Improved Security and Privacy in Cloud Data Security and Privacy: Measures and Attacks

Ashish P. Joshi, Aditya Raturi, Santosh Kumar, A. Dumka, D. P. Singh
{"title":"Improved Security and Privacy in Cloud Data Security and Privacy: Measures and Attacks","authors":"Ashish P. Joshi, Aditya Raturi, Santosh Kumar, A. Dumka, D. P. Singh","doi":"10.1109/ICFIRTP56122.2022.10063186","DOIUrl":null,"url":null,"abstract":"The advantages of the cloud environment for data processing and sharing are utilized by millions of people worldwide. A cloud system must inevitably provide data security and privacy. Users' widespread use and sharing of information creates security gaps. This study aims to discuss the cloud environment, its benefits, difficulties, and upcoming research trends pertaining to safe data processing and exchange. The widespread issue is caused by the increased adoption of cloud computing by several enterprises. As a result, utilizing any device to load and receive data from the cloud providers' facilities raises various security and privacy risks, such as data modification, data loss, and theft. Unauthorized access by insiders is one of the significant problems that might develop. Although there are various ways to prevent cloud administrators from gaining illegal access, such methods haven't been successful in keeping them from gaining access to client data in the cloud.The degree of protection a system may offer to the CIA triad—a paradigm that includes the information security qualities confidentiality, integrity, and availability—is how information security is assessed. In this paper, we have analyzed such scenarios. This study analysis provided dangers to cloud data security, cloud assaults, and found vulnerabilities for several factors affecting cloud computing.","PeriodicalId":413065,"journal":{"name":"2022 International Conference on Fourth Industrial Revolution Based Technology and Practices (ICFIRTP)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 International Conference on Fourth Industrial Revolution Based Technology and Practices (ICFIRTP)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICFIRTP56122.2022.10063186","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

The advantages of the cloud environment for data processing and sharing are utilized by millions of people worldwide. A cloud system must inevitably provide data security and privacy. Users' widespread use and sharing of information creates security gaps. This study aims to discuss the cloud environment, its benefits, difficulties, and upcoming research trends pertaining to safe data processing and exchange. The widespread issue is caused by the increased adoption of cloud computing by several enterprises. As a result, utilizing any device to load and receive data from the cloud providers' facilities raises various security and privacy risks, such as data modification, data loss, and theft. Unauthorized access by insiders is one of the significant problems that might develop. Although there are various ways to prevent cloud administrators from gaining illegal access, such methods haven't been successful in keeping them from gaining access to client data in the cloud.The degree of protection a system may offer to the CIA triad—a paradigm that includes the information security qualities confidentiality, integrity, and availability—is how information security is assessed. In this paper, we have analyzed such scenarios. This study analysis provided dangers to cloud data security, cloud assaults, and found vulnerabilities for several factors affecting cloud computing.
改进云数据安全与隐私:措施与攻击
云环境在数据处理和共享方面的优势被全球数百万人所利用。云系统不可避免地必须提供数据安全和隐私。用户对信息的广泛使用和共享造成了安全漏洞。本研究旨在讨论云环境、其好处、困难,以及未来与安全数据处理和交换相关的研究趋势。这个广泛的问题是由一些企业越来越多地采用云计算引起的。因此,利用任何设备从云提供商的设施加载和接收数据都会带来各种安全和隐私风险,例如数据修改、数据丢失和被盗。内部人员未经授权的访问是可能出现的重大问题之一。尽管有各种方法可以防止云管理员获得非法访问,但这些方法都未能成功地阻止他们获得对云中的客户端数据的访问。系统可能向CIA三位一体提供的保护程度(包括信息安全质量保密性、完整性和可用性的范例)是评估信息安全的方式。在本文中,我们对这些场景进行了分析。本研究分析提供了云数据安全、云攻击的危险,并发现了影响云计算的几个因素的漏洞。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信