


Volume 20 No 20 (2022)
Download PDF
Securing Data in the Cloud: An Analysis of Privacy and Security Concern
Mohummed Washeem, Dr Tarun Maini, Sushant Jhingran, Gourishankar Mishra, Pradeep Kumar Mishra
Abstract
Storing and processing sensitive information on the cloud has raised serious privacy and
security concerns. Cloud computing poses various challenges such as data breaches, loss,
insider threats, lack of transparency, shared infrastructure, compliance issues, identity and
access management difficulties, data location and sovereignty concerns, and reliance on
cloud service providers. To protect sensitive data and comply with data privacy regulations, it
is crucial to implement a comprehensive privacy and security strategy in cloud computing.
Ensuring the security of cloud computing is vital for both individuals and businesses and
different cloud deployment models come with various security risks. A multi-faceted
approach involving both providers and tenants is required to tackle these challenges. This
article provides an overview of the primary privacy and security concerns in cloud computing
and explores various solutions. It also analyzes the challenges of implementing privacy and
security controls in the cloud and offers suggestions to improve privacy and security in cloud
computing, including encryption, access control, authentication, and advanced persistent
threat(APT) prevention. The objective of this paper is to provide recommendations for
addressing these concerns and increase awareness of the importance of privacy and security
in cloud computing
Keywords
Cloud computing, Security, Privacy
Copyright
Copyright © Neuroquantology
Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
Articles published in the Neuroquantology are available under Creative Commons Attribution Non-Commercial No Derivatives Licence (CC BY-NC-ND 4.0). Authors retain copyright in their work and grant IJECSE right of first publication under CC BY-NC-ND 4.0. Users have the right to read, download, copy, distribute, print, search, or link to the full texts of articles in this journal, and to use them for any other lawful purpose.