UIJRT » United International Journal for Research & Technology

A Review on Data Protection of Cloud Computing Security, Benefits, Risks and Suggestions

Guddu Kumar
Keywords: cloud computing, data security, security.

Cite ➜

Kumar, G., 2019. A Review on Data Protection of Cloud Computing Security, Benefits, Risks and Suggestions. United International Journal for Research & Technology (UIJRT), 1(2), pp.26-34.


While cloud computing is picking up notoriety, various security and protection issues are developing that ruin the fast reception of this new computing worldview. What’s more, the advancement of protective arrangements is lingering behind. To guarantee a safe and dependable cloud condition it is fundamental to recognize the restrictions of existing arrangements and imagine bearings for future research. Cloud computing changed our general surroundings. Presently individuals are moving their information to the cloud since information is getting greater and should be available from numerous gadgets. In this manner, putting away the information on the cloud turns into a standard. In any case, there are numerous issues that counter information put away in the cloud beginning from virtual machine which is the intend to share assets in cloud and completion on cloud stockpiling itself issues. In this paper, we present those issues that are keeping individuals from receiving the cloud and give a study on arrangements that have been done to limit dangers of these issues. For instance, the information put away in the cloud should be classified, safeguarding honesty and accessible. In addition, sharing the information put away in the cloud among numerous clients is as yet an issue since the cloud specialist organization is dishonest to oversee confirmation and approval. In this paper, we list Cloud computing security, Benefits, Risks and suggestions for data security.


  1. Mariana Carroll, Paula Kotzé, Alta van der Merwe. 2012. Securing Virtual and Cloud Environments. In: Cloud Computing and Services Science, Service Science: Research and Innovations in the Service Economy), edited by I. Ivanov et al., DOI 10.1007/978-1-4614-2326-3 4, © Springer Science+Business Media, LLC 2012.
  2. Halton G., Deepak S., (2009), “Cloud Computing Essay”, [Accessed 12-04-2010]: http://www.scribd.com/doc/23743963/Cloud Computing-Essay
  3. Gil P., (2010), “What is Cloud Computing”, [Accessed 01-22-2011]: http://netforbeginners.about.com/od/c/f/cloudcomp ting.htm
  4. Web site Admin, (2006). “Software as a Service (SaaS) “, [Accessed 09-25-2010]: http://searchcloudcomputing.techtarget.com/definit on/Software-as-a-Service
  5. Mather, S. Kumarasuwamy and S. Latif, “Cloud Security and Privacy”, O’Rielly, ISBN: 978-0-4596-802769, 2009.
  6. M. Kaufman, “Data Security in the World of Cloud Computing”, IEEE Security & Privacy, vol. 7, no. 4, 2009.
  7. Dieye, M. F. Zhani, H. Elbiaze, “On achieving high data availability In heterogeneous cloud storage systems”, IFIP/IEEE Symposium on Integrated Network and Service Management (IM), Pgs. 326 – 334, 2017.
  8. Liu, Z. L. Jiang, X. Wang, S. M. Yiu, C. Zhang, X. Zhao, “Dynamic Attribute-Based Access Control In Cloud Storage Systems”, IEEE Trustcom/BigDataSE/ISPA, Pgs. 129 – 137, 2016.
  9. Li, K. Xue, Y. Xue, J. Hong, “TMACS: A Robust and Verifiable Threshold Multi-Authority Access Control System In Public Cloud Storage”, IEEE Transactions on Parallel and Distributed Systems, 2016.
  10. Anisetti, C. Ardagna E. Damiani, F. Gaudenzi, “A semi-automatic and trustworthy scheme for continuous cloud service certification” IEEE Transactions On Services Computing, 2016.
  11. Chang, M. Ramachandran, “Towards achieving Data Security with the Cloud Computing Adoption Framework”, IEEE Transactions on Services Computing, 2015.
  12. Dong, R. Liu, Hui Wang, “Trust-but-Verify: Verifying Result Correctness of Outsourced Frequent Itemset Mining In Data-mining-as-a-service Paradigm”, IEEE Transactions on Services Computing, 2015.
  13. LIns, P. Grochol, S. Schneider, and A. Sunyaev, “Dynamic Certification of Cloud Services: Trust, but Verify”, IEEE Computer and Reliability Societies, 1540-7993/16, 2016.
  14. Noor, Q. Sheng, L. Yao, S. Dustdar and A. Ngu. “CloudArmor: Supporting Reputation-based Trust Management for Cloud Services”, IEEE transactions on parallel and distributed systems, Vol. 27, no. 2, Pgs. 367-380, 2015.
  15. Xiao, M. Wang, X. Liu, and J. Sun, “Efficient distributed access control for big data in clouds”, Proc. – IEEE INFOCOM, vol. 20, no. BigSecurity, pp. 202-207, 2015.
  16. Chen, X. Zhu, P. Shen, J. Hu, S. Guo, Z. Tari, A. Y. Zomaya, “An Efficient Privacy-Preserving Ranked Keyword Search Method”, IEEE Transactions On Parallel And Distributed Systems, Vol. 27, No. 4, 2016.
  17. K. Liu, K. Liang, W. Susilo, J. Liu, Y. Xiang, “Two-Factor Data Security Protection Mechanism for Cloud Storage System”, IEEE Transactions on Computers, 2015.
  18. Yang, P. Shen, X. Tian, C. Chen, “A Fine-Grained Access Control Scheme for Big Data Based on Classification Attributes”, IEEE 37th International Conference on Distributed Computing Systems Workshops (ICDCSW) Pgs. 238 – 245, 2017.
  19. Wang, K. Liang, Joseph K. Liu, J. Chen, JianpIng Yu, W. Xie, “Attribute-Based Data Sharing Scheme Revisited In Cloud Computing”, IEEE Transactions on Information Forensics and Security, Vol. 11, 2016.
  20. Bonguet and M. Bellaiche, “A survey of Denial-of- Service and Distributed Denial of Service attacks and defenses in cloud computing”, Future Internet, vol. 9, no. 3, 2017.
  21. Pasquier, J.Singh, J. Powles, D. Eyers, M. Seltzer, J. Bacon, “Data provenance to audit compliance with the privacy policy in the Internet of Things Personal and Ubiquitous Computing”, Vol. 22, pp 333-344, 2018.
  22. Subbalakshmi , Dr. K.Madhavi, “Security challenges of Big Data storage in Cloud environment: A Survey” International Journal of Applied Engineering Research ISSN 0973-4562 Volume 13, Number 17 (2018) pp. 13237-13244
Scroll to Top