A survey on data breach challenges in cloud computing security: Issues and threats

R. Barona, E. Anita
{"title":"A survey on data breach challenges in cloud computing security: Issues and threats","authors":"R. Barona, E. Anita","doi":"10.1109/ICCPCT.2017.8074287","DOIUrl":null,"url":null,"abstract":"Cloud computing is an innovation methodology for giving pay per utilize access to a gathering of shared resources for specific systems, stockpiling, servers, administration and applications, without physically getting them. So it spares overseeing expense and time for organizations. Numerous businesses, for example, keeping money, social insurance and instruction are moving towards the cloud because of the productivity of administrations gave by the compensation per-use design in view of the assets, for example, preparing influence utilized, exchanges completed, storage capacity devoured, information exchanged, or storage room possessed and so on. Cloud computing is a totally web based innovation where customer information is put away and kept in the server farm of a cloud supplier like Google, Amazon, Salesforce.com and Microsoft and so on. Constrained control over the information may acquire different security issues and threats which incorporate data breach, unreliable connectivity, sharing of resources, data accessibility and inside attacks. A breach of security may lead to the accidental or unlawful destruction, loss, alteration, unauthorized disclosure of, or access to, personal data transmitted, stored or otherwise processed. There are different research challenges likewise there for embracing data breaches on cloud computing. This paper examines about cloud computing, different cloud models and primary security threats and data breach issues that are right now exploring in the cloud computing framework. This paper investigates the noteworthy research and difficulties that presents data breach in cloud computing and provides best practices to service providers and additionally endeavors plan to influence cloud servers to enhance their main concern in this serious economic scenario.","PeriodicalId":208028,"journal":{"name":"2017 International Conference on Circuit ,Power and Computing Technologies (ICCPCT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"45","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 International Conference on Circuit ,Power and Computing Technologies (ICCPCT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCPCT.2017.8074287","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 45

Abstract

Cloud computing is an innovation methodology for giving pay per utilize access to a gathering of shared resources for specific systems, stockpiling, servers, administration and applications, without physically getting them. So it spares overseeing expense and time for organizations. Numerous businesses, for example, keeping money, social insurance and instruction are moving towards the cloud because of the productivity of administrations gave by the compensation per-use design in view of the assets, for example, preparing influence utilized, exchanges completed, storage capacity devoured, information exchanged, or storage room possessed and so on. Cloud computing is a totally web based innovation where customer information is put away and kept in the server farm of a cloud supplier like Google, Amazon, Salesforce.com and Microsoft and so on. Constrained control over the information may acquire different security issues and threats which incorporate data breach, unreliable connectivity, sharing of resources, data accessibility and inside attacks. A breach of security may lead to the accidental or unlawful destruction, loss, alteration, unauthorized disclosure of, or access to, personal data transmitted, stored or otherwise processed. There are different research challenges likewise there for embracing data breaches on cloud computing. This paper examines about cloud computing, different cloud models and primary security threats and data breach issues that are right now exploring in the cloud computing framework. This paper investigates the noteworthy research and difficulties that presents data breach in cloud computing and provides best practices to service providers and additionally endeavors plan to influence cloud servers to enhance their main concern in this serious economic scenario.
云计算安全中的数据泄露挑战调查:问题与威胁
云计算是一种创新的方法,它提供了对特定系统、存储、服务器、管理和应用程序的共享资源集合的按次付费访问,而无需实际获取它们。因此,它为组织节省了监督费用和时间。许多业务(例如,理财、社会保险和教育)正在向云转移,因为根据资产(例如,利用的准备影响、完成的交换、消耗的存储容量、交换的信息或拥有的存储空间等),按使用补偿设计提供了管理的生产力。云计算是一种完全基于网络的创新,将客户信息存储在谷歌、亚马逊、Salesforce.com和微软等云供应商的服务器群中。对信息的限制控制可能会带来不同的安全问题和威胁,包括数据泄露、不可靠的连接、资源共享、数据可访问性和内部攻击。违反安全可能导致意外或非法破坏、丢失、更改、未经授权披露或访问传输、存储或以其他方式处理的个人数据。同样,在云计算上应对数据泄露也存在不同的研究挑战。本文探讨了云计算、不同的云模型以及目前在云计算框架中正在探索的主要安全威胁和数据泄露问题。本文调查了云计算中数据泄露的值得注意的研究和困难,为服务提供商提供了最佳实践,并努力计划影响云服务器,以增强他们在这个严重的经济场景中的主要关注点。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信