SECURITY APPROACHES AND CHALLENGES IN CLOUD COMPUTING

encryption, privacy and access control

Authors

DOI:

https://doi.org/10.31510/infa.v21i2.2142

Keywords:

security, cryptography, privacy, data, management

Abstract

This work investigates the approaches and challenges of security in cloud computing, with emphasis on cryptography, privacy, and access control. Firstly, the importance of cloud security and the main risks faced by users and service providers are explored. Next, cryptographic techniques used to protect data in transit and at rest are discussed, as well as the challenges associated with their implementation. Additionally, privacy issues related to data collection, storage, and processing in the cloud, including regulations and standards for sensitive data against unauthorized access, are addressed. It is concluded by highlighting the importance of integrated security approaches and suggesting areas for future research to enhance cloud computing security. Among the works that guide the analysis are “O Escudo da Privacidade na Era da Conectividade” (2023), by Juliane Ferreira, “What is identity and access management?” by Matthew Kosinski e Amber Forrest (2024) e “A survey on security issues in service delivery models of cloud computing” (2010), de S. Subashini and V. Kavitha.

Downloads

Download data is not yet available.

References

ARMBRUST, M. et al. A view of cloud computing. Communications of the ACM, [s.l], abril, 2010, v. 53, n. 4. Disponível em: <https://dl.acm.org/doi/pdf/10.1145/1721654.1721672>. DOI: https://doi.org/10.1145/1721654.1721672

CLOUD COMPUTING: quais as revoluções trazidas pela computação em nuvem? Empresa Júnior – Fundação Getúlio Vargas. [s.d]. Disponível em: <https://ejfgv.com/cloud-computing/>. Acesso em: 15 set. 2024.

FERREIRA, J. LGPD: O Escudo da Privacidade na Era da Conectividade, 11 set. 2023. Disponível em: <https://www.dio.me/articles/lgpd-o-escudo-da-privacidade-na-era-da-conectividade>. Acesso em: 10 jan. 2024.

GOOGLE CLOUD. Criptografia em trânsito, set. 2022. Disponível em: <https://cloud.google.com/docs/security/encryption-in-transit?hl=pt-br>. Acesso em: 25 mar. 2024.

HARRISON, P. J. 88% of Cloud Breaches Are Due to Human Error: Here’s How to Avoid Data Breaches. The Fintech Times, 9 mai. 2022. Disponível em:<https://thefintechtimes.com/88-of-cloud-breaches-are-due-to-human-error-heres-how-to-avoid-data-breaches/>. Acesso em: 10 set. 2024.

KASPERSKY.O que é criptografia de dados? Definição e explicação, [s.d.]. Disponível em: <https://www.kaspersky.com.br/resource-center/definitions/encryption>. Acesso em: 03 abr. 2024.

KOSINSKI, M.; FORREST, A. What is identity and access management? IAM, SSO, MFA and IDaaS definitions | IBM, 22 jan. 2024. Disponível em: <https://www.ibm.com/topics/identity-access-management>. Acesso em: 05 abr. 2024.

LOPES, P. Computação em Nuvem: Disponibilidade e Resiliência na Tecnologia. LinkedIn, 26 jan. 2023. Disponível em: <https://www.linkedin.com/pulse/computa%C3%A7%C3%A3o-em-nuvem-disponibilidade-e-resili%C3%AAncia-na-tecnologia>. Acesso em: 03 abr. 2024.

MARDUQUE, M. Privacidade dos Dados em Cloud. Linkedin, 7 jul. 2023. Disponível em: <https://pt.linkedin.com/pulse/privacidade-dos-dados-em-cloud-max-marduque-santana-da-costa>. Acesso em: 26 mar. 2024.

MELL, P.; GRANCE, T. The NIST Definition of Cloud Computing. National Institute of Standards and Technology, Special Publication 800-145, Gaithersburg, 2011. Disponível em: <https://csrc.nist.gov/publications/detail/sp/800-145/final>. Acesso em: 03 abr. 2024.

NOBLES, C. Investigating cloud computing misconfiguration errors using the human factors analysis and classification system. Sciendo – Scientific Bulletin. Vol. XXVII, No. 1(53), 2022. Disponível em: <https://intapi.sciendo.com/pdf/10.2478/bsaft-2022-0007>. Acesso em: 10 ago. 2024. DOI: https://doi.org/10.2478/bsaft-2022-0007

OLIVEIRA, J. H.; OLIVEIRA, W. A segurança de um banco de dados na AWS. Ciências Exatas e da Terra, v. 27, 2023. Disponível em: <https://revistaft.com.br/a-seguranca-de-um-banco-de-dados-na-aws/>. Acesso em: 21 jul. 2024.

RITTINGHOUSE, J. W.; RANSOME, J. F. Cloud Computing: Implementation, Management, and Security, 2009.

SUBASHINI, S.; KAVITHA, V. A survey on security issues in service delivery models of cloud computing. Journal of Network and Computer Applications, v. 34, n. 1, p. 1–11, jan. 2011. DOI: https://doi.org/10.1016/j.jnca.2010.07.006

TOTVS, E. Criptografia: tipos, exemplos e importância nas empresas, 2024. Disponível em: <https://www.totvs.com/blog/gestao-para-assinatura-de-documentos/criptografia>. Acesso em: 02 abr. 2024.

KAMILA, K. Role of cloud computing in modern libraries: A critical appraisal. International Journal of Information Library and Society, v. 2, n. 1, p. 1-2, 2013.

PAGANINI, P. Cloud misconfigurations are the most common cloud security risks. Security Affairs, 28 abr. 2021. Disponível em: <https://securityaffairs.com/117305/security/cloud-misconfiguration-risks.html>. Acesso em: 15 abr. 2024.

LEAVITT, S.; REA, D. Recomendações para monitoramento e detecção de ameaças. Microsoft Learn, 13 fev. 2024. Disponível em: <https://learn.microsoft.com/pt-br/azure/well-architected/security/monitor-threats>. Acesso em: 16 abr. 2024.

LIMA, V.; SGARBI, E. Pesquisa sobre o uso de computação em nuvem. 2024. Pesquisa realizada via plataforma Google Forms. Local de pesquisa: Faculdade de Tecnologia de Taquaritinga (FATEC).

Published

2025-09-17

Issue

Section

Tecnologia em Informática

How to Cite

LIMA, Valdenilson dos Santos; SGARBI, Elielson Antonio. SECURITY APPROACHES AND CHALLENGES IN CLOUD COMPUTING: encryption, privacy and access control. Revista Interface Tecnológica, Taquaritinga, SP, v. 21, n. 2, p. 329–342, 2025. DOI: 10.31510/infa.v21i2.2142. Disponível em: https://revista.fatectq.edu.br/interfacetecnologica/article/view/2142. Acesso em: 5 dec. 2025.