Affiliation:
1. Ain Shams University, Egypt
Abstract
Cloud computing is an emerging computing paradigm that is rapidly gaining attention as an alternative to other traditional hosted application models. The cloud environment provides on-demand, elastic and scalable services, moreover, it can provide these services at lower costs. However, this new paradigm poses new security issues and threats because cloud service providers are not in the same trust domain of cloud customers. Furthermore, data owners cannot control the underlying cloud environment. Therefore, new security practices are required to guarantee the availability, integrity, privacy and confidentiality of the outsourced data. This paper highlights the main security challenges of the cloud storage service and introduces some solutions to address those challenges. The proposed solutions present a way to protect the data integrity, privacy and confidentiality by integrating data auditing and access control methods.
Reference109 articles.
1. Keystroke dynamics‐based user authentication service for cloud computing.;A.Abo‐alian;Concurrency and Computation,2015
2. Abo-alian, A., Badr, N., & Tolba, M. (2016d). Hierarchical Attribute-Role Based Access Control for Cloud Computing. The 1st International Conference on Advanced Intelligent System and Informatics (AISI2015), 381-389.
3. Auditing-as-a-Service for Cloud Storage.;A.Abo-alian;Intelligent Systems,2015
4. Authentication as a Service for Cloud Computing
5. Integrity as a service for replicated data on the cloud.;A.Abo‐alian;Concurrency and Computation,2016