Analysis of Key Technologies for Data Security Protection Based on Cloud Computing

Authors

  • Ruizhe Li

DOI:

https://doi.org/10.62051/ijcsit.v4n1.30

Keywords:

Cloud Computing, Data Security, Encryption Algorithms, Access Control

Abstract

With the rapid development of cloud computing, more and more enterprises and institutions are migrating their data and business operations to the cloud. However, this shift has brought data security issues in cloud environments to the forefront. This paper primarily investigates the key technologies for data security protection in cloud computing environments. It begins by introducing the basic concepts and architecture of cloud computing and analyzing the fundamental concepts and threats related to data security protection. The paper then delves into critical technologies such as data encryption, access control, data storage and backup security, and data privacy protection, detailing the algorithmic principles and implementation methods of these technologies. Additionally, the paper explores the challenges faced by current cloud computing data security protection technologies and their corresponding solutions, analyzing the effectiveness of these technologies through practical case studies. Finally, the paper forecasts the future development trends of cloud computing data security technologies, particularly the potential impact of emerging technologies on data security protection. This research aims to provide theoretical and technical support for data security protection in cloud computing environments.

Downloads

Download data is not yet available.

References

[1] Yang, Pan, Naixue Xiong, and Jingli Ren. "Data security and privacy protection for cloud storage: A survey." Ieee Access 8 (2020): 131723-131740.

[2] Pawar, Ankush Balaram, Shashikant U. Ghumbre, and Rashmi M. Jogdand. "Privacy preserving model-based authentication and data security in cloud computing." International Journal of Pervasive Computing and Communications 19.2 (2023): 173-190.

[3] Mohammed, Shameer, et al. "A new lightweight data security system for data security in the cloud computing." Measurement: Sensors 29 (2023): 100856.

[4] Sauber, Amr M., et al. "A new secure model for data protection over cloud computing." Computational Intelligence and Neuroscience 2021.1 (2021): 8113253.

[5] Wang, Zhiying, et al. "An empirical study on business analytics affordances enhancing the management of cloud computing data security." International Journal of Information Management 50 (2020): 387-394.

[6] Tai, Wei-Liang, Ya-Fen Chang, and Wen-Hsin Huang. "Security Analyses of a Data Collaboration Scheme with Hierarchical Attribute-based Encryption in Cloud Computing." Int. J. Netw. Secur. 22.2 (2020): 212-217.

[7] Bo S, Zhang Y, Huang J, et al. Attention Mechanism and Context Modeling System for Text Mining Machine Translation [J]. arXiv preprint arXiv:2408.04216, 2024.

[8] Sood S K. A combined approach to ensure data security in cloud computing [J]. Journal of Network and Computer Applications, 2012, 35(6): 1831-1838.

[9] Wang Z, Yan H, Wei C, et al. Research on Autonomous Driving Decision-making Strategies based Deep Reinforcement Learning [J]. arXiv preprint arXiv:2408.03084, 2024.

[10] Baek J, Vu Q H, Liu J K, et al. A secure cloud computing based framework for big data information management of smart grid [J]. IEEE transactions on cloud computing, 2014, 3(2): 233-244.

Downloads

Published

13-09-2024

Issue

Section

Articles

How to Cite

Li, R. (2024). Analysis of Key Technologies for Data Security Protection Based on Cloud Computing. International Journal of Computer Science and Information Technology, 4(1), 243-252. https://doi.org/10.62051/ijcsit.v4n1.30