(Publisher of Peer Reviewed Open Access Journals)

International Journal of Advanced Technology and Engineering Exploration (IJATEE)

ISSN (Print):2394-5443    ISSN (Online):2394-7454
Volume-7 Issue-73 December-2020
Full-Text PDF
Paper Title : An analytical review and analysis for the data control and security in cloud computing
Author Name : Makrand Samvatsar and Priyesh Kanungo
Abstract :

In this paper an analytical review and analysis for the data control and security in cloud computing was presented and analysed. This review and analysis covers three aspects. First is the study of the wide acceptability of cloud computing and its areas of applicability. Second is the security aspect in terms of data handling and data sharing. Third aspect is the interdisciplinary areas like Internet of Things (IoT) and big data in terms of collaboration with cloud computing environment. These components were discussed and analysed with the parametric evaluation along with the analytical variations. This paper presented an analytical view with the exploration of authenticity and data integrity. It also shows the result analysis with the performance measures. It also highlights the gaps along with the solution methodology with insightful discussion. This paper also highlights the problem statements with the suggested solutions and the future work in the same direction.

Keywords : Cloud computing, IoT, Big data, Data integrity, Data security.
Cite this article : Samvatsar M, Kanungo P. An analytical review and analysis for the data control and security in cloud computing. International Journal of Advanced Technology and Engineering Exploration. 2020; 7(73):241-246. DOI:10.19101/IJATEE.2020.762181.
References :
[1]Kumar R, Bhatia MP. A systematic review of the security in cloud computing: data integrity, confidentiality and availability. In international conference on computing, power and communication technologies 2020 (pp. 334-7). IEEE.
[Crossref] [Google Scholar]
[2]Kumar R, Goyal R. On cloud security requirements, threats, vulnerabilities and countermeasures: a survey. Computer Science Review. 2019; 33:1-48.
[Google Scholar]
[3]Sun PJ. Security and privacy protection in cloud computing: Discussions and challenges. Journal of Network and Computer Applications. 2020:102642.
[Google Scholar]
[4]Sasubilli SM, Dubey AK, Kumar A. A computational and analytical approach for cloud computing security with user data management. In international conference on advances in computing and communication engineering 2020 (pp. 1-5). IEEE.
[Crossref] [Google Scholar]
[5]Divya J, Shivagami S. A study of Secure cryptographic based Hardware security module in a cloud environment. In international conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC) 2020 (pp. 1273-9). IEEE.
[Crossref] [Google Scholar]
[6]Dubey AK, Dubey AK, Namdev M, Shrivastava SS. Cloud-user security based on RSA and MD5 algorithm for resource attestation and sharing in java environment. In CSI sixth international conference on software engineering 2012 (pp. 1-8). IEEE.
[Crossref] [Google Scholar]
[7]Zheng X, Martin P, Brohman K, Da Xu L. Cloudqual: A quality model for cloud services. IEEE Transactions on Industrial Informatics. 2014; 10(2):1527-36.
[Crossref] [Google Scholar]
[8]Jagli D, Purohit S, Chandra NS. SaaS CloudQual:a Quality Model for Evaluating Software as a Service on the cloud computing environment. In innovations in computer science and engineering 2017 (pp. 73-80). Springer, Singapore.
[Crossref] [Google Scholar]
[9]Sasubilli SM, Dubey AK, Kumar A. Hybrid security analysis based on intelligent adaptive learning in Big Data. In international conference on advances in computing and communication engineering 2020 (pp. 1-5). IEEE.
[Crossref] [Google Scholar]
[10]Singh A, Chatterjee K. Cloud security issues and challenges: a survey. Journal of Network and Computer Applications. 2017; 79:88-115.
[Google Scholar]
[11]Choi SW, Kim SD. A quality model for evaluating reusability of services in SOA. In conference on e-commerce technology and the fifth IEEE conference on enterprise computing, e-commerce and e-services 2008 (pp. 293-8). IEEE.
[Crossref] [Google Scholar]
[12]Choudhary AR. Baseline requirements and architecture for cloud computing services. International Journal of Advanced Computer Research. 2012; 2(7):1-7.
[Google Scholar]
[13]Luo HY, Lv P, Liu LZ, Yang X. Enterprises trust comprehensive evaluation based on fussy rough AHP in cloud computing. J Shandong Univ (Nat Sci). 2014; 49:111-7.
[Google Scholar]
[14]Alotaibi MB. Antecedents of software-as-a-service (SaaS) adoption: a structural equation model. International Journal of Advanced Computer Research. 2016; 6(25):114-29.
[Crossref] [Google Scholar]
[15]Bhupendra Kumar, Jayshree Boaddh. A meta-analysis on secure cloud computing. International Journal of Advanced Technology and Engineering Exploration. 2016; 3(15): 15-20.
[Crossref] [Google Scholar]
[16]Zisman A, Spanoudakis G, Dooley J. A framework for dynamic service discovery. In 2008 23rd IEEE/ACM International conference on automated software engineering 2008 (pp. 158-67). IEEE.
[Crossref] [Google Scholar]
[17]Soni A, Hasan M. Pricing schemes in cloud computing: a review. International Journal of Advanced Computer Research. 2017; 7(29):60-70.
[Crossref] [Google Scholar]
[18]https://www.globaldots.com/cloud-computing-types-of-cloud/. Accessed 26 October 2020.
[19]Shrimali B, Bhadka H, Patel H. A fuzzy-based approach to evaluate multi-objective optimization for resource allocation in cloud. International Journal of Advanced Technology and Engineering Exploration. 2018; 5(43):140-50.
[Crossref] [Google Scholar]
[20]Kalangi RR, Rao MC. A novel multi-user fingerprint minutiae based encryption and integrity verification for cloud data. International Journal of Advanced Computer Research. 2018; 8(37):161-70.
[Crossref] [Google Scholar]
[21]Ismail UM, Islam S. A unified framework for cloud security transparency and audit. Journal of Information Security and Applications. 2020; 54:102594.
[Google Scholar]
[22]Ahamad D, Hameed SA, Akhtar M. A multi-objective privacy preservation model for cloud security using hybrid Jaya-based shark smell optimization. Journal of King Saud University-Computer and Information Sciences. 2020.
[Google Scholar]
[23]Prasath R, Santhosh GT, Ratchnayaraj IA, Jemiline E. The security in web application of cloud and IoT service. Materials Today: Proceedings. 2020.
[Google Scholar]
[24]Prajapati P, Shah P. Review on secure data deduplication: cloud storage security issue. Journal of King Saud University-Computer and Information Sciences. 2020.
[Google Scholar]
[25]Kelf S. The security risks created by cloud migration and how to overcome them. Network Security. 2020; 2020(4):14-6.
[Google Scholar]
[26]Fan Y, Zhao G, Shang W, Shang J, Lin W, Wang Z. A preliminary design for authenticity of IoT Big data in cloud computing. In international conference on computer communications and networks 2020 (pp. 1-2). IEEE.
[Crossref] [Google Scholar]
[27]Mondal A, Paul S, Goswami RT, Nath S. Cloud computing security issues & challenges: a review. In international conference on computer communication and informatics 2020 (pp. 1-5). IEEE.
[Crossref] [Google Scholar]
[28]Mohiuddin I, Almogren A. Security challenges and strategies for the IoT in cloud computing. In international conference on information and communication systems 2020 (pp. 367-72). IEEE.
[Crossref] [Google Scholar]
[29]Saran P, Rajesh D, Pamnani H, Kumar S, Sai TH, Shridevi S. A survey on health care facilities by cloud computing. In international conference on emerging trends in information technology and engineering 2020 (pp. 1-5). IEEE.
[Crossref] [Google Scholar]
[30]Chadwick DW, Fan W, Costantino G, De Lemos R, Di Cerbo F, Herwono I, et al. A cloud-edge based data security architecture for sharing and analysing cyber threat information. Future Generation Computer Systems. 2020; 102:710-22.
[Google Scholar]
[31]Jia H, Liu X, Di X, Qi H, Cong L, Li J, Yang H. Security strategy for virtual machine allocation in cloud computing. Procedia Computer Science. 2019; 147:140-4.
[Google Scholar]
[32]Namasudra S, Devi D, Kadry S, Sundarasekar R, Shanthini A. Towards DNA based data security in the cloud computing environment. Computer Communications. 2020; 151:539-47.
[Google Scholar]
[33]Toumi H, Fagroud FZ, Zakouni A, Talea M. Implementing Hy-IDS, mobiles agents and virtual firewall to enhance the security in IaaS Cloud. Procedia Computer Science. 2019; 160:819-24.
[Google Scholar]
[34]Kayed A, Omar S. Periodical key change for cloud mutable security protocol. Microprocessors and Microsystems. 2019; 69:152-8.
[Google Scholar]