Bulut Bilişimde Veri Güvenliği: Güncel Sorunlar ve Çözüm Önerileri
Abstract views: 2 / PDF downloads: 7
DOI:
https://doi.org/10.5281/zenodo.14579855Anahtar Kelimeler:
Bulut Bilişim, Veri Güvenliği, Şifreleme, Kimlik Doğrulama, Yapay Zekâ, Blockchain, Siber GüvenlikÖzet
Bulut bilişim, sağladığı esneklik, maliyet avantajı ve erişilebilirlik gibi özelliklerle modern bilgi teknolojilerinin temel taşlarından biri haline gelmiştir. Ancak, bu teknolojiye olan talebin artışı, veri güvenliği ve mahremiyet konularında ciddi endişeleri beraberinde getirmektedir. Bu makale, bulut bilişimde veri güvenliği ile ilgili güncel sorunları ele almakta ve bu sorunların üstesinden gelmek için önerilen çözüm yöntemlerini tartışmaktadır. Özellikle veri şifreleme, kimlik doğrulama, yetkilendirme mekanizmaları ve yapay zekâ tabanlı güvenlik araçları gibi stratejiler incelenmiştir. Ayrıca, gelecekte veri güvenliğini artırmaya yönelik yeni yaklaşımlar ve teknolojik eğilimler değerlendirilmiştir. Bu çalışma hem araştırmacılara hem de sektör uzmanlarına bulut bilişimde güvenli veri yönetimi konusunda önemli bir rehber sunmayı hedeflemektedir.
Referanslar
Aloul, F., Zahidi, S., & El-Hajj, W. (2009, May). Two-factor authentication using mobile phones. In 2009 IEEE/ACS International Conference on Computer Systems and Applications (pp. 641–644). IEEE.
Amazon Web Services. (2024). What is Amazon VPC? https://docs.aws.amazon.com/vpc/latest/userguide/what-is-amazon-vpc.html
Armbrust, M., Fox, A., Griffith, R., Joseph, A. D., Katz, R. H., Konwinski, A., & Zaharia, M. (2010). A view of cloud computing. Communications of the ACM, 53(4), 50–58. https://doi.org/10.1145/1721654.1721672
AWS. (2024). Amazon Web Services. https://aws.amazon.com
Azure. (2024). Turn AI curious into AI capable. https://azure.microsoft.com
Azure Arc. (2024). Azure Arc. https://azure.microsoft.com/en-us/products/azure-arc
Azure Stack. (2024). Azure Stack. https://azure.microsoft.com/en-us/products/local
Barona, R., & Anita, E. M. (2017). A survey on data breach challenges in cloud computing security: Issues and threats. In 2017 International Conference on Circuit, Power and Computing Technologies (ICCPCT) (pp. 1–8). IEEE.
Booth, A., Papaioannou, D., & Sutton, A. (2012). Systematic approaches to a successful literature review. SAGE Publications.
Braun, V., & Clarke, V. (2006). Using thematic analysis in psychology. Qualitative Research in Psychology, 3(2), 77–101.
Buyya, R., Yeo, C. S., Venugopal, S., Broberg, J., & Brandic, I. (2009). Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the 5th utility. Future Generation Computer Systems, 25(6), 599–616.
Buczak, A. L., & Guven, E. (2015). A survey of data mining and machine learning methods for cyber security intrusion detection. IEEE Communications surveys & tutorials, 18(2), 1153-1176.
California Community Colleges Cloud. (2024, Kasım 19). Common Cloud Data Platform Demonstration Project. https://www.cccco.edu/About-Us/Vision-2030/vision-2030-demonstration-projects/common-cloud-data-platform
Carr, N. G. (2008). The big switch: Rewiring the world, from Edison to Google. W. W. Norton & Company.
CERN Cloud. (2024). CERN Cloud. https://home.cern/science/experiments/cloud
Cloudflare. (2024). Discover the connectivity cloud. https://www.cloudflare.com
Cyberwebeyeos. (2024). Cloudflare, tarihin en büyük DDoS saldırısını önledi. https://cyberwebeyeos.com/haberler/cloudflare-tarihin-en-buyuk-ddos-saldirisini-onledi
Dai, H., Zheng, Z., Zhang, Y., Chen, S., & Zhang, L. (2019). Blockchain for Internet of Things: A survey. IEEE Internet of Things Journal, 6(5), 8076–8094.
Dorsala, M. R., Sastry, V. N., & Chapram, S. (2021). Blockchain-based solutions for cloud computing: A survey. Journal of Network and Computer Applications, 196, 103246.
Fink, A. (2019). Conducting research literature reviews: From the internet to paper (5th ed.). Sage Publications.
Gartner (2023). Gartner says cloud will become a business necessity by 2028. Gartner Research. https://www.gartner.com/en/newsroom/press-releases/2023-11-29-gartner-says-cloud-will-become-a-business-necessity-by-2028
Gonzalez, N., Miers, C., Redigolo, F., Simplicio, M., Carvalho, T., Näslund, M., & Pourzandi, M. (2012). A quantitative analysis of current security concerns and solutions for cloud computing. Journal of Cloud Computing: Advances, Systems and Applications, 1(1), 1–18.
Gentry, C. (2009). Fully homomorphic encryption using ideal lattices. In Proceedings of the forty-first annual ACM symposium on Theory of computing (pp. 169-178).
GCP. (2024). Google Cloud Platform. https://cloud.google.com
Hackius, N., & Petersen, M. (2017). Blockchain in logistics and supply chain: Trick or treat? In Proceedings of the Hamburg International Conference of Logistics (HICL), (pp. 3-18). https://doi.org/10.15480/882.1444
Hashizume, K., Rosado, D. G., Fernández-Medina, E., & Fernández, E. B. (2013). An analysis of security issues for cloud computing. Journal of Internet Services and Applications, 4(1), Article 5. https://doi.org/10.1186/1869-0238-4-5
IBM Security. (2024). Cost of a data breach report 2024. IBM. https://www.ibm.com/reports/data-breach
IBM Cloud. (2024). Hybrid cloud solutions. IBM. https://www.ibm.com/hybrid-cloud
JpMorgan. (2024). Next-generation financial infrastructure. https://www.jpmorgan.com/kinexys/index
Kanagasabapathi, K., Deepak, S., & Prakash, P. (2016). A study on security issues in cloud computing. In L. P. Suresh, B. K. Panigrahi, S. C. Satapathy, & N. K. Kamila (Eds.), Proceedings of the International Conference on Soft Computing Systems: ICSCS 2015, Volume 2 (pp. 167–175).
Kindervag, J. (2010). No more chewy centers: Introducing the zero trust model of information security. Forrester Research.
Kişisel Verileri Koruma Kurumu. (2024). Kişisel Verilerin Korunması Kanunu. Kişisel Verileri Koruma Kurumu. https://kvkk.gov.tr
Kitchenham, B. (2004). Procedures for performing systematic reviews (Technical Report No. 33). Keele University.
Kshetri, N. (2013). Privacy and security issues in cloud computing: The role of institutions and institutional evolution. Telecommunications Policy, 37(4–5), 372–386. https://doi.org/10.1016/j.telpol. 2012.04.011
Marinos, A., & Briscoe, G. (2009). Community cloud computing. In Proceedings of the First International Conference on Cloud Computing.
MediBloc. (2024). Own your health data. It's rightfully yours. https://medibloc.com
Mell, P., & Grance, T. (2011). The NIST definition of cloud computing. National Institute of Standards and Technology Special Publication (SP) 800-145. https://doi.org/10.6028/NIST.SP.800-145
MIT Digital Certificates. (2024). Digital Transformation. https://professionalprograms.mit.edu/professional-certificate-program-in-digital-transformation
Owasp. (2024). Comparison between 2016 and 2024. https://owasp.org/www-project-mobile-top-10
Power Ledger. (2024). Power Ledger Blockchain. https://powerledger.io
Ristenpart, T., Tromer, E., Shacham, H., & Savage, S. (2009, November). Hey, you, get off of my cloud: Exploring information leakage in third-party compute clouds. In Proceedings of the 16th ACM Conference on Computer and Communications Security (pp. 199–212). ACM.
Rittinghouse, J. W., & Ransome, J. F. (2010). Cloud computing: Implementation, management, and security. CRC Press.
Russon, M. (2021). ABD'de siber saldırı: Bilgisayar korsanları ülkenin en büyük boru hattını devre dışı bıraktı, akaryakıt karayoluyla taşınacak. BBC World. https://www.bbc.com/turkce/haberler-dunya-57056048
Subashini, S., & Kavitha, V. (2011). A survey on security issues in service delivery models of cloud computing. Journal of Network and Computer Applications, 34(1), 1–11. https://doi.org/10.1016/j.jnca.2010.07.006
Shukla, D. K., Dwivedi, V. K., & Trivedi, M. C. (2021). Encryption algorithm in cloud computing. Materials Today: Proceedings, 37, 1869–1875.
Torraco, R. J. (2005). Writing integrative literature reviews: Guidelines and examples. Human Resource Development Review, 4(3), 356–367. https://doi.org/10.1177/1534484305278283
TradeLens. (2024). Yılport Holding IBM ve Maersk’in blokzinciri platformuna katıldı. https://bctr.org/yilport-holding-ibm-ve-maerskin-blokzinciri-platformuna-katildi-17874
Tschorsch, F., & Scheuermann, B. (2016). Bitcoin and beyond: A technical survey on decentralized digital currencies. IEEE Communications Surveys & Tutorials, 18(3), 2084-2123.
VMware. (2024). What is private cloud? https://www.vmware.com/topics/private-cloud
Zissis, D., & Lekkas, D. (2012). Addressing cloud computing security issues. Future Generation Computer Systems, 28(3), 583–592. https://doi.org/10.1016/j.future.2010.12.006
Zhang, Q., Cheng, L., & Boutaba, R. (2010). Cloud computing: State-of-the-art and research challenges. Journal of Internet Services and Applications, 1(1), 7–18.
Zheng, Z., Xie, S., Dai, H., Chen, X., & Wang, H. (2018). Blockchain challenges and opportunities: A survey. International Journal of Web and Grid Services, 14(4), 352–375.
Zhou, C., Barati, M., & Shafiq, O. (2023). A compliance-based architecture for supporting GDPR accountability in cloud computing. Future Generation Computer Systems, 145, 104–120.
İndir
Yayınlanmış
Nasıl Atıf Yapılır
Sayı
Bölüm
Lisans
Telif Hakkı (c) 2024 International Journal of Social and Humanities Sciences Research (JSHSR)
Bu çalışma Creative Commons Attribution 4.0 International License ile lisanslanmıştır.