Security and Privacy Issues in Cloud Storage

Even with the vast potential that cloud computing has, so far, it has not been adopted by the consumers with the enthusiasm and pace that it be worthy; this is a very reason statement why consumers still hesitated of using cloud computing for their sensitive data and the threats that prevent the con...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
1. Verfasser: Asiri, Norah
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue
container_start_page
container_title
container_volume
creator Asiri, Norah
description Even with the vast potential that cloud computing has, so far, it has not been adopted by the consumers with the enthusiasm and pace that it be worthy; this is a very reason statement why consumers still hesitated of using cloud computing for their sensitive data and the threats that prevent the consumers from shifting to use cloud computing in general and cloud storage in particular. The cloud computing inherits the traditional potential security and privacy threats besides its own issues due to its unique structures. Some threats related to cloud computing are the insider malicious attacks from the employees that even sometime the provider unconscious about, the lack of transparency of agreement between consumer and provider, data loss, traffic hijacking, shared technology and insecure application interface. Such threats need remedies to make the consumer use its features in secure way. In this review, we spot the light on the most security and privacy issues which can be attributed as gaps that sometimes the consumers or even the enterprises are not aware of. We also define the parties that involve in scenario of cloud computing that also may attack the entire cloud systems. We also show the consequences of these threats.
doi_str_mv 10.48550/arxiv.2401.04076
format Article
fullrecord <record><control><sourceid>arxiv_GOX</sourceid><recordid>TN_cdi_arxiv_primary_2401_04076</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2401_04076</sourcerecordid><originalsourceid>FETCH-LOGICAL-a676-86ab930e235d6308646acd8197759c6cd0eb10c20f50e8a11ea2f107608179c03</originalsourceid><addsrcrecordid>eNotzrsKwjAUgOEsDqI-gJN5AFtPmubSUYo3EBR0L8cklUCtklqxb-91-refj5AxgzjVQsAMw9M_4iQFFkMKSvbJ9OBMG_y9o1hbug_-gaajm6ZpXUN9TfPq2lp6uF8Dnt2Q9EqsGjf6d0COy8UxX0fb3WqTz7cRSiUjLfGUcXAJF1Zy0DKVaKxmmVIiM9JYcCcGJoFSgNPImMOkZG8NaKYyA3xAJr_tl1vcgr9g6IoPu_iy-QuVsDsi</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype></control><display><type>article</type><title>Security and Privacy Issues in Cloud Storage</title><source>arXiv.org</source><creator>Asiri, Norah</creator><creatorcontrib>Asiri, Norah</creatorcontrib><description>Even with the vast potential that cloud computing has, so far, it has not been adopted by the consumers with the enthusiasm and pace that it be worthy; this is a very reason statement why consumers still hesitated of using cloud computing for their sensitive data and the threats that prevent the consumers from shifting to use cloud computing in general and cloud storage in particular. The cloud computing inherits the traditional potential security and privacy threats besides its own issues due to its unique structures. Some threats related to cloud computing are the insider malicious attacks from the employees that even sometime the provider unconscious about, the lack of transparency of agreement between consumer and provider, data loss, traffic hijacking, shared technology and insecure application interface. Such threats need remedies to make the consumer use its features in secure way. In this review, we spot the light on the most security and privacy issues which can be attributed as gaps that sometimes the consumers or even the enterprises are not aware of. We also define the parties that involve in scenario of cloud computing that also may attack the entire cloud systems. We also show the consequences of these threats.</description><identifier>DOI: 10.48550/arxiv.2401.04076</identifier><language>eng</language><subject>Computer Science - Cryptography and Security ; Computer Science - Networking and Internet Architecture</subject><creationdate>2024-01</creationdate><rights>http://creativecommons.org/publicdomain/zero/1.0</rights><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>228,230,776,881</link.rule.ids><linktorsrc>$$Uhttps://arxiv.org/abs/2401.04076$$EView_record_in_Cornell_University$$FView_record_in_$$GCornell_University$$Hfree_for_read</linktorsrc><backlink>$$Uhttps://doi.org/10.48550/arXiv.2401.04076$$DView paper in arXiv$$Hfree_for_read</backlink></links><search><creatorcontrib>Asiri, Norah</creatorcontrib><title>Security and Privacy Issues in Cloud Storage</title><description>Even with the vast potential that cloud computing has, so far, it has not been adopted by the consumers with the enthusiasm and pace that it be worthy; this is a very reason statement why consumers still hesitated of using cloud computing for their sensitive data and the threats that prevent the consumers from shifting to use cloud computing in general and cloud storage in particular. The cloud computing inherits the traditional potential security and privacy threats besides its own issues due to its unique structures. Some threats related to cloud computing are the insider malicious attacks from the employees that even sometime the provider unconscious about, the lack of transparency of agreement between consumer and provider, data loss, traffic hijacking, shared technology and insecure application interface. Such threats need remedies to make the consumer use its features in secure way. In this review, we spot the light on the most security and privacy issues which can be attributed as gaps that sometimes the consumers or even the enterprises are not aware of. We also define the parties that involve in scenario of cloud computing that also may attack the entire cloud systems. We also show the consequences of these threats.</description><subject>Computer Science - Cryptography and Security</subject><subject>Computer Science - Networking and Internet Architecture</subject><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2024</creationdate><recordtype>article</recordtype><sourceid>GOX</sourceid><recordid>eNotzrsKwjAUgOEsDqI-gJN5AFtPmubSUYo3EBR0L8cklUCtklqxb-91-refj5AxgzjVQsAMw9M_4iQFFkMKSvbJ9OBMG_y9o1hbug_-gaajm6ZpXUN9TfPq2lp6uF8Dnt2Q9EqsGjf6d0COy8UxX0fb3WqTz7cRSiUjLfGUcXAJF1Zy0DKVaKxmmVIiM9JYcCcGJoFSgNPImMOkZG8NaKYyA3xAJr_tl1vcgr9g6IoPu_iy-QuVsDsi</recordid><startdate>20240108</startdate><enddate>20240108</enddate><creator>Asiri, Norah</creator><scope>AKY</scope><scope>GOX</scope></search><sort><creationdate>20240108</creationdate><title>Security and Privacy Issues in Cloud Storage</title><author>Asiri, Norah</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-a676-86ab930e235d6308646acd8197759c6cd0eb10c20f50e8a11ea2f107608179c03</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2024</creationdate><topic>Computer Science - Cryptography and Security</topic><topic>Computer Science - Networking and Internet Architecture</topic><toplevel>online_resources</toplevel><creatorcontrib>Asiri, Norah</creatorcontrib><collection>arXiv Computer Science</collection><collection>arXiv.org</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Asiri, Norah</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Security and Privacy Issues in Cloud Storage</atitle><date>2024-01-08</date><risdate>2024</risdate><abstract>Even with the vast potential that cloud computing has, so far, it has not been adopted by the consumers with the enthusiasm and pace that it be worthy; this is a very reason statement why consumers still hesitated of using cloud computing for their sensitive data and the threats that prevent the consumers from shifting to use cloud computing in general and cloud storage in particular. The cloud computing inherits the traditional potential security and privacy threats besides its own issues due to its unique structures. Some threats related to cloud computing are the insider malicious attacks from the employees that even sometime the provider unconscious about, the lack of transparency of agreement between consumer and provider, data loss, traffic hijacking, shared technology and insecure application interface. Such threats need remedies to make the consumer use its features in secure way. In this review, we spot the light on the most security and privacy issues which can be attributed as gaps that sometimes the consumers or even the enterprises are not aware of. We also define the parties that involve in scenario of cloud computing that also may attack the entire cloud systems. We also show the consequences of these threats.</abstract><doi>10.48550/arxiv.2401.04076</doi><oa>free_for_read</oa></addata></record>
fulltext fulltext_linktorsrc
identifier DOI: 10.48550/arxiv.2401.04076
ispartof
issn
language eng
recordid cdi_arxiv_primary_2401_04076
source arXiv.org
subjects Computer Science - Cryptography and Security
Computer Science - Networking and Internet Architecture
title Security and Privacy Issues in Cloud Storage
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-29T03%3A40%3A00IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-arxiv_GOX&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Security%20and%20Privacy%20Issues%20in%20Cloud%20Storage&rft.au=Asiri,%20Norah&rft.date=2024-01-08&rft_id=info:doi/10.48550/arxiv.2401.04076&rft_dat=%3Carxiv_GOX%3E2401_04076%3C/arxiv_GOX%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true