Cloud security: risk factors and security issues in current trends

  • Authors

    • Dr. K.SAI MANOJ Amrita Sai Institute of Science and Technology
    2019-10-19
    https://doi.org/10.14419/ijet.v8i4.29655
  • Cloud Computing, Cloud Security, Security Threats, Security Techniques, Cloud Security Standards.
  • Now a days, cloud computing is an emerging and way of computing in computer science. Cloud computing is a set of resources and services that are offered by the network or internet. Cloud computing extends various computing techniques like grid computing, distributed compu-ting. Today cloud computing is used in both industrial, research and academic field. Cloud facilitates its users by providing virtual resources via internet. As the field of cloud computing is spreading the new techniques are developing. This increase in cloud computing environment also increases security challenges for cloud developers. Users of cloud save their data in the cloud hence the lack of security in cloud can lose the user’s trust.

    In this paper we will discuss some of the cloud security issues in various aspects like multi-tenancy, elasticity, reliability, availability etc in various sectors, the paper also discuss existing security techniques and approaches for a secure cloud environment. This paper will enable researchers and professionals to know about different security threats and models and tools proposed.

     

     

  • References

    1. [1] Gates, F., Natkovich, O., Chopra, S., Kamath, S. M., Klamath, P., Narayanamuthry, S. M., et al. (2009). Building a High-Level Dataflow System on top of Map-Reduce: The Pig Experience. In Proceedings of the Thirty-Fifth International Conference on Very Large Data Bases (VLDB) (Industrial, Applications and Experience Track), Lyon, France.https://doi.org/10.14778/1687553.1687568.

      [2] http://citeseerx.ist.psu.edu/viewdoc/download?.

      [3] https://www.researchgate.net/profile/Aized_Soofi3/publication/319980773_A_Review_on_Data_Security_in_Cloud_Computing/links/59c8c3e1aca272c71bcd7074/A-Review-on-Data-Security-in-Cloud-Computing.pdf.

      [4] http://ieeexplore.ieee.org/document/6848730/.

      [5] Hama. (n.d.). Retrieved from http://cwiki.apache. org/labs/cloudsglossary.html.

      [6] Tout, Sverdlik, and Lawver, “Cloud Computing and its Security in Higher Education,†In Proceedings of the Proc ISECON 2009.

      [7] Kant, Dr Chander, and Yogesh Sharma. "Enhanced Security Architecture for Cloud Data Security." International Journal of Advanced Research in Computer Science and Software Engineering 3.5 (2013): 571-575.

      [8] Campbell, Jeronimo, “Applied Virtualization Technology,†Hillsboro, Intel Press (ISBN 09764832-3- 8), 2006, pp. 69-73.

      [9] Dong Xin, et al.â€achieving secure and efficient data collaboration in cloud computing. â€Quality of service, 2013 IEEE/ACM 21st International symposium on.IEEE,2013.

      [10] Xia Z., Zhu Y., Sun X. and Chen L. (2014), "Secure semantic expansion based search over encrypted cloud data supporting similarity ranking "Journal of Cloud Computingâ€,Springer 3.1, pp. 1-11. https://doi.org/10.1186/s13677-014-0008-2.

      [11] Yunqi Ye, Liangliang Xiao, I-Ling Yen, FarokhBastani, “Secure, Dependable, and High Performance Cloud Storageâ€, 2010 29th IEEE International Symposium on Reliable.

  • Downloads

  • How to Cite

    K.SAI MANOJ, D. (2019). Cloud security: risk factors and security issues in current trends. International Journal of Engineering & Technology, 8(4), 424-432. https://doi.org/10.14419/ijet.v8i4.29655