A Survey on Security Issues in Cloud Computing

 
 
 
  • Abstract
  • Keywords
  • References
  • PDF
  • Abstract


    Cloud computing is an approach to elaborate the limit and adding the endowment without adding the resourcesinto the modern framework, organizing new process, or authorizing new programming. Cloud computing is the major outcome of the composition of the traditional enrolling development and system development like matrix multiplication, distributed computing, parallel computing and etc. The cloud computing will allows the information allocation that consists of software, policy and infrastructure, which defines the virtualization. Cloud computing is the design which provides the services through internet on paper use access to store the information like storage, servers and applications, without its physical existence. This paper gives outlines that what is meant by the cloud computing means, various cloud computing models such as cloud deployment model, and the cloud service models and the security issues that is faced by the cloud computing model, and the various existing security solutions. This paper is a survey of security issues and security challenges in the world of cloud computing which provides the various aspects of cloud computing.

     

     


  • Keywords


    Cloud Computing, Security Issues, Cloud Security,Encryption, Authentication.

  • References


      [1] Randeep Kaur and Jagroop Kaur, “Cloud Computing Security Issues and its Solution: A Review”, IEEE International Conference on Computing for Sustainable Global Development, pp. 1198-2000, 2015.

      [2] Jianfeng Yang and Zhibin Chen, “Cloud Computing Research and Security Issues”, IEEE international Conference onHYPERLINK "http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=5676124" ComputationalIntelligence and Software Engineering (CiSE), 2010.

      [3] Kui Ren, Cong Wang, and Qian Wang, “Security Challenges for the Public Cloud”, IEEE Computer Society, pp. 69-73, 2012.

      [4] Pengfei You, Yuxing Peng, Weidong Liu, and Shoufu Xue, “Security Issues and Solutions in Cloud Computing”, pp. 573-577, 2012.

      [5] Huaglory Tianfield, “Security Issues in Cloud Computing”, IEEE International Conference on Systems, Man, and Cybernetics, pp. 1082-1089, 2012.

      [6] Akhil behl, Kanika behl, “An Analysis of Security Issues in Cloud Computing”, IEEE world congress on Information and communication Technologies, pp. 109-114, 2012.

      [7] Mutum Zico Meetei and Anita Goel, “Security Issues in Cloud Computing”, 5th International Conference on Bio Medical Engineering and Informatics (BMEI 2012), pp. 1321-1325, 2012.

      [8] Kevin Hamlen, Murat Kantarcioglu, Latifur Khan, Bhavani Thuraisingham, “Security Issues for Cloud Computing”, International Journal of Information Security and Privacy, pp. 39-51, 2010.

      [9] Rabi Prasad Padhy, Manas Ranjan Patra, Suresh Chandra Satapathy, “Cloud Computing: Security Issues and Research Challenges”, IRACST - International Journal of Computer Science and Information Technology & Security (IJCSITS) Vol. 1, No. 2, pp. 136-145, 2011 .

      [10] L. Ertaul, S. Singhal, , and G. Saldamli, “ Security Challenges in Cloud Computing” California Sate university, 2010..

      [11] Keiko Hashizume, David G Rosado, Eduardo Fernández-Medina, and Eduardo B Fernandez, “An Analysis of security issues for cloud computing”, Journal of Internet Services and Applications, pp. 1-13, 2013.

      [12] Nelson Gonzalez, Charles Miers, Fernando Red´ıgolo, Marcos Simpl ´ıcio, Tereza Carvalho, Mats Na¨ slund and Makan Pourzandi, “A quantitative analysis of current security concerns and solutions for cloud computing”, Journal of Cloud Computing: Advances, Systems and Applications, A Springer Journal, pp. 1-18, 2012.

      [13] Hassan Takabi and James b.d. JosHi, “Security and Privacy Challenges in /cloud Computing Enviornments”, The IEEE Computer and Reliability Societies, pp. 1540-7993, 2010

      [14] Chaoqun Yu, Lin Yang, Yuan Liu, Xiangyang Luo, “Research on Data Security Issues of Cloud Computing” IEEE International conference on Cyberspace technology, May 2015.

      [15] Awwab Mohammad, Sanna Mehraj Kak, M. Afshar Alam, “Cloud Computing: Issues and Security Challenges”, International Journal of Advanced Research in Computer Science, Volume 8, No. 2, pp. 26-28, March 2017.

      [16] Kuyoro S. O., Ibikunle F., Awodele O, “Cloud Computing Security Issues and Challenges”, International Journal of Computer Networks (IJCN), Volume 3, pp. 247-255, 2011.

      [17] Mr. G. Nanda Kishor Kumar and Mr. M. Naresh, “Security Threats in Cloud Computing”, International Conference on Emerging Trends in engineering, Science and Management, pp. 983-992, 2017.

      [18] R. Kalaichelvi Chandrahasan, S Shanmuga Priya and Dr. L. Arockiam, “Research Challenges and Security Issues in Cloud Computing”, International Journal of Computational Intelligence and Information Security, March 2012 Vol. 3, No. 3

      [19] R Charanya, M Aramudhan, “Survey on Access Control Issues in Cloud Computing’, IEEE International Conference on Emerging Trends, 2016.

      [20] Neha Bairagi, Prof. Saurabh Kapoor, “Survey on User

      [21] Chung-Peng Huang, “Identity-Based Encryption with Cloud Revocation Authority and Its Applications”, IEEE, Transaction on Cloud Computing, pp. 1-14, 2015.

      Tianyu Zhao, Lingbo Wei, Chi Zhang, “Attribute-Based Encryption Scheme Based on SIFF”, IEEE ICC 2016 Communication and Information Systems Security Symposium, 2016.

 

View

Download

Article ID: 19469
 
DOI: 10.14419/ijet.v7i3.34.19469




Copyright © 2012-2015 Science Publishing Corporation Inc. All rights reserved.