Cloud computing security: a survey

  • Abstract
  • Keywords
  • References
  • PDF
  • Abstract

    Cloud computing was a hasting expertise which has innovated to a collection of new explores. A sub-ordinate device for Information services, it has an ability towards encourage development by feeding convenient environments for a choice of forms of development is different sequence. Clouds usually consider being eco-friendly, however keep it has open to the diversity of some security issues to can change together the feeder as well as users of these cloud services. In this issue are principally associated to the protection of the information flow throughout also being store in the cloud, with simple problems along with data ease of use, data right to use and data confidentiality. Data encryption and service authentication scheme has been initiated by the industries to deal with them. In this paper analyse and examine different issues on security beside with the different procedure worn by the industries to solve these effects.


  • Keywords

    Cloud computing, cloud service provider, and cloud service consumer.

  • References

      [1] Khalid U, Ghafoor A, Irum M & Shibi M, “Cloud based secure and privacy enhanced authentication and authorization protocol”, International Conference in Knowledge Based and Intelligent Information and Engineering System, (2013), pp.608-688.

      [2] Govida K & Sathiyamoorthy E, “Identity anonymization and secure data storage using group signature in private cloud”, Procedia Technology, (2012), pp.495-499.

      [3] Salama D, Kadar H & Hadhoud M, “Studying the effects of most common encryption algorithms”, International Arab Journal of e-Technology, Vol.2, No.1, (2013), pp.1-10.

      [4] Mishra R, Dash S & Mishra D, “Privacy Preserving Repository for securing data across the Cloud”, 3rd International Conference on Electronics Computer Technology, Vol.5, (2011), pp.6-10.

      [5] Singh J, Kumar B & Khatri A, “Securing the Storage Data using RC5 Algorithm”, International Journal of Advanced Computer Research, (2012).

      [6] Stolfo SJ, Salem MB & Keromytis AD, “Fog Computing: Mitigating Insider Data Theft Attacks in Cloud”, IEEE CS Security and Privacy Workshop, (2012).

      [7] Ali M, Dhamotharan R, Khan E, Khan SU, Vasilakos AV, Li K & Zomaya AY, “SeDaSC: secure data sharing in clouds”, IEEE Systems Journal, Vol.11(2), (2017), pp.395-404.

      [8] Latif R, Abbas H, Assar S & Ali Q, “Cloud computing risk assessment: a systematic literature review”, Future Information Technology, (2014), pp.285-295.

      [9] Australian Government Cyber Security Operations Center, Cloud Computing Security Considerations, (2012).

      [10] Jansen W & Grance T, “Guidelines on security and privacy in public cloud computing”, NIST Special Publication, (2011).

      [11] Jain R, “Network Access Control and Cloud Security”, CSE 571s, Washington University in Saint Louis.

      [12] Network Admission Control, Wikipedia: The Free Encyclopedia, Wikimedia Foundation.

      [13] Ziao Z & Xiao Y, “Security and privacy in cloud computing”, IEEE Communications Surveys & Tutorials, Vol.15, No.2, (2013), pp.843-859.

      [14] Bhadauria R & Sanyal S, “Survey on Security Issues in Cloud Computing and Associated Mitigation Techniques”, Intl. Journal of Computer Applications, Vol.47, No.18, (2014), pp.47-66.




Article ID: 12439
DOI: 10.14419/ijet.v7i2.21.12439

Copyright © 2012-2015 Science Publishing Corporation Inc. All rights reserved.