International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Most Trusted Research Journal Since Year 2012

ISSN: 2319-7064



Research Paper | Computer Science & Engineering | United States of America | Volume 9 Issue 5, May 2020

Cloud Computing Security Issues and their Data Privacy Concerns

Amal Matrouk Aljohani

After the invention of cloud computing technology, the concept of building computer system with unlimited resources becomes more simplified. With cloud computing, business owners, can manage and share their information through business organization from anywheretwenty-four hours a day. Organization and business area which are using cloud services must be aware of their information policy, involving data privacy, reliability and security. Building cloud computing system will exposetheir information that are accessed by authorized people to hazard if they did not buildstrong secure system to increase their security level and protect it by authorizing only people who need to access them. The goal of this research paper is to give short vision of cloud computing concept by identifying their different types and discuss cloud security main issues to attract both users and business owner attention to the potential risks of sharing their important data through cloud system without knowing security limitations for each model and secure their system by overcome potential threats for their cloud system.

Keywords: Attacks, Cloud Security, Cloud Attacks, Cloud Privacy, Security and Privacy in Cloud, Security Analysis on Cloud, Cloud Deployment Models, Cloud Characteristics, Data Privacy

Edition: Volume 9 Issue 5, May 2020

Pages: 1472 - 1477


How to Cite this Article?

Amal Matrouk Aljohani, "Cloud Computing Security Issues and their Data Privacy Concerns", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SR20523084823, Volume 9 Issue 5, May 2020, 1472 - 1477

31 PDF Views | 20 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Attacks'

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2406 - 2408

Optimizing the Ad-Hoc Applications in Vehicular Network: A Study

Sumeet Sekhon, Dinesh Kumar

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2786 - 2790

Survey: Detection Schemes Against Selective Forwarding Attack

Harpal Singh, Vaibhav Pandey

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 735 - 737

Survey Paper on Alleviation of Cloud Internal Denial of Service Attacks

Nikhita Nerkar, Vina M Lomte

Share this article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 685 - 689

Secure Routing in Wireless Sensor Networks through the Identified Trusted Node

D. Latha, K. Palanivel

Share this article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 1422 - 1430

Security Schemes to Resolve Wormhole Attack in Distributed Sensor Networks

Sharada Y. Yalavigi, Dr. Krishnamurthy G. N, Dr. Nandini Sidnal

Share this article



Similar Articles with Keyword 'Cloud Security'

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 735 - 737

Survey Paper on Alleviation of Cloud Internal Denial of Service Attacks

Nikhita Nerkar, Vina M Lomte

Share this article

Informative Article, Computer Science & Engineering, India, Volume 5 Issue 7, July 2016

Pages: 1861 - 1865

Security Rudiments for SaaS Application Development and Deployment

Anand Singh

Share this article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 1845 - 1848

A Cloud Storage System for Preserving Privacy and Data Integrity of User

M. S. Tore, S. K. Sonkar

Share this article

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 2369 - 2372

Multi-Level Complex Key Sharing For Secure Access and Authorization on Cloud Platforms

Jaskarandeep Punia, Rajesh Kumar Bawa

Share this article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 2619 - 2622

Information Security in Multi-Cloud Environment

Digambar D. Patil, Megha Singh

Share this article



Similar Articles with Keyword 'Cloud Attacks'

Research Paper, Computer Science & Engineering, United States of America, Volume 9 Issue 5, May 2020

Pages: 1472 - 1477

Cloud Computing Security Issues and their Data Privacy Concerns

Amal Matrouk Aljohani

Share this article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2378 - 2383

A Prevention of DDos Attacks in Cloud Using Honeypot

Kumar Shridhar, Nikhil Gautam

Share this article



Similar Articles with Keyword 'Data Privacy'

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 2073 - 2076

Secure Cloud DBaaS by Client and Server side Encryption

Ashok Jayadar, A. R. Arunachalam

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 2366 - 2370

A Survey on Multi-Keyword Ranked Query Search over Encrypted Cloud Storage

Jaikishan Tindwani, Aruna Gupta

Share this article

Research Paper, Computer Science & Engineering, United States of America, Volume 9 Issue 5, May 2020

Pages: 1472 - 1477

Cloud Computing Security Issues and their Data Privacy Concerns

Amal Matrouk Aljohani

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014

Pages: 581 - 583

Survey on Different Audit Service to Ensure the Data Privacy and Integrity in Cloud Storage

Radhika H N, Simran R. Khiani

Share this article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 8, August 2014

Pages: 1638 - 1644

Cost-Effective Privacy Preserving of Intermediate Data Sets in Cloud using Privacy Leakage Upper Bound Constraint-Based Approach

Ravindra Suresh Kamble, Sheikh Gouse

Share this article
Top