A Survey on Security and Privacy Issues in Cloud Computing

 
 
 
  • Abstract
  • Keywords
  • References
  • PDF
  • Abstract


    Cloud computing is broadly utilized rising innovation for putting away and sharing information over web yet at the same time confronting loads of security and protection issues. These difficulties incorporate client's mystery information misfortune, information spillage and uncovering of the individual information security. Considering the security and protection inside the cloud there are different dangers to the client's delicate information on distributed storage. This paper is review on the security and protection issues and accessible arrangements. Additionally present diverse open doors in security and protection in cloud condition. Furthermore, cloud specialist co-ops (CSPs) can likewise deliver the talked about issues to offer better security and protection.

     


  • Keywords


    Cloud Computing, Security, Privacy, Cloud Service Providers

  • References


      [1] Z. Tari, “Security and Privacy in Cloud Computing,”IEEE Cloud Comput., vol. 1, no. 1, pp. 54–57, 2014.

      [2] H. Takabi, J. B. D. Joshi, and G.-J. Ahn, “Security and Privacy Challenges in Cloud Computing Environments,” IEEE Secur. Priv. Mag., vol. 8, no. 6, pp. 24–31, 2010.

      [3] Z. Tari, X. Yi, U. S. Premarathne, P. Bertok, and I. Khalil, “Security and privacy in cloud computing: Vision, trends, and challenges,” IEEE Cloud Comput., vol. 2, no. 2, pp. 30–38, 2015.

      [4] M. Zhou, R. Zhang, W. Xie, W. Qian, and A. Zhou, “Security and Privacy in Cloud Computing?: A Survey Security and Privacy in Cloud Computing:,” Sixth Int. Conf. Semant. Knowl. Grids, vol. 2, pp. 126–149, 2010.

      [5] W. Kong, Y. Lei, and J. Ma, “Data Security and Privacy in Cloud Computing,” Int. J. Distrib. Sens. Networks, vol. 2014, pp. 512–514, 2014.

      [6] Arjun and Vinay, “A Short Review on Data Security and Privacy Issues in Cloud Computing,” IEEE, 2016.

      [7] M. M. U. B. YahyaKord, TamandaniQahtan, “Security and Privacy Issues in Cloud Computing,” IEEE, pp. 896–900, 2016.

      [8] S. Mahdi Shariati, M. Abouzarjomehri, and H. Ahmadzadegan, “Challenges and security issues in cloud computing from two perspectives: Data security and privacy protection,” 2nd Int. Conf. Knowledge-based Eng. Innov., pp. 1078–1082, 2015.

      [9] S. Sahin, “On Current Trends in Security and Privacy of Cloud Computing,” Proc. AICT’13, pp. 1–5, 2013.

      [10] Abuhussein, H. Bedi, and S. Shiva, “Evaluating Security and Privacy in Cloud Computing Services: A Stakeholder’s Perspective,” Internet Technol. Secur.Trans., pp. 388–395, 2012.

      [11] G. Kulkarni, N. Chavan, R. Chandorkar, R. Waghmare, and R. Palwe, “Cloud security challenges,” Telecommun. Syst. Serv. Appl. (TSSA), 2012 7th Int. Conf., pp. 88–91, 2012.

      [12] J. Kozhipurath,“Cloud Service Costing Challenges,” IEEE, 2012.

      [13] P. K. G. Gandhi, “Cloud Computing Security issues: An Analysis,” IEEE, pp. 3858–3861, 2016.

      [14] Mahesh U. Shankarwar and Ambika V. Pawar, “Security and Privacy in Cloud Computing: A Survey”, © Springer International Publishing Switzerland 2015.

      [15] Joseph K. Liu, Kaitai Liang∗ , Willy Susilo, Jianghua Liu, Yang Xiang,“Two-Factor Data Security Protection Mechanism for Cloud Storage System”, ieee-tc-2016.

      [16] ZahirTari, Xun Yi, Uthpala S. Premarathne, Peter Bertok, Ibrahim Khalil. "Security and Privacy in Cloud Computing: Vision, Trends, and Challenges", IEEE Cloud Computing, 2015

      [17] https://www.wikipedia.org


 

View

Download

Article ID: 11172
 
DOI: 10.14419/ijet.v7i2.4.11172




Copyright © 2012-2015 Science Publishing Corporation Inc. All rights reserved.