(Publisher of Peer Reviewed Open Access Journals)

International Journal of Advanced Computer Research (IJACR)

ISSN (Print):2249-7277    ISSN (Online):2277-7970
Volume-6 Issue-27 November-2016
Full-Text PDF
DOI:10.19101/IJACR.2016.626005
Paper Title : Review of solutions for securing end user data over cloud applications
Author Name : Akashdeep Bhardwaj, GVB Subramanyam, Vinay Avasthi and Hanumat Sastry
Abstract :

There is an urgent need of solutions for end user data protection and privacy during the times when migrating from one cloud service provider to another. This paper reviews the challenges in cloud computing services regarding end user data, analyzing the issues and presented solutions to overcome them. The end user data required to be protected in four different ways ranging from usage data which is the information collected from computer systems, the second is the sensitive information on health and bank accounts, third is the personally identifiable information; information to identify an individual and finally is the unique device identity information that is uniquely traceable like IP addresses, unique hardware identities (media access control (MAC) address). By using solution paths such as digital keys, multi factor authentication and cloud aware applications. This paper identifies end users data security issues when using cloud computing services. The focus is directed to critical issues related to unauthorized access for integrity during data in transit. It can be addressed using public key cryptography or public key infrastructure (PKI) for confidentiality and data integrity of end user data over the cloud. Then for migrating from one cloud service provider to another, data security and privacy are addressed by cloud aware applications. Lastly, using multi factor authentication combined with network and application detection systems, intrusion detection systems and network traffic routing in case of cyber-attacks, can help in denial of service attack mitigation or prevent man in the middle and network snooping attacks in cloud computing.

Keywords : Cloud security, Cloud computing, Public key cryptography, PKI.
Cite this article : Akashdeep Bhardwaj, GVB Subramanyam, Vinay Avasthi and Hanumat Sastry, " Review of solutions for securing end user data over cloud applications " , International Journal of Advanced Computer Research (IJACR), Volume-6, Issue-27, November-2016 ,pp.222-229.DOI:10.19101/IJACR.2016.626005
References :
[1]Schutz C, Gao Y, Hou D, Powers S, Grimberg S, DeWaters J. A time series data transformation engine for non-programmer end users. In 3rd MEC international conference on big data and smart city (ICBDSC) 2016 (pp. 1-7). IEEE.
[Crossref] [Google Scholar]
[2]Bouchana S, Idrissi MA. Towards an assessment model of end user satisfaction and data quality in business intelligence systems. In 10th international conference on intelligent systems: theories and applications (SITA) 2015 (pp. 1-6). IEEE.
[Crossref] [Google Scholar]
[3]Salvi S, Sanjay HA, Rangavittala SR. An encryption, compression and key (ECK) management based data security framework for infrastructure as a service in cloud. In IEEE international advance computing conference (IACC) 2015 (pp. 872-6). IEEE.
[Crossref] [Google Scholar]
[4]Fallon L, OSullivan D. SECCO: a test framework for controlling and monitoring end user service sessions. In IEEE network operations and management symposium (NOMS) 2014 (pp. 1-7). IEEE.
[Crossref] [Google Scholar]
[5]Gholami A, Arani MG. A trust model based on quality of service in cloud computing environment. International Journal of Database Theory and Application. 2015; 8(5):161-70.
[Crossref] [Google Scholar]
[6]Hu J, Chen L, Wang Y, Chen SH. Data security access control model of cloud computing. In international conference on computer sciences and applications (CSA) 2013 (pp. 29-34). IEEE.
[Crossref] [Google Scholar]
[7]Zatakiya S, Tank P. A review of data security issues in cloud environment. International Journal of Computer Applications. 2013; 82(17):15-8.
[Crossref] [Google Scholar]
[8]Hemalatha N, Jenis A, Donald AC, Arockiam L. A comparative analysis of encryption techniques and data security issues in cloud computing. International Journal of Computer Applications. 2014; 96(16):1-6.
[Crossref] [Google Scholar]
[9]Xin Z, Song-qing L, Nai-wen L. Research on cloud computing data security model based on multi-dimension. In international symposium on information technology in medicine and education (ITME) 2012 (pp. 897-900). IEEE.
[Crossref] [Google Scholar]
[10]Wang JK, Jia X. Data security and authentication in hybrid cloud computing model. In IEEE global high tech congress on electronics (GHTCE) 2012 (pp. 117-20). IEEE.
[Crossref] [Google Scholar]
[11]Moghaddam FF, Moghaddam SG, Rouzbeh S, Araghi SK, Alibeigi NM, Varnosfaderani SD. A scalable and efficient user authentication scheme for cloud computing environments. In IEEE region 10 symposium 2014 (pp. 508-13). IEEE.
[Crossref] [Google Scholar]
[12]Hang F, Zhao L. Supporting end-user service composition: a systematic review of current activities and tools. In IEEE international conference on web services (ICWS) 2015 (pp. 479-86). IEEE.
[Crossref] [Google Scholar]
[13]Fidas C, Sintoris C, Yiannoutsou N, Avouris N. A survey on tools for end user authoring of mobile applications for cultural heritage. In 6th international conference on information, intelligence, systems and applications (IISA) 2015 (pp. 1-5). IEEE.
[Crossref] [Google Scholar]
[14]Tzeremes V, Gomaa H. XANA: an end user software product line framework for smart spaces. In 49th Hawaii international conference on system sciences (HICSS) 2016 (pp. 5831-40). IEEE.
[Crossref] [Google Scholar]
[15]Hylli O, Lahtinen S, Ruokonen A, Systä K. Resource description for end-user driven service compositions. In IEEE world congress on services 2014 (pp. 11-7). IEEE.
[Crossref] [Google Scholar]
[16]Yao X, Han X, Du X. A light-weight certificate-less public key cryptography scheme based on ECC. In 23rd international conference on computer communication and networks (ICCCN) 2014 (pp. 1-8). IEEE.
[Crossref] [Google Scholar]
[17]Vollala S, Varadhan VV, Geetha K, Ramasubramanian N. Efficient modular multiplication algorithms for public key cryptography. In IEEE international advance computing conference (IACC) 2014 (pp. 74-8). IEEE.
[Crossref] [Google Scholar]
[18]Han X, Wang B, Wang A, Wu L, Rhee W. Algorithm-based countermeasures against power analysis attacks for public-key cryptography SM2. In tenth international conference on computational intelligence and security (CIS) 2014 (pp. 435-9). IEEE.
[Crossref] [Google Scholar]