Data Security Challenges and Solutions in Cloud Computing: Critical Review

Authors

DOI:

https://doi.org/10.26713/cma.v13i2.2032

Keywords:

Cloud computing, Cloud security, Data security, Encryption, Cryptography

Abstract

This paper was prepare, based on the sensitivity of data security topics, and based on the controversy surrounding cloud-computing security. Therefore, this paper aimed to contribute by providing some tips and directions related to cloud security through critical review for a number of recent studies. Then, extracting the most important latest problems and solutions that related to data security in cloud computing; and presenting them all in one study to become a comprehensive reference. The study found that the most important problems are data leakage, data remoteness, privacy and data segregation. As for the most important solutions that this paper reached to meet these challenges, were using practical strategies like models and standards, and using different emerging and programming technologies such as encryption, digital signatures, hashing, and blockchain, smart contracts, IoTs sensors and devices, edge computing, and fog computing. The study recommended researchers to conduct more theoretical and practical research on the subject, and recommended the cloud services providers to adopt several practical strategies and emerging technologies for higher protection.

Downloads

Download data is not yet available.

References

A. Al-Marsy, P. Chaudhary and J.A. Rodger, A model for examining challenges and opportunities in use of cloud computing for health information systems, Applied System Innovation 4 (2021), 15, DOI: 10.3390/asi4010015.

B. Alouffi, M. Hasnain, A. Alharbi, W. Alosaimi, H. Alyami and M. Ayaz, A systematic literature review on cloud computing security: threats and mitigation strategies, IEEE Access 9 (2021), 57792 – 57807, DOI: 10.1109/ACCESS.2021.3073203.

B. Bajic, I. Cosic, B. Katalinic, S. Moraca, M. Lazarevic and A. Rikalovic, Edge computing vs. cloud computing: challenges and opportunities in industry 4.0, in Proceedings of the 30th DAAAM International Symposium, B. Katalinic (Ed.), pp. 0864 – 0871, (2019), DAAAM International, Vienna, Austria, DOI: 10.2507/30th.daaam.proceedings.120.

Q. He and H. He, A novel method to enhance sustainable systems security in cloud computing based on the combination of encryption and data mining, Sustainability 13 (2021), 101, DOI: 10.3390/su13010101.

G. Hodosia, A. Haiderb and L. Rusu, Risk factors in cloud computing relationships: a study in public organizations in Sweden, Procedia Computer Science 181 (2021), 1179 – 1186, DOI: 10.1016/j.procs.2021.01.315.

J. Hurwitz, M. Kaufman and G. Hapler, Cloud Services for Dummies, John Wiley & Sons, Inc., New Jersey (2012), URL: https://www.ibm.com/cloud-computing/files/cloud-for-dummies.pdf.

D. Hyseni, B. Selimi, A. Luma and B. Cico, The proposed model to increase security of sensitive data in cloud computing, International Journal of Advanced Computer Science and Applications 9(2) (2018), 203 – 210, DOI: 10.14569/IJACSA.2018.090229.

Learning Experience Team, Writing a Critical Review, Learning Zone, Southern Cross University, (2020), available at: https://www.scu.edu.au/media/scueduau/staff/teaching-and-learning/talking-teaching/writing_a_critical_review.pdf.

P. Mell and T. Grance, The NIST Definition of Cloud Computing, National Institute of Standards and Technology (NIST), (2011), available at: https://nvlpubs.nist.gov/nistpubs/legacy/sp/nistspecialpublication800-145.pdf.

R. Nivetha and S.I. Shyla, Analyzing data security issues and solutions in cloud computing, International Journal of Advanced Research in Science, Communication and Technology 2(1) (2021), 49 – 55, URL: https://ijarsct.co.in/Paper752.pdf.

S. Parikh, D. Dave, R. Patel and N. Doshi, Security and privacy issues in cloud, fog and edge computing, Procedia Computer Science 160 (2019), 734 – 739, DOI: 10.1016/j.procs.2019.11.018.

S. Sabir, Security issues in cloud computing and their solutions: a review, International Journal of Advanced Computer Science and Applications 9(11) (2018), 343 – 346, DOI: 10.14569/IJACSA.2018.091147.

A.W. Salehi, F. Noori and R. Saboori, Cloud computing security challenges and its potential solution, American Journal of Engineering Research 8(10) (2019), 165 – 175, URL: https://www.ajer.org/papers/Vol-8-issue-10/S0810165175.pdf.

A.K. Sen and P.K. Tiwari, Security issues and solutions in cloud computing, IOSR Journal of Computer Engineering 19(2) (2017), 67 – 72, DOI: 10.9790/0661-1902046772.

S. Singh, T. Nafis and A. Sethi, Cloud computing: security issues & solution, International Journal of Computational Intelligence 13(6) (2017), 1419 – 1429.

J. Sumitha, V. Padmaja and R. Vaishnidi, Environment in cloud computing: privacy preservation and security solutions, International Journal of Scientific Research and Engineering Development 4(2) (2021), 1129 – 1133, URL: http://www.ijsred.com/volume4/issue2/IJSRED-V4I2P146.pdf.

N.R. Tadapaneni, Cloud computing security challenges, International Journal of Innovations in Engineering Research and Technology 7(6) (2020), 5 pages, URL: https://repo.ijiert.org/index.php/ijiert/article/view/306/285.

I. Zulifqar, S. Anayat and I. Kharal, A review of data security challenges and their solutions in cloud computing, International Journal of Information Engineering and Electronic Business 13(3) (2021), 30 – 38, DOI: 10.5815/ijieeb.2021.03.04.

Downloads

Published

25-08-2022
CITATION

How to Cite

Al-Otaibi, S. Z. (2022). Data Security Challenges and Solutions in Cloud Computing: Critical Review. Communications in Mathematics and Applications, 13(2), 795–806. https://doi.org/10.26713/cma.v13i2.2032

Issue

Section

Review Article