Managing User and Cloud Service Provider Access to Data in Cloud Computing- Panacea for Data Vulnerability

  • Unique Paper ID: 144540
  • PageNo: 224-228
  • Abstract:
  • The cloud computing technology allows organizations and individuals to share infrastructure, which reduces the cost of conducting business operations. The large number of security threats associated with cloud computing discourages some organizations and individuals from adopting this technology. The key types of security risks can be put into three categories, including network-related, data, and cloud environment threats. The cloud environment threats include denial of service and account hijacking. Data threats include the loss or breach of critical information. The network-related sources of threat include malicious insiders, abuse of cloud services, and insecure interface APIs. Segregation of duties and effective recruitment procedures are some of the key strategies that should be used to manage administrators’ access to data. The users’ access to the data can be managed through the application of configuration management tools, manual control of servers, enterprise-identity solution, exposure of AD and LDAP to the internet, and directory-as-a-service.

Copyright & License

Copyright © 2026 Authors retain the copyright of this article. This article is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

BibTeX

@article{144540,
        author = {Uchechukwu Paschal Emejeamara and Udochukwu J. Nwoduh and Andrew K. Madu},
        title = {Managing User and Cloud Service Provider Access to Data in Cloud Computing- Panacea for Data Vulnerability},
        journal = {International Journal of Innovative Research in Technology},
        year = {},
        volume = {3},
        number = {12},
        pages = {224-228},
        issn = {2349-6002},
        url = {https://ijirt.org/article?manuscript=144540},
        abstract = {The cloud computing technology allows organizations and individuals to share infrastructure, which reduces the cost of conducting business operations. The large number of security threats associated with cloud computing discourages some organizations and individuals from adopting this technology. The key types of security risks can be put into three categories, including network-related, data, and cloud environment threats. The cloud environment threats include denial of service and account hijacking. Data threats include the loss or breach of critical information. The network-related sources of threat include malicious insiders, abuse of cloud services, and insecure interface APIs. Segregation of duties and effective recruitment procedures are some of the key strategies that should be used to manage administrators’ access to data. The users’ access to the data can be managed through the application of configuration management tools, manual control of servers, enterprise-identity solution, exposure of AD and LDAP to the internet, and directory-as-a-service. },
        keywords = {Cloud computing, security risks, data threats, cloud servers, user management.},
        month = {},
        }

Cite This Article

Emejeamara, U. P., & Nwoduh, U. J., & Madu, A. K. (). Managing User and Cloud Service Provider Access to Data in Cloud Computing- Panacea for Data Vulnerability. International Journal of Innovative Research in Technology (IJIRT), 3(12), 224–228.

Related Articles