You are on page 1of 7

10 III March 2022

https://doi.org/10.22214/ijraset.2022.41028
International Journal for Research in Applied Science & Engineering Technology (IJRASET)
ISSN: 2321-9653; IC Value: 45.98; SJ Impact Factor: 7.538
Volume 10 Issue III Mar 2022- Available at www.ijraset.com

Analysis of Data Security and Privacy Protection in


Cloud Computing Services
Dr. S. Koteswari1, Dr. Kopparthi Suresh2
1
Professor & HOD, Department of ECE, D.N.R College of Engineering & Technology, Bhimavaram, A.P
2
Principal & Professor, Department of CSE, Bhimavaram Institute of Engineering & Technology, Bhimavaram , A.P

Abstract: Cloud computing will become a successful paradigm for statistics computing and storage. Increasing worries about
information security and privateness in the cloud, however, have emerged. Ensuring protection and privacy for facts
management and question processing in the cloud is imperative for better and broader uses of the cloud. Usually cloud
computing services are delivered with the aid of a third celebration issuer who owns the infrastructure. It blessings to point out
but a few encompass scalability, resilience, flexibility, effectivity and outsourcing non- core activities. Cloud computing provides
an progressive commercial enterprise model for corporations to undertake IT services without upfront investment. Despite the
possible positive aspects achieved from the cloud computing, the businesses are sluggish in accepting it due to safety issues and
challenges related with it. Security is one of the primary problems which bog down the growth of cloud. The notion of handing
over essential facts to any other organization is worrisome; such that the buyers want to be vigilant in understanding the risks of
records breaches in this new environment. This paper introduces a specific evaluation of the cloud computing safety problems
and challenges focusing on the cloud computing.
Keywords: Cloud Computing, Privacy, data security, Monotoring

I. INTRODUCTION
Cloud computing has emerged as a successful paradigm that substantially simplifies the deployment of computing and storage
infrastructures of both large and small enterprises. Increasing concerns about statistics safety and privacy in the cloud, however,
have emerged, as vulnerabilities have been determined in cloud service providers‟ websites [15], and consumer records leakage
incidents had been pronounced for a quantity of cloud primarily based application services. Cloud computing encompasses things to
do such as the use of social networking websites and different types of interpersonal computing; however, most of the time cloud
computing is involved with accessing on line software applications, records storage and processing power. Cloud computing is a
way to extend the capacity or add skills dynamically without investing in new infrastructure, coaching new personnel, or licensing
new software.
It extends Information Technology‟s (IT) current capabilities. In the remaining few years, cloud computing has grown from being a
promising business thought to one of the speedy developing segments of the IT industry. But as greater and extra information on
persons and companies are placed in the cloud, concerns are establishing to develop about just how protected an surroundings it is.
Despite of all the hype surrounding the cloud, customers are still reluctant to set up their enterprise in the cloud. Security problems
in cloud computing has played a major position in slowing down its acceptance, in reality protection ranked first as the best project
trouble of cloud computing.
The diffusion of cloud services is growing the demand for cloud offerings for coping with touchy data such as personal data, but
there are still many units of instances in which the cloud is no longer used due to safety concerns. In fact, it is very difficult for the
person to assessment cloud services directly so that worries about facts leakage and abuse can't be solved easily. These worries can
also be solved the use of the reachable statistics leakage prevention technology by using processing encrypted statistics and the one
for protecting information by way of deciding on best processing in accordance to content.
By solving issues about leakage of sensitive data it is expected that extra services will be enabled to use cloud systems. The above
applied sciences method the encrypted statistics whilst touchy records is not decrypted in the cloud system. The key for decrypting
the encrypted textual content is consequently in the hands of the facts owner, and now not in the cloud machine where the
processing is executed.
This ability that, even if the cloud provider leaks the data, it is the encrypted information that is leaked so that leakage of the actual
records can be prevented.

©IJRASET: All Rights are Reserved | SJ Impact Factor 7.538 | ISRA Journal Impact Factor 7.894 | 1928
International Journal for Research in Applied Science & Engineering Technology (IJRASET)
ISSN: 2321-9653; IC Value: 45.98; SJ Impact Factor: 7.538
Volume 10 Issue III Mar 2022- Available at www.ijraset.com

A. Page Layout

Fig1.Cloud Security Services

The latter technological know-how that protects facts in accordance to its contents procedures the data provision vacation spot and
applies privacy safety based totally on the importance degree labeled by using analyzing the content of the data transmitted from
every individual and according to the statistics safety and utilization necessities determined in the “policy.” This potential that
offerings that utilize non-public facts while defending privateness can be applied safely

II. RELATED WORKS


In this schemes to ensuring records confidentiality while permitting statistics management and question processing on the covered
data in the cloud. To defend the confidentiality of touchy personal records saved in the cloud, encryption is a general technique.
Encrypting the statistics on the other hand makes it challenging for the cloud to manner queries on the data for users, hence a
number of methods have been proposed for querying on encrypted data. Alternatively, we can discover trusted computing rather of
encryption and querying on encrypted data. The safety issues that need to be addressed earlier than organisations think about
switching to the cloud computing model. They are as follows: (1) privileged user access - facts transmitted from the client through
the Internet poses a sure diploma of risk, due to the fact of problems of facts ownership; agencies spend time getting to recognize
their carriers and their policies as tons as viable earlier than assigning some trivial functions first to check the water, (2) regulatory
compliance - consumers are responsible for the protection of their solution, as they can select between carriers that enable to be
audited by way of 3rd birthday party agencies that check degrees of security and providers that don't (3) statistics area – depending
on contracts, some clients may never comprehend what u . s . or what jurisdiction their records is located (4) facts segregation -
encrypted information from a couple of companies may be saved on the equal tough disk, so a mechanism to separate facts should
be deployed by using the provider. (5) recovery - each issuer should have a disaster healing protocol to guard person information (6)
investigative help - if a consumer suspects misguided recreation from the provider, it may additionally not have many criminal ways
pursue an investigation (7) long-term viability - refers to the capacity to retract a contract and all records if the current provider is
sold out by every other firm.[2] The Cloud Computing Use Case Discussion Group discusses the distinct Use Case situations and
associated requirements that may exist in the cloud model. They reflect onconsideration on use cases from specific perspectives
including customers, developers and safety engineers.[3] ENISA investigated the one of a kind safety dangers associated to
adopting cloud computing along with the affected assets, the risks likelihood, impacts, and vulnerabilities in the cloud computing
may additionally lead to such risks.[4] Balachandra et al, 2009 mentioned the protection SLA‟s specification and objectives
associated to facts locations, segregation and records recovery.[5] Kresimir et al, 2010 discussed excessive stage protection worries
in the cloud computing mannequin such as data integrity, payment and privacy of touchy information.[6] Bernd et al, 2010 discuss
the safety vulnerabilities current in the cloud platform. The authors grouped the viable vulnerabilities into technology-related, cloud
characteristics- related, safety controls related.[7] Subashini et al talk about the safety challenges of the cloud service delivery model,
focusing on the SaaS model.[8] Ragovind et al, (2010) mentioned the administration of safety in Cloud computing focusing on
Gartner‟s listing on cloud security problems and the findings from the International Data Corporation enterprise.[9] Morsy et al,
2010 investigated cloud computing troubles from the cloud architecture, cloud presented characteristics, cloud stakeholders, and
cloud carrier shipping fashions perspectives.[10]

©IJRASET: All Rights are Reserved | SJ Impact Factor 7.538 | ISRA Journal Impact Factor 7.894 | 1929
International Journal for Research in Applied Science & Engineering Technology (IJRASET)
ISSN: 2321-9653; IC Value: 45.98; SJ Impact Factor: 7.538
Volume 10 Issue III Mar 2022- Available at www.ijraset.com

A current survey with the aid of Cloud Security Alliance (CSA) & amp; IEEE indicates that businesses throughout sectors are keen
to adopt cloud computing however that protection are wanted each to accelerate cloud adoption on a broad scale and to reply to
regulatory drivers. It also small print that cloud computing is shaping the future of IT however the absence of a compliance
environment is having dramatic affect on cloud computing growth.[11] Several studies have been carried out pertaining to to safety
problems in cloud computing but this work affords a distinct evaluation of the cloud computing security troubles and challenges
focusing on the cloud computing deployment kinds and the provider transport types.
III. PRIVACY ISSUES FOR CLOUD COMPUTING
Current cloud services pose an inherent mission to records privacy, due to the fact they usually end result in information being
present in unencrypted structure on a computer owned and operated by way of a unique employer from the facts owner. The major
privacy issues relate to have faith (for example, whether there is unauthorized secondary usage of PII), uncertainty (ensuring that
statistics has been right destroyed, who controls retention of data, how to understand that privateness breaches have befell and how
to determine fault in such cases) and compliance (in environments with facts proliferation and global, dynamic flows, and
addressing the difficulty in complying with trans border information flow requirements). When considering privacy risks in the
cloud, as considered already inside the introduction, context is very vital as privacy threats fluctuate in accordance to the type of
cloud scenario. For example, there are one-of-a-kind legal guidelines regarding treatment of sensitive data, and data leakage and
loss of privateness are of specific difficulty to users when touchy records is processed in the cloud. Currently this is so a lot of an
issue that the public cloud mannequin would no longer generally be adopted for this kind of information. More generally, public
cloud is the most dominant architecture when cost reduction is concerned, however relying on a cloud service provider (CSP) to
control and keep one‟s statistics in such an environment raises a high-quality many privateness concerns. In the remainder of this
area we consider a quantity of aspects that illustrate high-quality these privateness issues: lack of user control, potential
unauthorized secondary usage, regulatory complexity (especially due to the world nature of cloud, complex carrier ecosystems,
records proliferation and dynamic provisioning and associated difficulties assembly trans border statistics glide restrictions),
litigation and legal uncertainty.

A. Lack of User Control


User-centric manage seems incompatible with the cloud: as soon as a SaaS environment is used, the service issuer will become
responsible for storage of data, in a way in which visibility and manage is limited. So how can a customer maintain manipulate over
their facts when it is stored and processed in the cloud? This can be a legal requirement and also some thing users/ buyers choose –
it may also even be quintessential in some instances to grant enough trust for consumers to switch to cloud services. Key
components of this lack of user manipulate include Ownership of and control over the infrastructure: In cloud computing,
consumers‟ facts is processed in „the cloud‟ on machines they do not personal or control, and there is a hazard of theft, misuse
(especially for different purposes from these in the beginning notified to and agreed with the consumer) or unauthorized resale.
Access and transparency: it is no longer clear that it will be possible for a CSP to make sure that a statistics concern can get right of
entry to to all his/her . There can be lack of transparency about where records is, who owns it and what is being finished with it.
Furthermore, it is hard to manage (and even know) the exposure of the records transferred to the cloud, because records passing via
some international locations (including US, as approved with the aid of the US Patriot Act) can be accessed through law
enforcement agencies. Control over statistics lifecycle: a CSP may also not comply with a request for deletion of data. it is no longer
always clear who controls retention of data (orindeed what the regulatory necessities are in that respect as there can be a range of
unique records retention requirements, some of which may additionally even be in conflict). Changing provider: It can additionally
be difficult to get records again from the cloud, and keep away from seller lock-in, as considered. Notification and redress:
Uncertainties about notification, including of privateness breaches, and potential to attain redress. It can be difficult to recognize
that privacy breaches have passed off and to decide who is at fault in such cases. Transfer of facts rights: It is uncertain what rights
in the facts will be acquired by way of data processors and their sub-contractors, and whether or not these
are transferable to other third events upon bankruptcy, takeover, or merger.

B. Cloud Computing Challenges


Cloud computing is associated with numerous challenges due to the fact customers are still skeptical about its authenticity.
Security: It is clear that the protection difficulty has performed the most important role in hindering Cloud computing acceptance.
Without doubt, putting your data, jogging your software program on any person else's challenging disk using someone else's CPU
appears daunting to many.

©IJRASET: All Rights are Reserved | SJ Impact Factor 7.538 | ISRA Journal Impact Factor 7.894 | 1930
International Journal for Research in Applied Science & Engineering Technology (IJRASET)
ISSN: 2321-9653; IC Value: 45.98; SJ Impact Factor: 7.538
Volume 10 Issue III Mar 2022- Available at www.ijraset.com

Well-known security troubles such as records loss, phishing, botnet (running remotely on a collection of machines) pose serious
threats to organization's statistics and software. Moreover, the multi-tenancy mannequin and the pooled computing resources in
cloud computing has brought new protection challenges that require novel techniques to address with. For example, hackers can use
Cloud to organize as Cloud regularly affords extra dependable infrastructure offerings at a notably less expensive price for them to
start an attack.[9] Costing Model: Cloud customers need to consider the tradeoffs amongst computation, communication, and
integration. While migrating to the Cloud can considerably reduce the infrastructure cost, it does raise the cost of statistics
communication, i.e. the price of transferring an organization's records to and from the public and neighborhood Cloud and the value
per unit of computing resource used is in all likelihood to be higher. This problem is especially distinguished if the consumer makes
use of the hybrid cloud deployment model where the organization's statistics is distributed amongst a number of public/private (in-
house IT infrastructure)/community clouds. Intuitively, on-demand computing makes experience only for CPU intensive jobs.[9]
Charging Model: The elastic resource pool has made the cost evaluation a lot greater complicated than everyday facts centers, which
frequently calculates their price based on consumptions of static computing. Moreover, an instantiated digital desktop has turn out to
be the unit of fee evaluation alternatively than the underlying physical server. For SaaS cloud providers, the value of growing multi-
tendancy within their imparting can be very substantial. These include: re-design and redevelopment of the software program that
was at the start used for single-tenancy, cost of providing new features that allow for intensive customization, performance and
security enhancement for concurrent consumer access, and dealing with complexities precipitated by way of the above changes.
Consequently, SaaS providers need to weigh up the trade-off between the provision and the cost-savings yielded via multi-tenancy
such as reduced overhead thru amortization, reduced quantity of on-site software program licenses, etc. Therefore, a strategic and
possible charging model for SaaS issuer is critical for the profitability and sustainability of SaaS cloud providers.[9] Service Level
Agreement (SLA): Although cloud shoppers do now not have manipulate over the underlying computing resources, they do need to
make certain the quality, availability, reliability, and performance of these resources when consumers have migrated their core
business features onto their entrusted cloud. In different words, it is critical for consumers to reap ensures from vendors on service
delivery. Typically, these are provided thru Service Level Agreements (SLAs) negotiated between the vendors and consumers. The
very first problem is the definition of SLA specs in such a way that has an suitable level of granularity, namely the tradeoffs
between expressiveness and complicatedness, so that they can cowl most of the client expectations and is quite easy to be weighted,
verified, evaluated, and enforced via the useful resource allocation mechanism on the cloud. In addition, different cloud offerings
(IaaS, PaaS, and SaaS) will want to define distinct SLA meta specifications. This additionally raises a quantity of implementation
troubles for the cloud providers. Furthermore, superior SLA mechanisms need to constantly comprise person remarks and
customization aspects into the SLA evaluation framework.[16]
Cloud Interoperability Issue: Currently, every cloud presenting has its own way on how cloud clients/applications/users have
interaction with the cloud, leading to the "Hazy Cloud" phenomenon. This severely hinders the development of cloud ecosystems by
forcing dealer locking, which prohibits the ability of customers to pick from alternative vendors/offering simultaneously in order to
optimize sources at extraordinary stages within an organization. More importantly, proprietary cloud APIs makes it very hard to
integrate cloud offerings with an organization's personal existing legacy systems (e.g. an on-premise facts centre for pretty
interactive modeling applications in a pharmaceutical company).The major goal of interoperability is to recognise the seamless fluid
facts throughout clouds and between cloud and nearby applications. There are a range of degrees that interoperability is fundamental
for cloud computing. First, to optimize the IT asset and computing resources, an company often wants to hold in-house IT assets and
capabilities associated with their core talents whilst outsourcing marginal features and things to do (e.g. the human useful resource
system) on to the cloud.

IV. CONCLUSION
In this paper we have assessed some of the key privacy and protection issues involved in transferring to cloud scenarios, and set out
the basis of some approaches that address the situation. Many of these subject matters are developed and explored. Cloud fashions
of service provision and the carefully associated capability for big statistics processing and prolonged statistics mining allow new
progressive strategies based totally upon expanded value of personal information. At the same time, this extended enterprise use of
personal records can be very contentious and so mechanisms need to be furnished so that men and women can continue manage
over it. In particular, more information is known, recorded and accessible, making it difficult for human beings now not to be
judged on the basis of previous actions. Cloud computing can be viewed as a new phenomenon which is set to revolutionize the way
we use the Internet, there is an awful lot to be cautious about. There are many new applied sciences emerging at a rapid rate, each
with technological developments and with the doable of making human‟s lives easier.

©IJRASET: All Rights are Reserved | SJ Impact Factor 7.538 | ISRA Journal Impact Factor 7.894 | 1931
International Journal for Research in Applied Science & Engineering Technology (IJRASET)
ISSN: 2321-9653; IC Value: 45.98; SJ Impact Factor: 7.538
Volume 10 Issue III Mar 2022- Available at www.ijraset.com

However, one need to be very cautious to apprehend the security risks and challenges posed in utilizing these technologies. Cloud
computing is no exception. In this paper key security considerations and challenges which are presently confronted in the Cloud
computing are highlighted.

REFERENCES
[1] F. Gens. (2009, Feb.). “New IDC IT Cloud Services Survey: Top Benefits and Challenges”,IDC eXchange, Available:http://blogs.idc.com/ie/?p=730>
[Feb. 18,2010]
[2] S. Bajaj and R. Sion. TrustedDB: a trusted hardware based database with privacy and data confidentiality. In SIGMOD, pages 205–216, 2011.
[3] B. Chor, E. Kushilevitz, O. Goldreich,and M. Sudan. Private information retrieval. Journal of ACM, 45(6):965–981, 1998.
[4] E. Damiani, S. D. C. di Vimercati, S. Jajodia, S. Paraboschi, and P. Samarati. Balancing confidentiality and efficiency in untrusted relational DBMSs. In CCS,
pages 93–102, 2003.
[5] S. De Capitani di Vimercati, S. Foresti, S. Paraboschi, G. Pelosi, and P. Samarati. Efficient and private access to outsourced data. In ICDCS, pages 710–
719, 2011.
[6] T. Ge and S. B. Zdonik. Answering aggregation queries in a secure system model. In VLDB, pages 519–530, 2007.
[7] C. Gentry. Computing arbitrary functions of encrypted data. Communication of ACM, 53:97–105, 2010.
[8] H. Hacigumus, B. R. Iyer, C. Li, and S. Mehrotra. Executing SQL over encrypted data in the database service provider model. In SIGMOD, pages 216– 227,
2002.
[9] B. Hore, S. Mehrotra, and G. Tsudik. A privacy-preserving index for range queries. In VLDB, pages 720–731, 2004. E. Kushilevitz and R. Ostrovsky.
Replication is not needed: Single database, computationally-private information retrieval.In FOCS, pages 364–373, 1997.
[10] F. G. Olumofin and I. Goldberg. Revisiting the computational practicality of private information retrieval. In Financial Cryptography, pages 158–172, 2011.
[11] R. Ostrovsky. Efficient computation on oblivious RAMs. In STOC, pages 514–523, 1990.
[12] P. Paillier. Public-key cryptosystems based on composite degree residuosityclasses. In EUROCRYPT, pages 223–238, 1999.
[13] R. A. Popa, C. M. S. Redfield, N. Zeldovich, and H. Balakrishnan. CryptDB: protecting confidentiality with encrypted query processing. In SOSP, pages 85–
100, 2011.
[14] T. Ristenpart, E. Tromer, H. Shacham, and S. Savage. Hey, you, get off of my cloud: exploring information leakage in third- party compute clouds. In CCS,
pages 199– 212, 2009.
[15] R. Sion and B. Carbunar. On the computational practicality of private information retrieval. In NDSS Symposium, 2007.
[16] S. Wang, D. Agrawal, and A. E. Abbadi.Generalizing pir for practical private retrievalof public data. In DBSec, pages 1–16, 2010.
[17] S. Wang, D. Agrawal, and A. El Abbadi.A comprehensive framework for securequery processing on relational data in the cloud. In SDM, pages 52–69, 2011.
[18] P. Williams and R. Sion. Usable private information retrieval. In NDSS Symposium, 2008.

©IJRASET: All Rights are Reserved | SJ Impact Factor 7.538 | ISRA Journal Impact Factor 7.894 | 1932

You might also like