JOURNAL ARTICLE

Data Security and Data Protection in Cloud Privacy Systems

Abstract

In this modern world, the internet has become very influential in our daily lives. The Internet has many uses to solve various problems, one of which is full hardware storage, therefore the Internet provides software-based data, for example, cloud storage applications. The study aims to analyze and evaluate various data security techniques and protection methods used in the cloud computing framework, focusing on vulnerability identification, risk mitigation strategy assessment, and user security awareness improvement. In addition, this study aims to analyze data security techniques and data protection approaches applied to cloud systems. In addition, the study also assesses potential risks and mitigates security threats such as cyberattacks and data breaches. Using qualitative methodologies, the study investigated relevant literature, examined real-life cases of data breaches, and analyzed the effectiveness of security measures such as encryption and multi-factor authentication. The findings show that cloud systems remain vulnerable to cyber threats like DDoS attacks, credential theft, and data breaches due to inadequate security protocols. Key recommendations include adopting encryption, improved multi-factor authentication practices, and encouraging collaboration between cloud service providers and users to strengthen data security. The research contributes by proposing a comprehensive approach to improving data protection in cloud environments, ensuring a secure and resilient infrastructure for users. Implementing these findings will support the development of more secure cloud technologies and increase user confidence in data security practices. It is hoped that the study's results can provide recommendations to improve data security and data protection in cloud systems.

Keywords:
Computer security Cloud computing Computer science Cloud computing security Data security Encryption Authentication (law) Credential Vulnerability (computing) Data Protection Act 1998 Data breach The Internet Internet privacy World Wide Web

Metrics

0
Cited By
0.00
FWCI (Field Weighted Citation Impact)
0
Refs
0.34
Citation Normalized Percentile
Is in top 1%
Is in top 10%

Topics

Cloud Data Security Solutions
Physical Sciences →  Computer Science →  Information Systems

Related Documents

JOURNAL ARTICLE

Data Security and Privacy Protection in Cloud Storage Systems on Cyber Security

S. Harshith

Journal:   International Journal of Science Engineering and Technology Year: 2025 Vol: 13 (2)Pages: 1-7
JOURNAL ARTICLE

Data Security and Privacy Protection of Cloud Computing

Xue Bing DaiZhao Jing WangZhang Yan

Journal:   Advanced materials research Year: 2013 Vol: 846-847 Pages: 1570-1573
JOURNAL ARTICLE

Data Security and Privacy Protection in Public Cloud

Yue Shi

Year: 2018 Pages: 4812-4819
JOURNAL ARTICLE

Data protection-data security-privacy

Journal:   Computers & Security Year: 1984 Vol: 3 (1)Pages: 57-58
JOURNAL ARTICLE

Data privacy and data protection security algorithms for big data in cloud

R. SumithraR. Parameswari

Journal:   International Journal of Health Sciences Year: 2022 Pages: 7613-7621
© 2026 ScienceGate Book Chapters — All rights reserved.