According to Feng (2018), cloud computing is usually defined as new style for computing which is scalable and virtualized resources are also provided by the service of cloud over internet. The cloud computing transmits application software and the data base to large number of data centers, where the administration of data as well as service is not totally trusted. This imposes security challenges for the data storage in the organizations. The cloud storage capacity is mainly focused in this research paper that includes improving the quality of service of cloud computing. There are many effective as well as flexible technique for the management of data storage in the organization. This research paper explains many encryption technique algorithm with authentication of coded data. There are many reasons for which the cloud computing faces security threats. The security threat may come from unauthenticated person who can attack some authorized file, avoids the collusion attacks, and attack of malicious data modification.
There are several trends that opens up in the era where cloud computing plays an important role in most of the industrial sectors. The cloud computing technology is mainly a development that is internet based and also uses the technology of computing in it. As there are advantages as well as disadvantages of all technologies, the data storage technology of cloud computing also serves the industries with advantages as well as disadvantages to work with (Ali, Khan & Vasilakos, 2015). As cloud computing provides service over the internet, there may be lot of issues in the internet while accessing the service of cloud computing.
Cloud computing plays the most important role for storing the data in an organization. But, the problem states when security issue arises with the implementation of data storage in an organization. All the data storage security issues of cloud computing and the ways to mitigate them are described in this research paper. Being a cheaper as well as powerful processor, the cloud computing is combine with Software as a Service (SaaS) architecture that transforms the data centers of computing on a large scale. There always lies a problem of providing high quality service to the customers with flexible connections of network. There are many companies that provide cloud service to the companies. So, to provide the best service for the cloud is also an important factor in the companies.
The main aim of this research paper is to find out data storage security of cloud computing the industrial sectors. As many companies cannot trust cloud computing because of the security issues, all such security issues related to data storage are to be studied. To mitigate those security issues, many measures are taken which are also studied in this research paper. Cloud computing is one of the tremendous emerging technology in the internet technology sector and helps to mitigate the problem of data storage in small as well as large organizations (Sookhak et al., 2017). So, to ensure that all companies can use the technology of data storing of cloud computing, this research paper mitigates the security issues related to data storage in cloud computing.
In the context the research study, the main reason for conducting this research review is to analyze and study the effect of data storage security related to cloud computing (Rao & Selvamani, 2015). The methodology that is used in this research paper is mixed research of quantitative research. In this research paper, the study about the importance of cloud computing is analyzed from different papers, and primary research are also conducted with survey questions. The secondary quantitative data are collected from other journal article in which quantitative data are studied by different authors.
This research is carried out mainly by forwarding questions like “How data storage of cloud computing is important to the industries”. “Is the data storage security profitable for the organization”. “What are the techniques that the company follows as a preventive method of data storage cloud computing?” Another question that can be asked to the respondents is “How the cloud data storage helps to keep the data safe in the organization? ” There are many other similar questions that are to be carried out while carrying the research study. There are many inquiries that the respondents are asked regarding the cloud data storage in the organization.
Interviews
Interviews are organized by the researchers by conducting question surveys among the respondents of some organization. Total 50 responses are to be taken from the researchers over telephonic interview and the responses from them are analyzed. The response of the respondents helps to analyze the study of data storage security in the industrial sectors.
Analyzing Data From Other Scholar Articles
The other secondary data that are carried out for this research paper consists of studying other papers that are related to data storage security of cloud computing. Many scholarly articles are taken for analyzing such data in which the authors have already carried out the research that are very useful for solving the objective of this research paper.
Chart 1: Data management and IT needs by using Cloud
(Source: Rudo, 2018)
This chart above shows the importance of Cloud computing to the business. This survey is analyzed to know the current as well as projected proportions of the respondents who accomplish different parts of the data management and the IT needs by using the cloud computing technology (Pancholi & Patel, 2016). It can be analyzed that in around seven years, almost 50 % of usage of cloud computing falls in business applications, IT infrastructures and for social media.
Chart 2: Measures taken by professionals for ensuring data privacy of cloud computing
(Source: Rudo, 2018)
From this study, it can be analyzed that there still remains a large difference in the importance of security that are associated with the cloud computing. About 59 percent of the total respondents said that the policies of cloud computing has very less significant for their choice of the cloud provider and 41 % of the respondents do not even care about the privacy practice of the cloud providers (Manogaran, Thota & Kumar, 2016). From the chart it can also be analyzed that 60 % of the respondents claims that the data storage of cloud computing is protecting the sensitive data and the confidential data of their organizations.
Secure Data Storage in Cloud
As stated by Shimbre & Deshpande (2015), there are many ways by which data storage can be made secured. Mainly include systems, the company stores all the data in data server that is remotely stored. So, the data that are to be stored should be correct and should be stored securely. Even, sometimes some unauthorized person can change or modify the data, there is need to maintain the correctness of the data (Rittinghouse & Ransome, 2016). The storage system of cloud gives an effective as well as flexible scheme distribution with dynamic support of data. The ways of securing the data storage system is described below:
Token correctness
Using the pre-computed toke, the assurance of the correctness of data storage and the error localization of data (Li et al., 2017). Before sharing file using the pre-computes, there are many number of verification token that are generated and will ensure security for some block of data in the cloud storage.
Correctness Verification and Error Localization
Error localization is the main requirement for errors that are eradicate in the storage systems. There are many schemes that explicitly are not considered in the problem of error localization.
Conclusion
With the help of cloud computing technology, the users of cloud uses different types of devices that includes laptops, personal computers, smart phones as well as PDAs that access the programs, platforms for application development and storage for accessing the services of cloud computing (Wei et al., 2014). The cloud computing includes cost savings, easy scalability, and high availability.
It can be concluded from this research paper is the importance of data storage security cloud computing in organization. There are many advantages and disadvantages of cloud data storage security. All such security issues of data storage of cloud computing is explained in this research paper and the mitigation technique for solving the security issue of the data storage is also explained in this research paper.
References
Ali, M., Khan, S. U., & Vasilakos, A. V. (2015). Security in cloud computing: Opportunities and challenges. Information sciences, 305, 357-383.
Feng, B., Ma, X., Guo, C., Shi, H., Fu, Z., & Qiu, T. (2016). An efficient protocol with bidirectional verification for storage security in cloud computing. IEEE Access, 4, 7899-7911.
Hashem, I. A. T., Yaqoob, I., Anuar, N. B., Mokhtar, S., Gani, A., & Khan, S. U. (2015). The rise of “big data” on cloud computing: Review and open research issues. Information Systems, 47, 98-115.
Li, Y., Gai, K., Qiu, L., Qiu, M., & Zhao, H. (2017). Intelligent cryptography approach for secure distributed big data storage in cloud computing. Information Sciences, 387, 103-115.
Manogaran, G., Thota, C., & Kumar, M. V. (2016). MetaCloudDataStorage architecture for big data security in cloud computing. Procedia Computer Science, 87, 128-133.
Pancholi, V. R., & Patel, B. P. (2016). Enhancement of cloud computing security with secure data storage using AES. International Journal for Innovative Research in Science and Technology, 2(9), 18-21.
Rao, R. V., & Selvamani, K. (2015). Data security challenges and its solutions in cloud computing. Procedia Computer Science, 48, 204-209.
Rittinghouse, J. W., & Ransome, J. F. (2016). Cloud computing: implementation, management, and security. CRC press.
Rudo, P. (2018). Privacy and Data Security In The Cloud (Statistics) – Enterprise Features. Retrieved from https://www.enterprisefeatures.com/privacy-and-data-security-in-the-cloud-statistics/
Shimbre, N., & Deshpande, P. (2015, February). Enhancing distributed data storage security for cloud computing using TPA and AES algorithm. In Computing Communication Control and Automation (ICCUBEA), 2015 International Conference on (pp. 35-39). IEEE.
Sookhak, M., Gani, A., Khan, M. K., & Buyya, R. (2017). Dynamic remote data auditing for securing big data storage in cloud computing. Information Sciences, 380, 101-116.
Wei, L., Zhu, H., Cao, Z., Dong, X., Jia, W., Chen, Y., & Vasilakos, A. V. (2014). Security and privacy for storage and computation in cloud computing. Information Sciences, 258, 371-386
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download