Ashish P. Joshi, Aditya Raturi, Santosh Kumar, A. Dumka, D. P. Singh
{"title":"Improved Security and Privacy in Cloud Data Security and Privacy: Measures and Attacks","authors":"Ashish P. Joshi, Aditya Raturi, Santosh Kumar, A. Dumka, D. P. Singh","doi":"10.1109/ICFIRTP56122.2022.10063186","DOIUrl":null,"url":null,"abstract":"The advantages of the cloud environment for data processing and sharing are utilized by millions of people worldwide. A cloud system must inevitably provide data security and privacy. Users' widespread use and sharing of information creates security gaps. This study aims to discuss the cloud environment, its benefits, difficulties, and upcoming research trends pertaining to safe data processing and exchange. The widespread issue is caused by the increased adoption of cloud computing by several enterprises. As a result, utilizing any device to load and receive data from the cloud providers' facilities raises various security and privacy risks, such as data modification, data loss, and theft. Unauthorized access by insiders is one of the significant problems that might develop. Although there are various ways to prevent cloud administrators from gaining illegal access, such methods haven't been successful in keeping them from gaining access to client data in the cloud.The degree of protection a system may offer to the CIA triad—a paradigm that includes the information security qualities confidentiality, integrity, and availability—is how information security is assessed. In this paper, we have analyzed such scenarios. This study analysis provided dangers to cloud data security, cloud assaults, and found vulnerabilities for several factors affecting cloud computing.","PeriodicalId":413065,"journal":{"name":"2022 International Conference on Fourth Industrial Revolution Based Technology and Practices (ICFIRTP)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 International Conference on Fourth Industrial Revolution Based Technology and Practices (ICFIRTP)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICFIRTP56122.2022.10063186","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
The advantages of the cloud environment for data processing and sharing are utilized by millions of people worldwide. A cloud system must inevitably provide data security and privacy. Users' widespread use and sharing of information creates security gaps. This study aims to discuss the cloud environment, its benefits, difficulties, and upcoming research trends pertaining to safe data processing and exchange. The widespread issue is caused by the increased adoption of cloud computing by several enterprises. As a result, utilizing any device to load and receive data from the cloud providers' facilities raises various security and privacy risks, such as data modification, data loss, and theft. Unauthorized access by insiders is one of the significant problems that might develop. Although there are various ways to prevent cloud administrators from gaining illegal access, such methods haven't been successful in keeping them from gaining access to client data in the cloud.The degree of protection a system may offer to the CIA triad—a paradigm that includes the information security qualities confidentiality, integrity, and availability—is how information security is assessed. In this paper, we have analyzed such scenarios. This study analysis provided dangers to cloud data security, cloud assaults, and found vulnerabilities for several factors affecting cloud computing.