Cloud security: risk factors and security issues in current trends

 
 
 
  • Abstract
  • Keywords
  • References
  • PDF
  • Abstract


    Now a days, cloud computing is an emerging and way of computing in computer science. Cloud computing is a set of resources and services that are offered by the network or internet. Cloud computing extends various computing techniques like grid computing, distributed compu-ting. Today cloud computing is used in both industrial, research and academic field. Cloud facilitates its users by providing virtual resources via internet. As the field of cloud computing is spreading the new techniques are developing. This increase in cloud computing environment also increases security challenges for cloud developers. Users of cloud save their data in the cloud hence the lack of security in cloud can lose the user’s trust.

    In this paper we will discuss some of the cloud security issues in various aspects like multi-tenancy, elasticity, reliability, availability etc in various sectors, the paper also discuss existing security techniques and approaches for a secure cloud environment. This paper will enable researchers and professionals to know about different security threats and models and tools proposed.

     

     


  • Keywords


    Cloud Computing; Cloud Security; Security Threats; Security Techniques; Cloud Security Standards.

  • References


      [1] Gates, F., Natkovich, O., Chopra, S., Kamath, S. M., Klamath, P., Narayanamuthry, S. M., et al. (2009). Building a High-Level Dataflow System on top of Map-Reduce: The Pig Experience. In Proceedings of the Thirty-Fifth International Conference on Very Large Data Bases (VLDB) (Industrial, Applications and Experience Track), Lyon, France.https://doi.org/10.14778/1687553.1687568.

      [2] http://citeseerx.ist.psu.edu/viewdoc/download?.

      [3] https://www.researchgate.net/profile/Aized_Soofi3/publication/319980773_A_Review_on_Data_Security_in_Cloud_Computing/links/59c8c3e1aca272c71bcd7074/A-Review-on-Data-Security-in-Cloud-Computing.pdf.

      [4] http://ieeexplore.ieee.org/document/6848730/.

      [5] Hama. (n.d.). Retrieved from http://cwiki.apache. org/labs/cloudsglossary.html.

      [6] Tout, Sverdlik, and Lawver, “Cloud Computing and its Security in Higher Education,” In Proceedings of the Proc ISECON 2009.

      [7] Kant, Dr Chander, and Yogesh Sharma. "Enhanced Security Architecture for Cloud Data Security." International Journal of Advanced Research in Computer Science and Software Engineering 3.5 (2013): 571-575.

      [8] Campbell, Jeronimo, “Applied Virtualization Technology,” Hillsboro, Intel Press (ISBN 09764832-3- 8), 2006, pp. 69-73.

      [9] Dong Xin, et al.”achieving secure and efficient data collaboration in cloud computing. ”Quality of service, 2013 IEEE/ACM 21st International symposium on.IEEE,2013.

      [10] Xia Z., Zhu Y., Sun X. and Chen L. (2014), "Secure semantic expansion based search over encrypted cloud data supporting similarity ranking "Journal of Cloud Computing”,Springer 3.1, pp. 1-11. https://doi.org/10.1186/s13677-014-0008-2.

      [11] Yunqi Ye, Liangliang Xiao, I-Ling Yen, FarokhBastani, “Secure, Dependable, and High Performance Cloud Storage”, 2010 29th IEEE International Symposium on Reliable.


 

View

Download

Article ID: 29655
 
DOI: 10.14419/ijet.v8i4.29655




Copyright © 2012-2015 Science Publishing Corporation Inc. All rights reserved.