Data Security Issues in Intelligent Cloud Computing Systems
DOI:
https://doi.org/10.62051/ijcsit.v4n1.12Keywords:
Cloud computing systems, Data securityAbstract
This project takes the intelligent cloud computing system as the main research object. It mainly uses the literature analysis method to explore the data security problems in the intelligent cloud computing system. By investigating the development background of intelligent cloud computing, the author summarizes the definition of cloud computing and the characteristics of cloud computing. The author also makes a specific analysis of the advantages of cloud computing, and concludes that cloud computing is possible through safe and reliable data, low demand for clients, shared cloud data and unlimited possibilities. These four points are the main reasons major enterprises choose cloud computing to replace traditional computing resources. In the topic, the author studied the data security problems in cloud computing from three aspects: the problems exposed in the development process of cloud computing, the effective measures to protect data security in cloud computing and predicting the future development trend of improving data security. The authors believe that future research should focus on a balance between network security issues in cloud computing and building a secure and reliable data system.
Downloads
References
[1] Admass, W.S., Munaye, Y.Y., & Diro, A.A. (2023). Cyber security: State of the art, challenges and future directions. Cyber Security and Applications, 2, 100031. https://doi.org/10.1016/j.csa.2023.100031
[2] Almudarra, F., & Qureshi, B. (2014). Issues in Adopting Agile Development Principles for Mobile Cloud Computing Applications. Procedia Computer Science, 52, 1133-1140. https://doi.org/10.1016/j.procs.2015.05.131
[3] Belal, M.M., & Sundaram, D.M. (2022). A comprehensive review on intelligent security defences in the cloud: Taxonomy, security issues, ML/DL techniques, challenges and future trends.Journal of King Saud University - Computer and Information Sciences, 34(10), 9102-9131. https://doi.org/10.1016/j.jksuci.2022.08.035
[4] Brzozowska-Rup, K., Nowakowska, M., & Zdradzisz, M. (2024). Cloud computing in the Polish public administration: Current state and development prospects.Technological Forecasting and Social Change, 205, 123500. https://doi.org/10.1016/j.techfore.2024.123500
[5] Ferrer, A.J., Pérez, D.G., & González, R.S. (2015). Multi-cloud Platform-as-a-service Model, Functionalities and Approaches. Procedia Computer Science, 97, 63-72. https://doi.org/10.1016/j.procs.2016.08.281
[6] Galego, N.M.C., Martinho, D.S., & Duarte, N.M. (2023). Cloud computing for big data analytics How cloud computing can handle processing large amounts of data and improve real-time data analytics.Procedia Computer Science, 237, 297-304. https://doi.org/10.1016/j.procs.2024.05.108
[7] He Ming, Zheng Xiang, Lai Hai-Guang & Jiang Feng. (2010). Development and application of cloud computing technology. Telecommunication Science (05), 42-46.
[8] Hosny, K.M., Awad, A.I., Said, W., Elmezain, M., Mohamed, E.R., & Khashaba, M.M. (2024). Enhanced whale optimization algorithm for dependent tasks offloading problem in multi-edge cloud computing. Alexandria Engineering Journal, 97, 302-318. https://doi.org/10.1016/j.aej.2024.04.038
[9] Karamany, T.S., & Yakoub, A. (2024). A hybrid approach to secure and compress data streams in a cloud computing environment. Journal of King Saud University - Computer and Information Sciences, 36(3), 101999. https://doi.org/10.1016/j.jksuci.2024.101999
[10] Kumar, P.R., Raj, P.H., & Jelciana, P. (2017). Exploring Data Security Issues and Solutions in Cloud Computing. Procedia Computer Science, 125, 691-697. https://doi.org/10.1016/j.procs.2017.12.089
[11] Makwe, A., Kanungo, P., Kautish, S., Madhu, G., Almazyad, A.S., Xiong, G., & Mohamed, A.W. (2024). Cloud service prioritization using a Multi-Criteria Decision-Making technique in a cloud computing environment. Ain Shams Engineering Journal, 15(7), 102785. https://doi.org/10.1016/j.asej.2024.102785
[12] Manogaran, G., Thota, C., & Kumar, M.V. (2015). MetaCloudDataStorage Architecture for Big Data Security in Cloud Computing. Procedia Computer Science, 87, 128-133. https://doi.org/10.1016/j.procs.2016.05.138
[13] Mohammed, S., Nanthini, S., Bala Krishna, N., Srinivas, I.V., Rajagopal, M., & Ashok Kumar, M. (2023). A new lightweight data security system for data security in cloud computing.Measurement: Sensors, 29, 100856. https://doi.org/10.1016/j.measen.2023.100856
[14] Musarat, M.A., Alaloul, W.S., Khan, M.H.F., Ayub, S., & Guy, C.P.L. (2024). Evaluating cloud computing in construction projects to avoid project delay. Journal of Open Innovation: Technology, Market, and Complexity, 10(2), 100296. https://doi.org/10.1016/j.joitmc.2024.100296
[15] Prasad, S.N., & Rekha, C. (2023). Blockchain-based IAS protocol to enhance security and privacy in cloud computing. Measurement: Sensors, 28, 100813. https://doi.org/10.1016/j.measen.2023.100813
[16] Qazi, F., Kwak, D., Khan, F.G., Ali, F., & Khan, S.U. (2024). Service Level Agreement in cloud computing: Taxonomy, prospects, and challenges.Internet of Things, 25, 101126. https://doi.org/10.1016/j.iot.2024.101126
[17] Ranganatha Rao, B., & Sujatha, B. (2023). A hybrid elliptic curve cryptography (HECC) technique for fast encryption of data for public cloud security.Measurement: Sensors, 29, 100870. https://doi.org/10.1016/j.measen.2023.100870
[18] Shivaramakrishna, D., & Nagaratna, M. (2023). A novel hybrid cryptographic framework for secure data storage in cloud computing: Integrating AES-OTP and RSA with adaptive key management and Time-Limited access control.Alexandria Engineering Journal, 84, 275-284. https://doi.org/10.1016/j.aej.2023.10.054
[19] Singh, A.P., & Pasupuleti, S.K. (2015). Optimized Public Auditing and Data Dynamics for Data Storage Security in Cloud Computing.Procedia Computer Science, 93, 751-759. https://doi.org/10.1016/j.procs.2016.07.286
[20] Teng P. (2012). Development analysis of cloud computing technology and its application. Information Network Security (11), 89-91.
[21] Visalaxi, G., & Muthukumaravel, A. (2023). IoT monitoring membrane computing based on quantum inspiration to enhance security in the cloud network. Measurement: Sensors, 27, 100755. https://doi.org/10.1016/j.measen.2023.100755
[22] Wang, Z., Sun, G., & Chen, D. (2014). A new definition of homomorphic signature for identity management in mobile cloud computing.Journal of Computer and System Sciences, 80(3), 546-553. https://doi.org/10.1016/j.jcss.2013.06.010
[23] Yu, Y., Miyaji, A., Au, M.H., & Susilo, W. (2017). Cloud computing security and privacy: Standards and regulations. Computer Standards & Interfaces, 54, 1-2. https://doi.org/10.1016/j.csi.2017.03.005
Downloads
Published
Issue
Section
License

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.







