Cloud computing security: a survey

  • Authors

    • P Sheela Gowr
    • N Kumar
    2018-04-20
    https://doi.org/10.14419/ijet.v7i2.21.12439
  • Cloud computing, cloud service provider, and cloud service consumer.
  • Cloud computing was a hasting expertise which has innovated to a collection of new explores. A sub-ordinate device for Information services, it has an ability towards encourage development by feeding convenient environments for a choice of forms of development is different sequence. Clouds usually consider being eco-friendly, however keep it has open to the diversity of some security issues to can change together the feeder as well as users of these cloud services. In this issue are principally associated to the protection of the information flow throughout also being store in the cloud, with simple problems along with data ease of use, data right to use and data confidentiality. Data encryption and service authentication scheme has been initiated by the industries to deal with them. In this paper analyse and examine different issues on security beside with the different procedure worn by the industries to solve these effects.

     

  • References

    1. [1] Khalid U, Ghafoor A, Irum M & Shibi M, “Cloud based secure and privacy enhanced authentication and authorization protocolâ€, International Conference in Knowledge Based and Intelligent Information and Engineering System, (2013), pp.608-688.

      [2] Govida K & Sathiyamoorthy E, “Identity anonymization and secure data storage using group signature in private cloudâ€, Procedia Technology, (2012), pp.495-499.

      [3] Salama D, Kadar H & Hadhoud M, “Studying the effects of most common encryption algorithmsâ€, International Arab Journal of e-Technology, Vol.2, No.1, (2013), pp.1-10.

      [4] Mishra R, Dash S & Mishra D, “Privacy Preserving Repository for securing data across the Cloudâ€, 3rd International Conference on Electronics Computer Technology, Vol.5, (2011), pp.6-10.

      [5] Singh J, Kumar B & Khatri A, “Securing the Storage Data using RC5 Algorithmâ€, International Journal of Advanced Computer Research, (2012).

      [6] Stolfo SJ, Salem MB & Keromytis AD, “Fog Computing: Mitigating Insider Data Theft Attacks in Cloudâ€, IEEE CS Security and Privacy Workshop, (2012).

      [7] Ali M, Dhamotharan R, Khan E, Khan SU, Vasilakos AV, Li K & Zomaya AY, “SeDaSC: secure data sharing in cloudsâ€, IEEE Systems Journal, Vol.11(2), (2017), pp.395-404.

      [8] Latif R, Abbas H, Assar S & Ali Q, “Cloud computing risk assessment: a systematic literature reviewâ€, Future Information Technology, (2014), pp.285-295.

      [9] Australian Government Cyber Security Operations Center, Cloud Computing Security Considerations, (2012).

      [10] Jansen W & Grance T, “Guidelines on security and privacy in public cloud computingâ€, NIST Special Publication, (2011).

      [11] Jain R, “Network Access Control and Cloud Securityâ€, CSE 571s, Washington University in Saint Louis.

      [12] Network Admission Control, Wikipedia: The Free Encyclopedia, Wikimedia Foundation.

      [13] Ziao Z & Xiao Y, “Security and privacy in cloud computingâ€, IEEE Communications Surveys & Tutorials, Vol.15, No.2, (2013), pp.843-859.

      [14] Bhadauria R & Sanyal S, “Survey on Security Issues in Cloud Computing and Associated Mitigation Techniquesâ€, Intl. Journal of Computer Applications, Vol.47, No.18, (2014), pp.47-66.

  • Downloads

  • How to Cite

    Sheela Gowr, P., & Kumar, N. (2018). Cloud computing security: a survey. International Journal of Engineering & Technology, 7(2.21), 355-357. https://doi.org/10.14419/ijet.v7i2.21.12439