A Comprehensive Study of Security in Cloud Computing
-
2018-12-05 https://doi.org/10.14419/ijet.v7i4.20742 -
Cloud Computing, Challenges, Database Outsourcing, Deployment Models, Secure Computing. -
Abstract
Cloud computing has become a popular model for reducing cost of business, improvise quality of services, and provide good & secure computing. It acts as a spectrum of substantial interest among IT professionals, technocrats & business leaders due to these proven potentials. Numerous emerging computing paradigms a.k.a database outsourcing serves as future advantages of cloud computing. With the in-creasing speed of its popularity, many security questions are arising with their respective solutions aiming to give a better understanding of their complex scenario, in this paper we will provide a comprehensive view over security in context of cloud computing and also provide a view of current status of security at present. To start with, we'll take a look at various Cloud computing models, cloud computing deploy-ment models, key issues in security along with challenges in provocation of permissions to various platforms.
Â
Â
-
References
[1] M. Sadiku, S. Musa, O. Momoh, Cloud computing: opportunities and challenges, IEEE Potentials 33 (1) (2014) 34–36.https://doi.org/10.1109/MPOT.2013.2279684.
[2] D. AB. Fernandes, L. FB. Soares, J.V. Gomes, M.M. Freire, P. RM Inácio, Security issues in cloud environments: a survey, Int. J. Inform. Sec. 13 (2) (2014), 113–170.https://doi.org/10.1007/s10207-013-0208-7.
[3] Mell, Peter, and Tim Grance. "The NIST definition of cloud computing." 2011.
[4] Ali, Mazhar, Samee U. Khan, and Athanasios V. Vasilakos. "Security in cloud computing: Opportunities and challenges." Information Sciences 305 (2015): 357-383.https://doi.org/10.1016/j.ins.2015.01.025.
[5] L. FB Soares, D. AB Fernandes, J.V. Gomes, M.M. Freire, P. RM Inácio, Cloud security: state of the art, in: Security, Privacy and Trust in Cloud Systems, Springer, Berlin, Heidelberg, 2014, pp. 3–44.https://doi.org/10.1007/978-3-642-38586-5_1.
[6] Alessandro Iudica, Understanding the Cloud v1.0, December 2014, IBM Education Understanding the Cloud 1, © 2013 IBM Corporation.
[7] Chahal D, Kharb L, “Data security in Cloud Computingâ€, International Journal of Engineering and Science Invention, Vol. 6 (12), 2017, pp. 31-36.
[8] H. Yu, N. Powell, D. Stembridge, X. Yuan, Cloud computing and security challenges, in: Proceedings of the 50th Annual Southeast Regional Conference, ACM, 2012, pp. 298–302.https://doi.org/10.1145/2184512.2184581.
[9] Kharb L, “IBM Blue mix: Future development with open cloud architectureâ€, International Journal of Information Communication and Computing Technology, Vol. 3(2), 2015, pp. 165-168.
-
Downloads
-
How to Cite
Chahal, D., Kharb, L., Bhardwaj, A., & Singla, D. (2018). A Comprehensive Study of Security in Cloud Computing. International Journal of Engineering & Technology, 7(4), 3897-3901. https://doi.org/10.14419/ijet.v7i4.20742