Cloud computing represents the most recent trends in the world of information technology. It uses the latest virtualization techniques to offer the user several types of SaaS, PaaS or IaaS services. It also introduces new security challenges, especially regarding access control, confidentiality and availability. The concerns about security issues remain the main obstacle to the adoption of the cloud by companies. As a consequence, a lot of researchers have been interested in protecting access to data stored in cloud environments. The aim of this work is, on the one hand, to study the security mechanisms proposed to ensure the security of data, whose two fields of investigation are the management of access to the data of the distant users and the management of the confidentiality of these data in the cloud, and on the other hand, to explore the possibility of adapting the opportunities offered by these mechanisms, so as to put forward our security solution. The security schema we suggest in this paper allows a distant user to access of all their data anywhere in the cloud by means of authentication based on the signature of their heartbeat. The performed experiments demonstrate the efficiency of our proposed approach, which sharply outperforms the other approaches in terms of execution time, robustness, and a set of simulated attacks.
Cloud computing is the fruit of recent developments in information technology, it provides access to many online services as well as remote computing resources as needed. To be more specific, cloud computing stands today as a satisfactory answer to the problem of storage and computing of data encountered by companies. It provides treatment and accommodation of their digital information via a fully outsourced infrastructure. The latter enables users to benefit from many online services without worrying about the technical aspects of their use. In the meanwhile, it limits costs generated by the management of these data. However, this advanced technology has immediately highlighted many serious security troubles. The major issue that prevents many companies to migrate to the cloud is the security of sensitive data hosted in the provider. Actually, the security problem related to this technology has slowed their expansion and restricted in a severe way their scope. The work in this paper deals to present a literature review of data security approaches for cloud computing, and evaluates them in terms of how well they support critical security services and what level of adaptation they achieve.