Abstract
Background: The Advancement in the Hardware and Progress in IoT based devices has led to significant transformation in digitalization and globalization of business models in the IT World. In fact Cloud Computing has attracted many companies to expand their business by providing IT infrastructure with very less budget in pay per use model. The Expansion and Migration of Companies to Cloud Computing facilities has really brought many pros and cons and opened new area of Research. The Management of IT infrastructure as per business requirement is a great challenge for the IT Infrastructure managers because of complex business models which needs to be updated with market trends and it requires huge and updated infrastructure to accelerate their business requirements.
No doubt there are many benefits of moving to Cloud but several vulnerabilities and potential threats related to security is a major concern for any business sensitive data. These security challenges place restrictions on moving on-premises workloads to the Cloud. This paper has discussed key differences in cloud models and existing various Cloud Security Architectures and challenges in cloud computing related to Data Security at Rest and in Transit. Also data controlling mechanism need to be adopted by IT Industry along with end to end security mechanism has been explained.
Objective: The main objective of this paper is to discuss about the prevailing issues in cloud in terms of data security which is discouraging the Industry and organizations to move their data into public cloud and also to discuss how to enhance security mechanism in cloud during data migration and multitenant environment.
Methods: Based on different reports and analysis, it has been pointed that data breach and data security are most challenging and concerning factor for any customer when someone think to migrate the workloads from On-Premises datacenter to Cloud Computing. It needs more attention in every consideration. All criteria and considerations to secure and protect the customer’s information and data have been classified and discussed. Data-at-rest and Data-in-transit are transmission method for storing and moving the data from one source to destination. Different encryption methods for protecting and security data-at-rest and data-in-transit have been identity. However, there are still more areas need to work in for filling gaps for Cloud data control and security which is still a serious concern and on top of attackers every day.
Results & Conclusion: Since, cyber-attacks occurring very frequently and causing a huge amount of investment on re-establishing the environment, it needs more control with effective usages of technology. All those concerns related to security are very reasonable concerns that needs to be addressed.
Keywords: Cloud computing, data security, data privacy, cloud security, security challenges, data control.
Graphical Abstract