Cloud computing is an emerging economical approach that allows businesses to move beyond creating their own IT teams towards outsourcing their applications, systems, including infrastructure requirements. Cloud technology was already emerged as a framework in addition to the fifth infrastructure services, after water, energy, fuel, and telecommunications. Moreover, the IT sector is undergoing a fundamental transition. Earlier, businesses would maintain existing operations by purchasing IT equipment, but then they are implementing technology on top of that architecture. Cloud computing is a paradigm wherein IT technology is rented as well as utilized as needed by the organization. This paper describes a comprehensive investigation of data confidentiality approaches in cloud technology, their limitations as well as various strategies for overcoming them.
Keywords: Cloud computing, Data confidentiality, Threats, SaaS, PaaS, IaaS.
[1] Abraham Ekow Dadzie (2019). Literature Review On Data Security In Cloud Computing.
[2] Du M, Wang Q, He M, Weng J (2018). Privacy-preserving indexing and query processing for secure dynamic cloud storage. IEEE Trans Inf Forensics Secur., 13(9): 2320–2332.
[3] S. Farné, F. Benzi, and E. Bassi (2020). IIoT Based Efficiency Optimization in Logistics Applications. Asian Journal of Basic Science & Research, 2(4): 59–73. doi: 10.38177/ajbsr.2020.2406.
[4] Anil Lamba (2013). Enhancing Awareness of Cyber-Security and Cloud Computing using Principles of Game Theory. International Journal of Advanced in Management, Technology and Engineering Sciences, III(I): 71–82.
[5] Jouini M, Rabai LBA (2019). A security framework for secure cloud computing environments. In: Cloud security: concepts, methodologies, tools, and applications, IGI Global, Pages 249–263.
[6] Lamba, A. (2014). Cyber Attack Prevention Using VAPT Tools (Vulnerability Assessment & Penetration Testing). Cikitusi Journal for Multidisciplinary Research, 1(2).
[7] Latha, K., Sheela, T. (2019). Block based data security and data distribution on multi cloud environment. J Ambient Intell Human Comput.
[8] Anil Lamba (2015). A study paper on security related issue before adopting cloud computing service model. International Journal for Technological Research in Engineering, 3(4): 5837–5840.
[9] Murtadha Arif Bin Sahbudin, Riccardo Di Pietro, Marco Scarpa (2019). A Web Client Secure Storage Approach in Multi-Cloud Environment. IEEE, 2019 doi: 10.1109/CCCS.2019.8888062.
[10] Nareshvurukonda B. Thirumala Rao (2016). A Study on Data Storage Security Issues in Cloud Computing. Elsevier, 92: 128-135 https://doi.org/10.1016/j.procs.2016.07.335.
[11] Anil Lamba (2016). S4: A novel & secure method for enforcing privacy in cloud data warehouses. International Journal for Technological Research in Engineering, 3(8): 5707–5710.
[12] Prince, P.B., Lovesum, S.P.J. (2020). Privacy Enforced Access Control Model for Secured Data Handling in Cloud-Based Pervasive Health Care System. SN Comput. Sci., 1: 239.
[13] Lamba, Anil and Pal, Pushparaj and Singh, Satinderjeet and Singh, Balvinder and Muni, Sivakumar Sai Rela (2018). Quantum Computing Technology (QCT) - A Data Security Threat. JETIR, 5(4).
[14] C. Wang, Q. Wang, K. Ren, N. Cao and W. Lou (2012). Toward Secure and Dependable Storage Services in Cloud Computing. IEEE Transactions on Services Computing, 5(2): 220-232.
A New Issue was published – Volume 8, Issue 4, 2025
10-10-2025 11-07-2025