A Comprehensive Study of Security in Cloud Computing

  • Abstract
  • Keywords
  • References
  • PDF
  • Abstract

    Cloud computing has become a popular model for reducing cost of business, improvise quality of services, and provide good & secure computing. It acts as a spectrum of substantial interest among IT professionals, technocrats & business leaders due to these proven potentials. Numerous emerging computing paradigms a.k.a database outsourcing serves as future advantages of cloud computing. With the in-creasing speed of its popularity, many security questions are arising with their respective solutions aiming to give a better understanding of their complex scenario, in this paper we will provide a comprehensive view over security in context of cloud computing and also provide a view of current status of security at present. To start with, we'll take a look at various Cloud computing models, cloud computing deploy-ment models, key issues in security along with challenges in provocation of permissions to various platforms.



  • Keywords

    Cloud Computing; Challenges; Database Outsourcing; Deployment Models; Secure Computing.

  • References

      [1] M. Sadiku, S. Musa, O. Momoh, Cloud computing: opportunities and challenges, IEEE Potentials 33 (1) (2014) 34–36.https://doi.org/10.1109/MPOT.2013.2279684.

      [2] D. AB. Fernandes, L. FB. Soares, J.V. Gomes, M.M. Freire, P. RM Inácio, Security issues in cloud environments: a survey, Int. J. Inform. Sec. 13 (2) (2014), 113–170.https://doi.org/10.1007/s10207-013-0208-7.

      [3] Mell, Peter, and Tim Grance. "The NIST definition of cloud computing." 2011.

      [4] Ali, Mazhar, Samee U. Khan, and Athanasios V. Vasilakos. "Security in cloud computing: Opportunities and challenges." Information Sciences 305 (2015): 357-383.https://doi.org/10.1016/j.ins.2015.01.025.

      [5] L. FB Soares, D. AB Fernandes, J.V. Gomes, M.M. Freire, P. RM Inácio, Cloud security: state of the art, in: Security, Privacy and Trust in Cloud Systems, Springer, Berlin, Heidelberg, 2014, pp. 3–44.https://doi.org/10.1007/978-3-642-38586-5_1.

      [6] Alessandro Iudica, Understanding the Cloud v1.0, December 2014, IBM Education Understanding the Cloud 1, © 2013 IBM Corporation.

      [7] Chahal D, Kharb L, “Data security in Cloud Computing”, International Journal of Engineering and Science Invention, Vol. 6 (12), 2017, pp. 31-36.

      [8] H. Yu, N. Powell, D. Stembridge, X. Yuan, Cloud computing and security challenges, in: Proceedings of the 50th Annual Southeast Regional Conference, ACM, 2012, pp. 298–302.https://doi.org/10.1145/2184512.2184581.

      [9] Kharb L, “IBM Blue mix: Future development with open cloud architecture”, International Journal of Information Communication and Computing Technology, Vol. 3(2), 2015, pp. 165-168.




Article ID: 20742
DOI: 10.14419/ijet.v7i4.20742

Copyright © 2012-2015 Science Publishing Corporation Inc. All rights reserved.