Review of solutions for securing end user data over cloud applications
Journal: International Journal of Advanced Computer Research (IJACR) (Vol.6, No. 27)Publication Date: 2016-10-30
Authors : Akashdeep Bhardwaj; GVB Subramanyam; Vinay Avasthi; Hanumat Sastry;
Page : 222-229
Keywords : Cloud security; Cloud computing; Public key cryptography; PKI.;
Abstract
There is an urgent need of solutions for end user data protection and privacy during the times when migrating from one cloud service provider to another. This paper reviews the challenges in cloud computing services regarding end user data, analyzing the issues and presented solutions to overcome them. The end user data required to be protected in four different ways ranging from usage data which is the information collected from computer systems, the second is the sensitive information on health and bank accounts, third is the personally identifiable information; information to identify an individual and finally is the unique device identity information that is uniquely traceable like IP addresses, unique hardware identities (media access control (MAC) address). By using solution paths such as digital keys, multi factor authentication and cloud aware applications. This paper identifies end users data security issues when using cloud computing services. The focus is directed to critical issues related to unauthorized access for integrity during data in transit. It can be addressed using public key cryptography or public key infrastructure (PKI) for confidentiality and data integrity of end user data over the cloud. Then for migrating from one cloud service provider to another, data security and privacy are addressed by cloud aware applications. Lastly, using multi factor authentication combined with network and application detection systems, intrusion detection systems and network traffic routing in case of cyber-attacks, can help in denial of service attack mitigation or prevent man in the middle and network snooping attacks in cloud computing.
Other Latest Articles
- Designing web-based data mining applications to analyze the association rules tracer study at university using a FOLD-growth method
- A supervised discriminant subspaces-based ensemble learning for binary classification
- Fuzzy clustering with the generalized entropy of feature weights
- Age features of emotional and volitional regulation of human activities
- The educational potential of professional academic disciplines in the context of development pedagogical creativity future primary school teachers
Last modified: 2016-10-13 15:39:11