Hussam Alddin Shihab Ahmed, Mohamad Fadli Bin Zolkipli


Cloud computing is an internet based model that empower on demand ease of access and pay for the usage of each access to shared pool of networks. It is yet another innovation that fulfills a client's necessity for computing resources like systems, stockpiling, servers, administrations and applications.  Securing the Data is considered one of the principle significant challenges and concerns for cloud computing. This persistent problem is getting more affective due to the changes in improving cloud computing technology. From the perspective of the Clients, cloud computing is a security hazard especially when it comes to assurance affirmation issues and data security, remain the most basically which backs off for appropriation of Cloud Computing administrations. This paper audits and breaks down the essential issue of cloud computing and depicts the information security and protection of privacy issues in cloud.


Keywords: Cloud Security; Data privacy; Cloud Computing.

Full Text:



Arnold, S. (2009). Cloud computing and the issue of privacy. KM World, pp14-22. Available: [Aug. 19, 2009].

Bowers, K.D., Juels, A., Oprea, A. (2009). Proofs of retrievability: Theory and implementation. In: Sion R, ed. Proc. of the 2009 ACM Workshop on Cloud Computing Security, CCSW, Co-Located with the 16th ACM Computer and Communications Security Conf., CCS 2009. New York: Association for Computing Machinery, 43-54.

Buyya, R., Yeo, C.S., Venugopal, S. Broberg, J. and Brandic, I. (2009). Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the 5th utility, Future Generation Computer Systems, 25:5 99616, 2009

Cloud Controls Matrix, Version 1.2, Cloud Security Alliance, August 26, 2011, URL:

Dillon, T., Wu, C. and Chang E. (2010). Cloud Computing: Issues and Challenges, 2010 24th IEEE International Conference on Advanced Information Networking and Applications, 1550-445X/10.

Gajanayake, R., Iannella, R. and Sahama, T. (2011). Sharing with Care an Information Accountability Perspective," Internet Computing, IEEE, 15, 31-38.

Global Netoptex Incorporated. (2009). Demystifying the cloud. Important opportunities, crucial choices. pp4-14. Available: [Dec. 13, 2009].

Grobauer, B. Walloschek T. and Stöcker, E. (2010). Understanding Cloud Computing Vulnerabilities. IEEE Security and Privacy, vol. 99, 2010.

Kantarcioglu, M., Bensoussan, A. and Ru, S. (2011). (Celine) Hoe Impact of Security Risks on Cloud Computing Adoption Forty-Ninth Annual Allerton Conference.

Kissel, R., Scholl, M., Skolochenko S., Li, X. (2006). Guidelines for Media Sanitization. NIST Special Publication 800-88, September-2006,

Kresimir P. and Zeljko H. (2010). Cloud computing security issues and challenges." In PROC Third International Conference on Advances in Human-oriented and Personalized Mechanisms, Technologies, and Services, 344-349.

Marston, S., Li, Z., Bandyopadhyay, S., Zhang, J. and Ghalsasi, A. (2011). Cloud computing the business perspective. Decision Support Systems, 51(1), 176-189.

Mell, P., Grance, T. (2011). The NIST Definition of Cloud Computing. NIST Special Publication 800-145.

Muntés-Mulero V., Nin, J. (2009). Privacy and anonymization for very large datasets. In: Chen P, ed. Proc of the ACM 18th Int'l Conf. On Information and Knowledge Management, CIKM 2009. New York: Association for Computing Machinery, 2117-2118.

Roy I., Ramadan, H.E., Setty, S.T.V., Kilzer, A., Shmatikov, V., Witchel. (2010). Airavat: Security and privacy for MapRednce. USENIX Association, 297-312.

Stanoevska-Slabeva, K., Wozniak, T. (2010). Grid and Cloud Computing-A Business Perspective on Technology and Applications, Springer-Verlag, Berlin, Heidelberg.

Subashini, S. and Kavitha V. (2010). A survey on security issues in service delivery models of cloud computing. J Network Comput Appldoi:10.1016/j.jnca.2010.07.006. Jul., 2010.

Wang, C., Wang, Q., Ren, K. and Lou W. (2009). Ensuring Data Storage Security in Cloud Computing. Proceedings of the 17th International Workshop on Quality of Service, 1-9.

Wang, Z. (2011). Security and privacy issues within the Cloud Computing. International Conference on Computational and Information Sciences, 2011.

Zeng K. (2008). Publicly verifiable remote data integrity. In: Chen LQ, Ryan MD, Wang GL, eds. LNCS 5308. Birmingham: Springer-Verlag, 419.434.


  • There are currently no refbacks.