Enhancing Security and Privacy in Distributed Cloud Environments: A Review of Protocols and Mechanisms

Authors

  • Renas Rajab Asaad IT Dept., Technical College of Informatics, Akre University for Applied Sciences, Duhok, Iraq; College of Science, Department of Computer Science, Nawroz University, Duhok, Kurdistan Region, Iraq.
  • Subhi R. M. Zeebaree Energy Eng. Dept., Technical College of Engineering, Duhok Polytechnic University, Duhok, Iraq.

DOI:

https://doi.org/10.25007/ajnu.v13n1a2010

Abstract

As cloud computing becomes increasingly integral to data management and services, security and privacy concerns remain paramount. This article presents a comprehensive review of the current protocols and mechanisms designed to fortify security and privacy in distributed cloud environments. It synthesizes contributions from various research works, each proposing innovative solutions to address these challenges. Among these are a two-layer cryptographic algorithm that combines genetic techniques with logical-mathematical functions, enhancing encryption beyond traditional methods, and a novel symmetric-key block cipher that increases encryption complexity while maintaining flexibility. The paper also discusses machine learning applications for threat detection, the role of blockchain in trust management, and the importance of multi-cloud strategies to secure big data. Through comparative analyses, the reviewed methodologies show promising advancements in encryption, data integrity, and resource management, suggesting a robust framework for tackling the evolving landscape of cyber threats. The article underscores the need for continuous innovation and research to navigate the dynamic domain of cloud security, aiming for a future where data security and privacy are not just reactive safeguards but proactive measures embedded in the fabric of cloud computing.

Downloads

Download data is not yet available.

References

Jubair, M. A., Mostafa, S. A., Zebari, D. A. (2022). A QoS aware cluster head selection and hybrid cryptography routing protocol for enhancing efficiency and security of VANETs. IEEE Access, 10, 124792-124804.

H. Shukur, S. Zeebaree, R. Zebari, D. Zeebaree, O. Ahmed, and A. Salih, “Cloud Computing Virtualization of Resources Allocation for Distributed Systems,” Journal of Applied Science and Technology Trends, vol. 1, no. 3, pp. 98–105, Jun. 2020, doi: 10.38094/jastt1331.

Mohammed Mohammed Sadeeq, Nasiba M. Abdulkareem, Subhi R. M. Zeebaree, Dindar Mikaeel Ahmed, Ahmed Saifullah Sami, and Rizgar R. Zebari, “IoT and Cloud Computing Issues, Challenges and Opportunities: A Review,” 2021, doi: 10.48161/issn.2709-8206.

Mohammed, M. A., Lakhan, A., et al. (2024). Securing healthcare data in industrial cyber-physical systems using combining deep learning and blockchain technology. Engineering Applications of Artificial Intelligence, 129, 107612.

Alsandi, N. S. A., Zebari, D. A., Al-Zebari, A., Ahmed, F. Y., Mohammed, M. A., Albahar, M., & Albahr, A. A. (2023). A Multi-Stream Scrambling and DNA Encoding Method Based Image Encryption. Computer Systems Science & Engineering, 47(2).

F. Thabit, S. Alhomdy, and S. Jagtap, “A new data security algorithm for the cloud computing based on genetics techniques and logical-mathematical functions,” International Journal of Intelligent Networks, vol. 2, pp. 18–33, Jan. 2021, doi: 10.1016/j.ijin.2021.03.001.

F. Thabit, A. P. S. Alhomdy, A. H. A. Al-Ahdal, and P. D. S. Jagtap, “A new lightweight cryptographic algorithm for enhancing data security in cloud computing,” Global Transitions Proceedings, vol. 2, no. 1, pp. 91–99, Jun. 2021, doi: 10.1016/j.gltp.2021.01.013.

Dr. V. Suma, “A Novel Information retrieval system for distributed cloud using Hybrid Deep Fuzzy Hashing Algorithm,” Journal of Information Technology and Digital World, vol. 02, no. 03, pp. 151–160, Aug. 2020, doi: 10.36548/jitdw.2020.3.003.

Zulifqar, S. Anayat, and I. Kharal, “A Review of Data Security Challenges and their Solutions in Cloud Computing,” International Journal of Information Engineering and Electronic Business, vol. 13, no. 3, pp. 30–38, Jun. 2021, doi: 10.5815/ijieeb.2021.03.04.

U. A. Butt et al., “A review of machine learning algorithms for cloud computing security,” Electronics (Switzerland), vol. 9, no. 9. MDPI AG, pp. 1–25, Sep. 01, 2020. doi: 10.3390/electronics9091379.

D. Radain, S. Almalki, H. Alsaadi, and S. Salama, “A review on defense mechanisms against distributed denial of service (DDoS) attacks on cloud computing,” in 2021 International Conference of Women in Data Science at Taif University, WiDSTaif 2021, Institute of Electrical and Electronics Engineers Inc., Mar. 2021. doi: 10.1109/WIDSTAIF52235.2021.9430220.

Z. Wang, N. Wang, X. Su, and S. Ge, “An empirical study on business analytics affordances enhancing the management of cloud computing data security,” Int J Inf Manage, vol. 50, pp. 387–394, Feb. 2020, doi: 10.1016/j.ijinfomgt.2019.09.002.

Universitas Bina Nusantara. School of Information Systems, Institute of Electrical and Electronics Engineers. Indonesia Section, and Institute of Electrical and Electronics Engineers, ICIMTech 2020 : proceedings of 2020 International Conference on Information Management and Technology (ICIMTech) : 13-14 August 2020, Indonesia.

W. Li, J. Wu, J. Cao, N. Chen, Q. Zhang, and R. Buyya, “Blockchain-based trust management in cloud computing systems: a taxonomy, review and future directions,” Journal of Cloud Computing, vol. 10, no. 1, Dec. 2021, doi: 10.1186/s13677-021-00247-5.

M. Farsi, M. Ali, R. A. Shah, A. A. Wagan, and R. Kharabsheh, “Cloud computing and data security threats taxonomy: A review,” Journal of Intelligent and Fuzzy Systems, vol. 38, no. 3, pp. 2529–2537, 2020, doi: 10.3233/JIFS-179539.

P. Yang, N. Xiong, and J. Ren, “Data Security and Privacy Protection for Cloud Storage: A Survey,” IEEE Access, vol. 8. Institute of Electrical and Electronics Engineers Inc., pp. 131723–131740, 2020. doi: 10.1109/ACCESS.2020.3009876.

Wilczyński and J. Kołodziej, “Modelling and simulation of security-aware task scheduling in cloud computing based on Blockchain technology,” Simul Model Pract Theory, vol. 99, Feb. 2020, doi: 10.1016/j.simpat.2019.102038.

Ali, M. A. Gregory, and S. Li, “Multi-access edge computing architecture, data security and privacy: A review,” IEEE Access, vol. 9. Institute of Electrical and Electronics Engineers Inc., pp. 18706–18721, 2021. doi: 10.1109/ACCESS.2021.3053233.

L. A. Tawalbeh and G. Saldamli, “Reconsidering big data security and privacy in cloud and mobile cloud systems,” Journal of King Saud University - Computer and Information Sciences, vol. 33, no. 7, pp. 810–819, Sep. 2021, doi: 10.1016/j.jksuci.2019.05.007.

V. Moorthy, R. Venkataraman, and T. Rama Rao, “Security and privacy attacks during data communication in Software Defined Mobile Clouds,” Comput Commun, vol. 153, pp. 515–526, Mar. 2020, doi: 10.1016/j.comcom.2020.02.030.

Y. S. Abdulsalam and M. Hedabou, “Security and privacy in cloud computing: Technical review,” Future Internet, vol. 14, no. 1. MDPI, Jan. 01, 2022. doi: 10.3390/fi14010011.

L. Ding, Z. Wang, X. Wang, and D. Wu, “Security information transmission algorithms for IoT based on cloud computing,” Comput Commun, vol. 155, pp. 32–39, Apr. 2020, doi: 10.1016/j.comcom.2020.03.010.

Kumar Tyagi, M. Manoj Nair, S. Niladhuri, and A. Abraham, “Security, Privacy Research issues in Various Computing Platforms: A Survey and the Road Ahead”, [Online]. Available: www.mirlabs.net/jias/index.html

MARTIN OTIENO, “Techniques and protocols for enhancing data privacy in cloud computing: A review,” World Journal of Advanced Engineering Technology and Sciences, vol. 8, no. 1, pp. 391–404, Feb. 2023, doi: 10.30574/wjaets.2023.8.1.0064.

S. Namasudra, D. Devi, S. Kadry, R. Sundarasekar, and A. Shanthini, “Towards DNA based data security in the cloud computing environment,” Comput Commun, vol. 151, pp. 539–547, Feb. 2020, doi: 10.1016/j.comcom.2019.12.041.

Mohammed, M. A., Lakhan, A., Abdulkareem, K. H., etal. (2023). Homomorphic federated learning schemes enabled pedestrian and vehicle detection system. Internet of Things, 23, 100903.

Abdullah, P. Y., Zeebaree, S. R., Jacksi, K., & Zeabri, R. R. (2020). An hrm system for small and medium enterprises (sme) s based on cloud computing technology. International Journal of Research-GRANTHAALAYAH, 8(8), 56-64.

Abdullah, P. Y., Zeebaree, S. R., Shukur, H. M., & Jacksi, K. (2020). HRM system using cloud computing for Small and Medium Enterprises (SMEs). Technology Reports of Kansai University, 62(04), 04.

Zeebaree, S. R., Zebari, R. R., Jacksi, K., & Hasan, D. A. (2019). Security approaches for integrated enterprise systems performance: A Review. Int. J. Sci. Technol. Res, 8(12), 2485-2489.

Rashid, Z. N., Zebari, S. R., Sharif, K. H., & Jacksi, K. (2018, October). Distributed cloud computing and distributed parallel computing: A review. In 2018 International Conference on Advanced Science and Engineering (ICOASE) (pp. 167-172). IEEE.

Jader, O. H., Zeebaree, S. R., Zebari, R. R., Shukur, H. M., Rashid, Z. N., Sadeeq, M. A., & Alkhayyat, A. (2021, September). Ultra-Dense Request Impact on Cluster-Based Web Server Performance. In 2021 4th International Iraqi Conference on Engineering Technology and Their Applications (IICETA) (pp. 252-257). IEEE.

Sadeeq, M. A., & Zeebaree, S. R. (2021, August). Design and analysis of intelligent energy management system based on multi-agent and distributed iot: Dpu case study. In 2021 7th International Conference on Contemporary Information Technology and Mathematics (ICCITM) (pp. 48-53). IEEE.

Rashid, Z. N., Zeebaree, S. R., Sadeeq, M. A., Zebari, R. R., Shukur, H. M., & Alkhayyat, A. (2021, October). Cloud-based Parallel Computing System Via Single-Client Multi-Hash Single-Server Multi-Thread. In 2021 International Conference on Advance of Sustainable Engineering and its Application (ICASEA) (pp. 59-64). IEEE.

Sadeeq, M. A., & Zeebaree, S. R. (2023). Design and implementation of an energy management system based on distributed IoT. Computers and Electrical Engineering, 109, 108775.

Sami, T. M. G., Zeebaree, S. R., & Ahmed, S. H. (2024). A Novel Multi-Level Hashing Algorithm to Enhance Internet of Things Devices’ and Networks’ Security. International Journal of Intelligent Systems and Applications in Engineering, 12(1s), 676-696.

Abdullah, P. Y., Zeebaree, S. R., Shukur, H. M., & Jacksi, K. (2020). HRM system using cloud computing for Small and Medium Enterprises (SMEs). Technology Reports of Kansai University, 62(04), 04.

Zeebaree, S. R., Zebari, R. R., Jacksi, K., & Hasan, D. A. (2019). Security approaches for integrated enterprise systems performance: A Review. Int. J. Sci. Technol. Res, 8(12), 2485-2489.

Zeebaree, S. R., Sallow, A. B., Hussan, B. K., & Ali, S. M. (2019, April). Design and simulation of high-speed parallel/sequential simplified DES code breaking based on FPGA. In 2019 International Conference on Advanced Science and Engineering (ICOASE) (pp. 76-81). IEEE.

Mohammed, M. A., Lakhan, A., Abdulkareem, K. H., etal. (2023). Energy-efficient distributed federated learning offloading and scheduling healthcare system in blockchain based networks. Internet of Things, 22, 100815.

Zebari, I. M., Zeebaree, S. R., & Yasin, H. M. (2019, April). Real time video streaming from multi-source using client-server for video distribution. In 2019 4th Scientific International Conference Najaf (SICN) (pp. 109-114). IEEE.

Mohammed, S. M., Jacksi, K., & Zeebaree, S. (2021). A state-of-the-art survey on semantic similarity for document clustering using GloVe and density-based algorithms. Indonesian Journal of Electrical Engineering and Computer Science, 22(1), 552-562.

Shukur, H., Zeebaree, S., Zebari, R., Ahmed, O., Haji, L., & Abdulqader, D. (2020). Cache coherence protocols in distributed systems. Journal of Applied Science and Technology Trends, 1(3), 92-97.

Khalid, Z. M., & Zeebaree, S. R. (2021). Big data analysis for data visualization: A review. International Journal of Science and Business, 5(2), 64-75.

Sadeeq, M. A., & Zeebaree, S. R. (2023). Design and implementation of an energy management system based on distributed IoT. Computers and Electrical Engineering, 109, 108775.

Sami, T. M. G., Zeebaree, S. R., & Ahmed, S. H. (2023). A Comprehensive Review of Hashing Algorithm Optimization for IoT Devices. International Journal of Intelligent Systems and Applications in Engineering, 11(6s), 205-231.

Lakhan, A., Mohammed, M. A., Zebari, et al. (2024). Augmented IoT Cooperative Vehicular Fraework Based on Distributed Deep Blockchain Networks. IEEE Internet of Things Journal.

Zangana, H. M., & Zeebaree, S. R. (2024). Distributed Systems for Artificial Intelligence in Cloud Computing: A Review of AI-Powered Applications and Services. International Journal of Informatics, Information System and Computer Engineering (INJIISCOM), 5(1), 1-20.

Ageed, Z. S., & Zeebaree, S. R. (2024). Distributed Systems Meet Cloud Computing: A Review of Convergence and Integration. International Journal of Intelligent Systems and Applications in Engineering, 12(11s), 469-490.

ABDULQADER, D. M., ZEEBAREE, S. R., ZEBARI, R. R., SALEH, S. A., RASHID, Z. N., & SADEEQ, M. A. (2023). Single-threading Based Distributed-multiprocessor-machines Affecting by Distributed-parallel-computing Technology. Journal of Duhok University, 26(2), 416-426.

Sami, T. M. G., Zeebaree, S. R., & Ahmed, S. H. (2024). Designing a New Hashing Algorithm for Enhancing IoT Devices Security and Energy Management. International Journal of Intelligent Systems and Applications in Engineering, 12(4s), 202-215.

Abdullah, H. S., & Zeebaree, S. R. (2024). Distributed Algorithms for Large-Scale Computing in Cloud Environments: A Review of Parallel and Distributed Processing. International Journal of Intelligent Systems and Applications in Engineering, 12(15s), 356-365.

Ibrahem, A. H., & Zeebaree, S. R. (2024). Tackling the Challenges of Distributed Data Management in Cloud Computing-A Review of Approaches and Solutions. International Journal of Intelligent Systems and Applications in Engineering, 12(15s), 340-355.

Published

2024-03-31

How to Cite

Rajab Asaad, R., & R. M. Zeebaree , S. . (2024). Enhancing Security and Privacy in Distributed Cloud Environments: A Review of Protocols and Mechanisms. Academic Journal of Nawroz University, 13(1), 476–488. https://doi.org/10.25007/ajnu.v13n1a2010

Issue

Section

Articles

Most read articles by the same author(s)

1 2 > >>