abbas, S. Assar, and Q. Ali. : ‘Cloud computing risk assessment: a systematic literature review’. Future InformationTechnology, Springer, Berlin, Germany. pp. 285–295, 2014. 10.1007/978-3-642-40861-8_42
XVIII. S. Bollavarapu and B. Gupta. : ‘Data Security in Cloud Computing’. International Journal of Advanced Research in Computer Science and Software Engineering. Vol. 4(3), March 2014.
XIX. S. Ali Abbas, A. A. Baqi Maryoosh. : ‘Improving Data Storage Security in Cloud Computing Using Elliptic Curve Cryptography’. Journal of Computer Engineering. Vol. 17(4), Ver. I, pp. 48-53, 2015.
XX. V. Biksham, Dr. D.Vasumathi. : ‘Query based computations on encrypted data through homomorphic encryption in cloud computing security’. International Conference on Electrical, Electronics, and ptimization Techniques (ICEEOT), 2016 .978-1-4673 9939-5/16, 2016.

View | Download