Enhancing Features of Cloud Computing Using Cloud Access Security Brokers to Avoid Data Breaches


  •   Shabnam Kaur

  •   Rajandra Gupta


Data breaches have gained widespread attention as businesses of all sizes become increasingly reliant on digital data, cloud computing, and workforce mobility. Cloud applications reduce costs and improve productivity. But it is equally important to monitor and protect data in a cloud environment. These are the questions that arise how to deal with lost visibility, unmanaged devices, and careless users. This paper explains how cloud access security brokers (CASBs) extend security to cloud applications, awareness for data breaches, providing visibility, threat protection, access control, and compliance. The key characteristics and benefits of cloud access security brokers (CASBs) are visibility, threat protection, access control and compliance are key components of this paper to extend data loss prevention (DLP). There is need to create the architecture of CABs having feature to deal with all types of Data Breaches.  The result of the study provided a secure architecture to fulfill the security needs and tracks the complex connections between enterprise infrastructure and its cloud service provider.

Keywords: Data Breaches, Cloud Access Security Brokers (CASBs), Data Loss Prevention (DLP).


Chuanyi Liu, Guofeng Wang, Peiyi Han, Hezhong Pan, Binxing Fang, "A Cloud Access Security Broker Based Approach for Encrypted Data Search and Sharing”, IEEE Xplore,2017

Eduardo B. Fernandez, Nobuka ZU Yoshioka, Hironori Washizaki, "Cloud Access Security Broker (CASB): A Pattern for Secure Access to Cloud Services", 4th Asian Conference on Pattern Languages of Programs (Asianplop 2015)

Guofeng Wang, Chuanyi Liu, Yingfei Dong, Hezhong Pan, Peiyi Han, Binxing Fang, "Safebox: A Scheme for Searching and Sharing Encrypted Data in Cloud Applications", 2017 International Conference On Security, Pattern Analysis, And Cybernetics, IEEE

Opeyemi Osanaiye, Shuo Chen, Zheng Yan, "From Cloud to Fog Computing: A Review and A Conceptual Live Vm Migration Framework", IEEE, April 12, 2017

Fog Computing and Internet of Things: Extend The Cloud to Where the Things Are, Accessed On Apr. 18, 2017. [Online]. http://Www.Cisco.Com/ C/Dam/En_Us/Solutions/Trends/Iot/Docs/Computing-Overview.Pdf/

N. vurukonda, B. Thirumala Rao, "A Study On Data Storage Security Issues In Cloud Computing",2nd international conference on intelligent computing", Communication & Convergence (ICCC-2016)

Vivek Kumar Prasad, Viraj M Mavawala,"Enhancement in Fiat Shamir Cryptography Algorithm", International Journal of Innovations & Advancement in Computer Science, September 2015.

Preeti Kumari, Parmeet Kaur,"A survey of fault tolerance in cloud computing", Journal of King Saud University - Computer and Information Sciences, October 2018

Nabeel khan a, Adil Al-Yasiri,"Identifying Cloud Security Threats to Strengthen Cloud Computing Adoption Framework" The 2nd International Workshop On Internet of Thing: Networking Applications and Technologies (IOTNAT- 2016)

Tulin Atmaca, Thomas Begin, Alexandre Brandwajn, Hind Castel-Taleb, "Performance Evaluation of Cloud Computing Centers with General Arrivals and Service" IEEE Xplore Digital Library 2016

Shichao Guan, "A Multi-Layered Scheme for Distributed Simulations On the Cloud Environment", IEEE XPLORE,2016

Dan Gonzales, Jeremy M. Kaplan, Evan Saltzman, Zev Winkelman, Dulani Woods, " Cloud-Trust—A Security Assessment Model for Infrastructure as A Service (Iaas) Clouds", IEEE Transactions On Cloud Computing, volume: 5, issue: 3, July-Sept. 1 2017

Kwang Mong Sim,"Agent-Based Approaches for Intelligent Intercloud Resource Allocation", IEEE Transactions on Cloud Computing ,2018

Blesson Varghese, Massimo Villari , Omer Rana , Philip James , Tejal Shah , Maria Fazio , Rajiv Ranjan, "Realizing Edge Marketplaces: Challenges And Opportunities" Published in: “IEEE Cloud Computing”, volume: 5, issue: 6, Nov./Dec. 2018

P. Ravi Kumar, P.Herbet Raj, P.jeliciana, "Exploring Data Security Issues And Solutions In Cloud Computing", 6th international conference on smart computing and communications, ICSCC 2018.

B. Hari Krishna, Dr.S. Kiran, G. Murali, "Security Issues in Service Model of Cloud Computing Environment", International Conference on Computational Science, 2016.


Download data is not yet available.


How to Cite
Kaur, S. and Gupta, R. 2019. Enhancing Features of Cloud Computing Using Cloud Access Security Brokers to Avoid Data Breaches. European Journal of Engineering and Technology Research. 4, 10 (Oct. 2019), 185-189. DOI:https://doi.org/10.24018/ejers.2019.4.10.1518.