Data Security in Cloud Computing: Current Problems and Solution Proposals


Abstract views: 11 / PDF downloads: 11

Authors

DOI:

https://doi.org/10.5281/zenodo.14579855

Keywords:

Cloud Computing, Data Security, Encryption, Authentication, Artificial Intelligence, Blockchain, Cyber Security

Abstract

Cloud computing has become one of the cornerstones of modern information technologies with its features such as flexibility, cost advantage and accessibility. However, the increasing demand for this technology raises serious concerns about data security and privacy. This article discusses current issues related to data security in cloud computing and discusses proposed solutions to overcome these issues. In particular, strategies such as data encryption, authentication, authorization mechanisms and artificial intelligence-based security tools are examined. In addition, new approaches and technological trends to improve data security in the future were evaluated. This study aims to provide an important guide on secure data management in cloud computing for both researchers and industry professionals.

References

Aloul, F., Zahidi, S., & El-Hajj, W. (2009, May). Two-factor authentication using mobile phones. In 2009 IEEE/ACS International Conference on Computer Systems and Applications (pp. 641–644). IEEE.

Amazon Web Services. (2024). What is Amazon VPC? https://docs.aws.amazon.com/vpc/latest/userguide/what-is-amazon-vpc.html

Armbrust, M., Fox, A., Griffith, R., Joseph, A. D., Katz, R. H., Konwinski, A., & Zaharia, M. (2010). A view of cloud computing. Communications of the ACM, 53(4), 50–58. https://doi.org/10.1145/1721654.1721672

AWS. (2024). Amazon Web Services. https://aws.amazon.com

Azure. (2024). Turn AI curious into AI capable. https://azure.microsoft.com

Azure Arc. (2024). Azure Arc. https://azure.microsoft.com/en-us/products/azure-arc

Azure Stack. (2024). Azure Stack. https://azure.microsoft.com/en-us/products/local

Barona, R., & Anita, E. M. (2017). A survey on data breach challenges in cloud computing security: Issues and threats. In 2017 International Conference on Circuit, Power and Computing Technologies (ICCPCT) (pp. 1–8). IEEE.

Booth, A., Papaioannou, D., & Sutton, A. (2012). Systematic approaches to a successful literature review. SAGE Publications.

Braun, V., & Clarke, V. (2006). Using thematic analysis in psychology. Qualitative Research in Psychology, 3(2), 77–101.

Buyya, R., Yeo, C. S., Venugopal, S., Broberg, J., & Brandic, I. (2009). Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the 5th utility. Future Generation Computer Systems, 25(6), 599–616.

Buczak, A. L., & Guven, E. (2015). A survey of data mining and machine learning methods for cyber security intrusion detection. IEEE Communications surveys & tutorials, 18(2), 1153-1176.

California Community Colleges Cloud. (2024, Kasım 19). Common Cloud Data Platform Demonstration Project. https://www.cccco.edu/About-Us/Vision-2030/vision-2030-demonstration-projects/common-cloud-data-platform

Carr, N. G. (2008). The big switch: Rewiring the world, from Edison to Google. W. W. Norton & Company.

CERN Cloud. (2024). CERN Cloud. https://home.cern/science/experiments/cloud

Cloudflare. (2024). Discover the connectivity cloud. https://www.cloudflare.com

Cyberwebeyeos. (2024). Cloudflare, tarihin en büyük DDoS saldırısını önledi. https://cyberwebeyeos.com/haberler/cloudflare-tarihin-en-buyuk-ddos-saldirisini-onledi

Dai, H., Zheng, Z., Zhang, Y., Chen, S., & Zhang, L. (2019). Blockchain for Internet of Things: A survey. IEEE Internet of Things Journal, 6(5), 8076–8094.

Dorsala, M. R., Sastry, V. N., & Chapram, S. (2021). Blockchain-based solutions for cloud computing: A survey. Journal of Network and Computer Applications, 196, 103246.

Fink, A. (2019). Conducting research literature reviews: From the internet to paper (5th ed.). Sage Publications.

Gartner (2023). Gartner says cloud will become a business necessity by 2028. Gartner Research. https://www.gartner.com/en/newsroom/press-releases/2023-11-29-gartner-says-cloud-will-become-a-business-necessity-by-2028

Gonzalez, N., Miers, C., Redigolo, F., Simplicio, M., Carvalho, T., Näslund, M., & Pourzandi, M. (2012). A quantitative analysis of current security concerns and solutions for cloud computing. Journal of Cloud Computing: Advances, Systems and Applications, 1(1), 1–18.

Gentry, C. (2009). Fully homomorphic encryption using ideal lattices. In Proceedings of the forty-first annual ACM symposium on Theory of computing (pp. 169-178).

GCP. (2024). Google Cloud Platform. https://cloud.google.com

Hackius, N., & Petersen, M. (2017). Blockchain in logistics and supply chain: Trick or treat? In Proceedings of the Hamburg International Conference of Logistics (HICL), (pp. 3-18). https://doi.org/10.15480/882.1444

Hashizume, K., Rosado, D. G., Fernández-Medina, E., & Fernández, E. B. (2013). An analysis of security issues for cloud computing. Journal of Internet Services and Applications, 4(1), Article 5. https://doi.org/10.1186/1869-0238-4-5

IBM Security. (2024). Cost of a data breach report 2024. IBM. https://www.ibm.com/reports/data-breach

IBM Cloud. (2024). Hybrid cloud solutions. IBM. https://www.ibm.com/hybrid-cloud

JpMorgan. (2024). Next-generation financial infrastructure. https://www.jpmorgan.com/kinexys/index

Kanagasabapathi, K., Deepak, S., & Prakash, P. (2016). A study on security issues in cloud computing. In L. P. Suresh, B. K. Panigrahi, S. C. Satapathy, & N. K. Kamila (Eds.), Proceedings of the International Conference on Soft Computing Systems: ICSCS 2015, Volume 2 (pp. 167–175).

Kindervag, J. (2010). No more chewy centers: Introducing the zero trust model of information security. Forrester Research.

Kişisel Verileri Koruma Kurumu. (2024). Kişisel Verilerin Korunması Kanunu. Kişisel Verileri Koruma Kurumu. https://kvkk.gov.tr

Kitchenham, B. (2004). Procedures for performing systematic reviews (Technical Report No. 33). Keele University.

Kshetri, N. (2013). Privacy and security issues in cloud computing: The role of institutions and institutional evolution. Telecommunications Policy, 37(4–5), 372–386. https://doi.org/10.1016/j.telpol. 2012.04.011

Marinos, A., & Briscoe, G. (2009). Community cloud computing. In Proceedings of the First International Conference on Cloud Computing.

MediBloc. (2024). Own your health data. It's rightfully yours. https://medibloc.com

Mell, P., & Grance, T. (2011). The NIST definition of cloud computing. National Institute of Standards and Technology Special Publication (SP) 800-145. https://doi.org/10.6028/NIST.SP.800-145

MIT Digital Certificates. (2024). Digital Transformation. https://professionalprograms.mit.edu/professional-certificate-program-in-digital-transformation

Owasp. (2024). Comparison between 2016 and 2024. https://owasp.org/www-project-mobile-top-10

Power Ledger. (2024). Power Ledger Blockchain. https://powerledger.io

Ristenpart, T., Tromer, E., Shacham, H., & Savage, S. (2009, November). Hey, you, get off of my cloud: Exploring information leakage in third-party compute clouds. In Proceedings of the 16th ACM Conference on Computer and Communications Security (pp. 199–212). ACM.

Rittinghouse, J. W., & Ransome, J. F. (2010). Cloud computing: Implementation, management, and security. CRC Press.

Russon, M. (2021). ABD'de siber saldırı: Bilgisayar korsanları ülkenin en büyük boru hattını devre dışı bıraktı, akaryakıt karayoluyla taşınacak. BBC World. https://www.bbc.com/turkce/haberler-dunya-57056048

Subashini, S., & Kavitha, V. (2011). A survey on security issues in service delivery models of cloud computing. Journal of Network and Computer Applications, 34(1), 1–11. https://doi.org/10.1016/j.jnca.2010.07.006

Shukla, D. K., Dwivedi, V. K., & Trivedi, M. C. (2021). Encryption algorithm in cloud computing. Materials Today: Proceedings, 37, 1869–1875.

Torraco, R. J. (2005). Writing integrative literature reviews: Guidelines and examples. Human Resource Development Review, 4(3), 356–367. https://doi.org/10.1177/1534484305278283

TradeLens. (2024). Yılport Holding IBM ve Maersk’in blokzinciri platformuna katıldı. https://bctr.org/yilport-holding-ibm-ve-maerskin-blokzinciri-platformuna-katildi-17874

Tschorsch, F., & Scheuermann, B. (2016). Bitcoin and beyond: A technical survey on decentralized digital currencies. IEEE Communications Surveys & Tutorials, 18(3), 2084-2123.

VMware. (2024). What is private cloud? https://www.vmware.com/topics/private-cloud

Zissis, D., & Lekkas, D. (2012). Addressing cloud computing security issues. Future Generation Computer Systems, 28(3), 583–592. https://doi.org/10.1016/j.future.2010.12.006

Zhang, Q., Cheng, L., & Boutaba, R. (2010). Cloud computing: State-of-the-art and research challenges. Journal of Internet Services and Applications, 1(1), 7–18.

Zheng, Z., Xie, S., Dai, H., Chen, X., & Wang, H. (2018). Blockchain challenges and opportunities: A survey. International Journal of Web and Grid Services, 14(4), 352–375.

Zhou, C., Barati, M., & Shafiq, O. (2023). A compliance-based architecture for supporting GDPR accountability in cloud computing. Future Generation Computer Systems, 145, 104–120.

Published

2024-12-31

How to Cite

Of, M., & Kılıçaslan, İsmail. (2024). Data Security in Cloud Computing: Current Problems and Solution Proposals. INTERNATIONAL JOURNAL OF SOCIAL HUMANITIES SCIENCES RESEARCH, 11(114), 2694–2714. https://doi.org/10.5281/zenodo.14579855