Security Issues in Cloud Computing and Existing Solutions- a Survey

Authors

  • M Revathi
  • R Priya

DOI:

https://doi.org/10.14419/ijet.v7i3.27.17761

Published:

2018-08-15

Keywords:

Cloud computing, security challenges, denial of service, sniffer attack, CAPTCHA breaking, data leakage.

Abstract

Cloud computing is turning into an outstanding fluff word these days. It is an appealing innovation for long-haul benefits through cost diminishment and change in business results. It additionally tackles numerous issues of stereotyped processing, including taking care of more volume of burdens, introducing programming updates, and, utilizing overabundance figuring cycles. Regardless, the contemporary advancement has new troubles, for instance, data security, information inborn, and trans-code data storing. Cloud computing is consumed and compared to the modern transformation. Cloud administrations are conveyed from server farms, for example, Amazon, Google, Microsoft et cetera, all through the world. The quick blast in the territory of "Cloud computing" moreover expands outrageous wellbeing concerns. This paper review cloud structure and the monstrous evaluation of Cloud computing with the essential consideration on holes and security issues. We perceive the best security dangers and their present arrangements.

 

References

[1] Rajesh M, Kumar KS, Shankar K & Ilayaraja M, “Sensitive Data Security in Cloud Computing Aid of Different Encryption Techniquesâ€, Journal of Advanced Research in Dynamical and Control Systems, Vol.18, (2017), pp.2888-2899.

[2] Yadav Er. N & Sharma A, “Implementation of data Security in Cloud Computingâ€, 3rd international conference on recent Trends in Engineering Science and Management, (2016).

[3] Gupta D, Chakraborty PS & Rajput P, “Cloud Security Using Encryption Techniquesâ€, International Journal, Vol.5, No2,(2015), pp.425-429.

[4] Singla S & Singh J, “Cloud data security using authentication and encryption techniqueâ€, Global Journal of Computer Science and Technology, (2013).

[5] Bhadauria R, Chaki R, Chaki N & Sanyal S, “A survey on security issues in cloud computingâ€, arXiv preprint arXiv:1109.5388, (2011).

[6] Kavitha, M., & Saravanakumar, V. (2018). Proactive model based testing and evaluation for component-based systems. International Journal of Engineering and Technology(UAE), 7(1.1).

[7] Mathisen E, “A Security Challenges and Solutions in Cloudâ€, International Conference on Ecosystems and techniques, (2011).

[8] Kumar P, Sehgal V, Shah K, Shukla SSP & Chauhan DS, “A novel approach for security in cloud computing using hidden markov model and clusteringâ€, World Congress on Information and Communication Technologies (WICT), (2011), pp.810-815.

[9] Padhy RP, Patra MR & Satapathy SC, “Cloud computing: security issues and research challengesâ€, International Journal of Computer Science and Information Technology & Security, Vol.1, No.2, (2011), pp.136-146.

[10] Sreedharan S, “Security and Privacy Issues of Cloud Computing; Solutions and Secure Frameworkâ€, IOSR Journal of Computer Engineering, (2013).

[11] Peng J, Zhang X, Lei Z, Zhang B, Zhang W & Li Q, “Comparison of several cloud computing platformsâ€, Second International Symposium on Information Science and Engineering, (2009), pp. 23-27.

[12] Vaidya C, Khobragade P & Golghate A, “Data Leakage Detection and Security in Cloud Computingâ€, GRD Journals-Global Research Development Journal for Engineering, Vol.1, No.12,(2016).

[13] Han S & Xing J, “Ensuring data storage security through a novel third party auditor scheme in cloud computingâ€, IEEE International Conference on Cloud Computing and Intelligence Systems (CCIS), (2011), pp.264-268.

[14] Chen ZB & Yang JF, “Cloud Computing Research and Security Issuesâ€, IEEE International Conference on Computational Intelligence and Software Engineering (CISE), (2010), pp.1-3.

[15] National Institute of Standards and Technology (NIST), Information Technology Laboratory (www.csrc.nist.gov)

[16] Swarajyam S, Madhukar E & Sowmya Lakshmi P, “Data Security in cloud Computing using Linear Programmingâ€, IOSR journal of computer Engineering, (2012).

[17] Hemalatha S & Manickachezian, R “Performance of Ring based Fully Homomorphic encryption for securing data in cloud computingâ€, International Journal of Advanced Research in Computer and Communication Engineering, Vol.3, No.11,(2014).

[18] Potey MM, Dhote CA & Sharma DH, “Homomorphic encryption for security of cloud dataâ€, Procedia Computer Science, Vol.79, (2016), pp.175-181.

[19] G Mussabekova, S Chakanova, A Boranbayeva, A Utebayeva, K Kazybaeva, K Alshynbaev (2018). Structural conceptual model of forming readiness for innovative activity of future teachers in general education school. Opción, Año 33. 217-240

[20] G Cely Galindo (2017) Del Prometeo griego al de la era-biós de la tecnociencia. Reflexiones bioéticas Opción, Año 33, No. 82 (2017):114-133

View Full Article: