Abstract
With the help of a sizable quantity of virtual storage, cloud computing provides services through the Internet on demand. The primary benefit of cloud computing is that it relieves users of the need to invest in pricey computer equipment. Lower expenses are related with infrastructure. Researchers are looking at new, relevant technologies as a result of recent breakthroughs in cloud computing and other sectors. Due to its accessibility and scalability for computer operations, both private users and companies upload their software, data, and services into the cloud storage. While switching from local to remote computing provides advantages, there are also a number of security issues and difficulties for both the supplier and the customer. There are many cloud services offered by reputable third parties, which are raising security concerns. The cloud service provider offers its services over the Internet and makes use of numerous online technologies, which raises fresh security concerns. One of the most important requirements for today is online data exchange for greater productivity and efficiency. In this work, we have done a detailed analysis on cloud-based security issues and possible solutions. With this, data owners can save and share the data through online.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
IDC Enterprise Panel (2008) It cloud services user survey, what users want from cloud services providers
O'Neill M (2013) NIST: the NIST definition of cloud computing. Accessed Sept 2013
Amazon: Amazon Web Services: Overview of Security Processes. Accessed Nov 2015
Syam Kumar P, Subramanian R (2011) An efficient and secure protocol for ensuring data storage security in cloud computing. IJCSI Int J Comput Sci 8(6)
Santhosh Krishna BV, Sharma S, Devika K, Sahana Y, Sharanya KN, Indraja C (2022) Review of fake product review detection techniques. In: 2022 second international conference on artificial ıntelligence and smart energy (ICAIS), pp 771–776. https://doi.org/10.1109/ICAIS53314.2022.9742735
Bangari S, Rachana P, Gupta N, Sudi PS, KK Baniya (2022)A survey on disease detection of a potato leaf using CNN. In: 2022 second ınternational conference on artificial ıntelligence and smart energy (ICAIS), pp 144–149
Zhou M, Zhang R, Xie W, Qian W, Zhou A (2010) Security and privacy in cloud computing: a survey. In: Semantics Knowledge and Grid ”, 2010 proceedings of the sixth ınternational conference on Nov 1. IEEE, pp 105–112
Subashini S, Kavitha V (2011) A survey on security issues in service delivery models of cloud computing. J Netw Comput Appl 34(1):1–11
Meenakshi Sundaram B, Rajalakshmi B, Aman Singh B, Kumar RS, Arsha R (2022) Disaster relief compensation computational framework. In: 2022 second ınternational conference on artificial ıntelligence and smart energy (ICAIS). https://doi.org/10.1109/ICAIS53314.2022.9742829
Uma N, Prashanth CSR (2020) A detailed analysis of the various frequent itemset mining algorithms. J Adv Res Dynam Cont Syst 12(2 Special Issue):448–454
Rong C, Nguyen ST, Jaatun MG (2013) Beyond lightning: a survey on security challenges in cloud computing. Comput Electr Eng 39(1):47–54
Rimal BP, Jukan A, Katsaros D, Goeleven Y (2011) Architectural requirements for cloud computing systems: an enterprise cloud approach. J Grid Comput 9(1):3–26
Vijayan A, Meenaskshi B, Pandey A, Patel A, Jain A (2020) Video anomaly detection in surveillance cameras. In: 2022 International conference for advancement in technology (ICONAT). https://doi.org/10.1109/ICONAT53423.2022.9726078
Armbrust M, Fox A, Griffith R, Joseph AD, Katz R, Konwinski A, Lee G, Patterson D, Rabkin A, Stoica I, Zaharia M (2010) A view of cloud computing. Commun ACM 53(4):50–58
Ashok K, Gurulakshmi AB, Prakash MB, Poornima R, Sneha NS, Gowtham V (2022)A survey on design and application approaches in women-safety systems. In: 2022 8th International conference on advanced computing and communication systems (ICACCS), pp 101–110. https://doi.org/10.1109/ICACCS54159.2022.9784981
Thorsheim P (2015) The final word on the linkedın leak. Accessed Sept 2015
Boampong PA, Wahsheh LA (2012) Different facets of security in the cloud. In: Proceedings of the 15th communications and networking simulation symposium, Mar 26, Society for Computer Simulation International, p 5
Casale A (2013) The dangers of recycling in the cloud
Pearson S (2013) Privacy, security and trust in cloud computing. Springer, London, pp 3–42
Ahmed M, Ansari MD, Singh N, Gunjan VK, Santhosh Krishna BV, Khan M (2022) Rating-based recommender system based on textual reviews using IoT smart devices. Mob Inf Syst 2022, Article ID 2854741, 18p. https://doi.org/10.1155/2022/2854741
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Santhosh Krishna, B.V., Rajalakshmi, B., Mani krishna, E.N., Sai sruthi, G., Ramya sri, G., Ashok, K. (2023). Authentication Key Generator for Data Sharing on Cloud—A Review. In: Suma, V., Lorenz, P., Baig, Z. (eds) Inventive Systems and Control. Lecture Notes in Networks and Systems, vol 672. Springer, Singapore. https://doi.org/10.1007/978-981-99-1624-5_9
Download citation
DOI: https://doi.org/10.1007/978-981-99-1624-5_9
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-99-1623-8
Online ISBN: 978-981-99-1624-5
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)