Security of Provider sides in Data Privacy and Data Accessibility Issues in Cloud computing

Taimoor Ahmad, Hala Aslam, Shahzeb Shahzad


Cloud Computing is the approach to share resources under one or more than one leading authority using multiple development and deployment models i.e. resources of computational power and storage. Basically cloud is business model and it has grown up in business and other industries. In spite of its power, it raises numerous security threats including loss of customer important data, data leakage, duplicating, resource pooling and so on. As far as security threats are concerned, a very wide research has been conducted which shows threats with service and deployment models of cloud. In order to realize these threats, this study is presented so as to effectively refine the basic security issues under various areas of cloud. This study present data security threat under the cloud models and their  solutions is to involve third party cloud provider in which client send their data that is being encrypted, send then send to service cloud provider and secure third party and storage provider servers. This purposed work is to save the cloud server providers from un-authorize access.

Full Text:



“Grid vs CLoud Computing,” 2017. [Online]. Available:

F. Lui et al., “NIST Cloud Computing Reference Architecture: Recommendations of the National Institute of Standards and Technology,” NIST Spec. Publ. 500-292, 2011.

“What is SPI model (SaaS, PaaS, IaaS)? - Definition from” [Online]. Available: [Accessed: 10-Aug-2017].

B. Kaur, “Cloud Computing and Security Issues : A Survey Barinder Kaur,” vol. 3, no. 2, pp. 168–171, 2015.

“security - definition of security in English | Oxford Dictionaries.” [Online]. Available: [Accessed: 10-Aug-2017].

X. P. Xu, J. H. Yan, and L. Liu, “The Research on Cloud Computing Data Security Mechanism,” Adv. Mater. Res., vol. 846–847, no. 3, pp. 1595–1599, 2013.

A. Hossain, B. Hossain, and S. Uddin, “Researched on Security Challenges with Possible Solution Strategies in Cloud Computing,” vol. 5, no. 2, pp. 31–39, 2016.

S. H. Rathi, “Efficient And Secure Privacy Preserving Data Storage and Auditability In Cloud Assisted Mobile Health Data,” no. February, 2015.

M. Ahmed and M. Ashraf Hossain, “Cloud Computing and Security Issues in the Cloud,” Int. J. Netw. Secur. Its Appl., vol. 6, no. 1, pp. 25–36, 2014.

R. Velumadhava Rao and K. Selvamani, “Data security challenges and its solutions in cloud computing,” Procedia Comput. Sci., vol. 48, no. C, pp. 204–209, 2015.

M. D. H. Parekh, “An Analysis of Security Challenges in Cloud Computing,” IJACSA) Int. J. Adv. Comput. Sci. Appl., vol. 4, no. 1, pp. 38–46, 2013.

“What is an Access Control System (ACS)? - Definition from Techopedia.” [Online]. Available: [Accessed: 17-Dec-2017].

R. Padhy, M. Patra, and S. Satapathy, “Cloud Computing: Security Issues and Research Challenges,” … Inf. Technol. Secur. …, vol. 1, no. 2, pp. 136–146, 2011.

“Top Data Privacy Issues To Scare You In 2016 - InformationWeek.” [Online]. Available: [Accessed: 11-Aug-2017].

“Data Privacy - Definition & Types of Data.” [Online]. Available: [Accessed: 12-May-2017].

R. V. Rao and K. Selvamani, “ScienceDirect Data Security Challenges and Its Solutions in Cloud Computing,” Procedia - Procedia Comput. Sci., vol. 48, pp. 204–209, 2015.

B. S. Al-Attab and H. S. Fadewar, “Security Issues and Challenges in Cloud Computing,” Int. J. Emerg. Sci. Eng., vol. 2, no. 7, pp. 22–26, 2014.

Taimoor Ahmad,Hala Aslam and Shahzeb Shahzad, “Data privacy and Data Accessibilty issues in Cloud Enviornment


  • There are currently no refbacks.

Copyright (c) 2018 University of Sindh Journal of Information and Communication Technology

ISSN-E: 2523-1235, ISSN-P: 2521-5582

 Copyright © University of Sindh, Jamshoro. 2017 All Rights Reserved.  
Printing and Publication by: Sindh University Press. 

Journal Office, Institute of Information and Communication Technology, 
University of Sindh, Jamshoro, Sindh, Pakistan. 76080