Cloud Computing Environment: Research on Big Data Security and Privacy Protection Strategies
DOI: 10.23977/jaip.2025.080403 | Downloads: 3 | Views: 90
Author(s)
Shenpeiyilin 1
Affiliation(s)
1 Amazon Web Servicees Inc, Arlington County, Virginia, USA
Corresponding Author
ShenpeiyilinABSTRACT
Against the backdrop of rapid cloud computing development, big data has become an important resource across research, education, government and enterprise sectors, characterized by large scale, diverse types and high sensitivity. However, the openness and sharing features of cloud environments also bring severe challenges to data security and privacy protection. This paper first analyzes cloud computing architectures and the characteristics of big data, and describes the main security risks that arise throughout the data lifecycle (collection, transmission, storage and use), while summarizing common threat types and privacy leakage pathways. On this basis, it discusses key technical measures such as encryption, access control, differential privacy and federated learning, and proposes a protection strategy that integrates a multi-layered security defense with a compliance-oriented governance framework. Case studies are used to validate the feasibility and practical effectiveness of the proposed strategy in preventing data breaches and improving privacy protection. The results show that building a systematic, scalable security and privacy protection system not only effectively ensures the security and trustworthiness of big data in cloud environments, but also provides strong support for future intelligent and compliant data applications.
KEYWORDS
Cloud Computing, Big Data, Data Security, Privacy Protection, StrategyCITE THIS PAPER
Shenpeiyilin, Cloud Computing Environment: Research on Big Data Security and Privacy Protection Strategies. Journal of Artificial Intelligence Practice (2025) Vol. 8: 17-24. DOI: http://dx.doi.org/10.23977/jaip.2025.080403.
REFERENCES
[1] Alabdulatif, Abdullah, Navod Neranjan Thilakarathne, and Kassim Kalinaki. "A novel cloud enabled access control model for preserving the security and privacy of medical big data." Electronics 12.12 (2023): 2646.
[2] Valivarthi, Dharma Teja. "Optimizing cloud computing environments for big data processing." International Journal of Engineering & Science Research 14.2 (2024): 1756-1775.
[3] Layode, Oluwabunmi, et al. "Data privacy and security challenges in environmental research: Approaches to safeguarding sensitive information." International Journal of Applied Research in Social Sciences 6.6 (2024): 1193-1214.
[4] Amaithi Rajan, Arun, and Vetriselvi V. "Systematic survey: secure and privacy-preserving big data analytics in cloud." Journal of Computer Information Systems 64.1 (2024): 136-156.
[5] Pawar, Ankush Balaram, Shashikant U. Ghumbre, and Rashmi M. Jogdand. "Privacy preserving model-based authentication and data security in cloud computing." International Journal of Pervasive Computing and Communications 19.2 (2023): 173-190.
[6] Banerjee, Somnath. "Challenges and Solutions for Data Management in Cloud-Based Environments." International Journal of Advanced Research in Science, Communication and Technology (2023): 370-378.
[7] Yanamala, Anil Kumar Yadav. "Emerging challenges in cloud computing security: A comprehensive review." International Journal of Advanced Engineering Technologies and Innovations 1.4 (2024): 448-479.
[8] Mohammed, Shameer, et al. "A new lightweight data security system for data security in the cloud computing." Measurement: Sensors 29 (2023): 100856.
[9] Tahseen, Asma, Sangyam Rohith Shailaja, and Yagnasri Ashwini. "Extraction for Big Data Cyber Security Analytics." Advances in Computational Intelligence and Informatics: Proceedings of ICACII 2023 993 (2024): 365.
[10] Ang'udi, Janet Julia. "Security challenges in cloud computing: A comprehensive analysis." World Journal of Advanced Engineering Technology and Sciences 10.2 (2023): 155-181.
| Downloads: | 16532 |
|---|---|
| Visits: | 576242 |
Sponsors, Associates, and Links
-
Power Systems Computation
-
Internet of Things (IoT) and Engineering Applications
-
Computing, Performance and Communication Systems
-
Advances in Computer, Signals and Systems
-
Journal of Network Computing and Applications
-
Journal of Web Systems and Applications
-
Journal of Electrotechnology, Electrical Engineering and Management
-
Journal of Wireless Sensors and Sensor Networks
-
Journal of Image Processing Theory and Applications
-
Mobile Computing and Networking
-
Vehicle Power and Propulsion
-
Frontiers in Computer Vision and Pattern Recognition
-
Knowledge Discovery and Data Mining Letters
-
Big Data Analysis and Cloud Computing
-
Electrical Insulation and Dielectrics
-
Crypto and Information Security
-
Journal of Neural Information Processing
-
Collaborative and Social Computing
-
International Journal of Network and Communication Technology
-
File and Storage Technologies
-
Frontiers in Genetic and Evolutionary Computation
-
Optical Network Design and Modeling
-
Journal of Virtual Reality and Artificial Intelligence
-
Natural Language Processing and Speech Recognition
-
Journal of High-Voltage
-
Programming Languages and Operating Systems
-
Visual Communications and Image Processing
-
Journal of Systems Analysis and Integration
-
Knowledge Representation and Automated Reasoning
-
Review of Information Display Techniques
-
Data and Knowledge Engineering
-
Journal of Database Systems
-
Journal of Cluster and Grid Computing
-
Cloud and Service-Oriented Computing
-
Journal of Networking, Architecture and Storage
-
Journal of Software Engineering and Metrics
-
Visualization Techniques
-
Journal of Parallel and Distributed Processing
-
Journal of Modeling, Analysis and Simulation
-
Journal of Privacy, Trust and Security
-
Journal of Cognitive Informatics and Cognitive Computing
-
Lecture Notes on Wireless Networks and Communications
-
International Journal of Computer and Communications Security
-
Journal of Multimedia Techniques
-
Automation and Machine Learning
-
Computational Linguistics Letters
-
Journal of Computer Architecture and Design
-
Journal of Ubiquitous and Future Networks

Download as PDF