Data security in cloud computing

Data security in cloud computing abstract

Data security in cloud computing: Cloud computing offers a massive pool of resources and services that cloud users can utilize for storing and processing their information. The users can flexibly control and reduce their operational expenditures, whereas resources provisioned from the clouds may be dynamically resized to meet their demand and especially budgets. 

The user, however, has to consider unanticipated and expensive prices from threats associated with attacks aiming for the user’s data in the cloud. In this article, we discuss the primary causes of new attack vectors that create a multitude of data security problems in clouds. We discuss specific data security challenges in clouds and provide a classification that can help in an easier understanding.

what is data security

Data security in cloud computing Introduction

Data security in cloud computing: Data security in Cloud computing has changed the method we view capital and operational expenses in information technology (IT) and has changed the way infrastructures are designed in the current computing age. 

Data security in Cloud computing has massively removed start-up costs for new companies and has influenced how we store and process data. Organizations may choose cloud computing because of a number of key business objectives such as reduced operational costs, reduced complexity, easily scale up and down, immediate access to resources, lower barrier to innovation, etc. The eventual effect of using clouds for IT needs, however, is that an organization’s information leaves its premises and is offloaded to the cloud.

Across Data security in cloud computing environments, data is the fundamental asset that we need to secure. Seen from a data-centric point of view, everything else, policies, including the cloud computing infrastructure, processes, and regulations, are peripherals and are used to support the storage, processing, movement logging, and handling of data. The cloud computing infrastructure which is used for the storage, processing, movement logging, and handling of data does not belong to the data owner which has subscribed to the cloud services.

Cloud Storage Services


This separation of data owners and their data raises new questions for data security which require novel solutions. These solutions should provide answers to user concerns such as the trustworthiness of the cloud service providers, security of data in distributed environments and across devices, accountability of the cloud service provider, protection against insider attacks in the cloud, and so on. Cloud computing also introduces a shared environment for users and their data.

The physical resources are virtualized and shared among several users. Thus, a user’s application may be using the same physical hardware as many others. The opaqueness in the cloud environment means the user doesn't know with whom the resources are shared. This shared environment and it is opaqueness poses new challenges of it is own such as the issues of data isolation, provable data deletion, data remanence, data leakage, and data integrity among others. One of the characteristics of cloud computing is globally located servers. 

Best Cloud Storage


Cloud service suppliers may migrate resources from one location to another and redistribute them over multiple global data centers to achieve internal goals such as resource consolidation, better resource utilization, and high network performance. This allows clouds to utilize their resources more efficiently and also provides users with quicker network access and higher reliability. 

This geo-distribution, however, introduces security issues of its own such as the complex interplay of the data privacy laws of multiple territories, issues with the provenance, tracing, and auditing of data that is distributed globally, etc.

It's important to understand the threats and security issues that emerge when data is offloaded from a traditional perimeter-bound IT infrastructure to a cloud or multiple clouds. In this article, we attempt to study the underlying causes of many of these attacks. Moreover, as these issues don't emerge in isolation, we provide a simple classification of data security issues in cloud computing on the basis of the state of data.