CFP last date
20 December 2024
Reseach Article

Secure Cloud Computing with Third Party Auditing: A Survey

by Laxmikant Mishra, Amit Kumar Sharma
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 103 - Number 14
Year of Publication: 2014
Authors: Laxmikant Mishra, Amit Kumar Sharma
10.5120/18142-9375

Laxmikant Mishra, Amit Kumar Sharma . Secure Cloud Computing with Third Party Auditing: A Survey. International Journal of Computer Applications. 103, 14 ( October 2014), 19-24. DOI=10.5120/18142-9375

@article{ 10.5120/18142-9375,
author = { Laxmikant Mishra, Amit Kumar Sharma },
title = { Secure Cloud Computing with Third Party Auditing: A Survey },
journal = { International Journal of Computer Applications },
issue_date = { October 2014 },
volume = { 103 },
number = { 14 },
month = { October },
year = { 2014 },
issn = { 0975-8887 },
pages = { 19-24 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume103/number14/18142-9375/ },
doi = { 10.5120/18142-9375 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:34:33.036838+05:30
%A Laxmikant Mishra
%A Amit Kumar Sharma
%T Secure Cloud Computing with Third Party Auditing: A Survey
%J International Journal of Computer Applications
%@ 0975-8887
%V 103
%N 14
%P 19-24
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Cloud computing based technology and their impact is growing now a day. Cloud computing is used in all the area of Business, Education, Social Impact and data miner. The growing demand is because of the on demand service and pay per basis used somehow in the unlimited form. But the uses enhance the risk of data trapping and forgery. As the services are sharing within different cloud users and the accessibility are also different. So the security issues in cloud computing environment are a major concern. As the users totally rely on the cloud vendors, so there is a need of data protection and the data control from the cloud users. So the main aim of my paper finds the advancement in the related previous technology and the gaps. Based on our study some future enhancements have been suggested.

References
  1. M. Armbrust, A. Fox, R. Grif?th, A. D. Joseph, R. H. Katz, A. Konwinski, G. Lee, D. A. Patterson, A. Rabkin, I. Stoica, and M. Zaharia, "Above the clouds: A berkeley view of cloud computing," University of California, Berkeley, Tech. Rep. UCB-EECS-2009-28, Feb 2009.
  2. Igor Ruiz-Agundez, Yoseba K. Penya and Pablo G. Bringas, "Cloud Computing Services Accounting", International Journal of Advanced Computer Research (IJACR) ,Volume 2, Number 2, June 2012.
  3. Ajey Singh, Maneesh Shrivastava, "Overview of Security issues in Cloud Computing", International Journal of Advanced Computer Research (IJACR) Volume 2,Number 1,March 2012.
  4. G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, and D. Song, "Provable Data Possession at Untrusted Stores," Proc. 14th ACM Conf. Computer and Comm. Security (CCS '07), pp. 598-609, 2007.
  5. Ashutosh Kumar Dubey, Animesh Kumar Dubey, Mayank Namdev, Shiv Shakti Shrivastava," Cloud-User Security Based on RSA and MD5 Algorithm for Resource Attestation and Sharing in Java Environment", CONSEG-2012.
  6. A. Juels and B. S. Kaliski Jr. , "Pors: Proofs of Retrievability for Large Files," Proc. 14th ACM Conf. Computer and Comm. Security (CCS '07), pp. 584-597, 2007.
  7. H. Shacham and B. Waters, "Compact Proofs of Retrievability," Proc. 14th Int'l Conf. Theory and Application of Cryptology and Information Security: Advances in Cryptology (ASIACRYPT '08), pp. 90-107, 2008.
  8. K. D. Bowers, A. Juels, and A. Oprea, "Proofs of Retrievability: Theory and Implementation," Report 2008/175, Cryptology ePrint Archive, 2008.
  9. M. Naor and G. N. Rothblum, "The Complexity of Online Memory Checking," Proc. 46th Ann. IEEE Symp. Foundations of Computer Science (FOCS '05), pp. 573-584, 2005.
  10. Wei-Tek Tsai, Xin Sun, Janaka Balasooriya , "Service-Oriented Cloud Computing Architecture" , 2010 Seventh International Conference on Information Technology.
  11. G K Patra, Nilotpal Chakraborty," Securing Cloud Infrastructure for High Performance Scientific Computations Using Cryptographic Techniques", International Journal of Advanced Computer Research (IJACR) ,Volume-4 Number-1 Issue-14 March-2014.
  12. Nilesh Pachorkar, Rajesh Ingle," Multi-dimensional Affinity Aware VM Placement Algorithm in Cloud Computing", International Journal of Advanced Computer Research (IJACR) Volume-3 Number-4 Issue-13 December-2013.
  13. http://www. dialogic. com/~/media/products/docs/whitepapers/12023-cloud-computing-wp. pdf
  14. Tschinkel, Brian. "Cloud Computing Security Understanding Risk Areas & Management Techniques. " (2011).
  15. Jian Wang and Jiajin Le," Based on Private Matching and Min-Attribute Generalization for Privacy Preserving in Cloud Computing", Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2010.
  16. Chenguang Wang, Huaizhi Yan," Study of Cloud Computing Security Based on Private Face Recognition",IEEE 2010.
  17. Ling Zheng, Yanxiang Hu,Chaoran Yang," Design and research on private cloud computing architecture to Support Smart Grid", Third International Conference on Intelligent Human-Machine Systems and Cybernetics, 2011.
  18. Ming Li, Shucheng Yu, Ning Cao and Wenjing Lou," Authorized Private Keyword Search over Encrypted Data in Cloud Computing", 31st International Conference on Distributed Computing Systems, 2011.
  19. Yanjiang Yang," Towards Multi-User Private Keyword Search for Cloud Computing", IEEE 4th International Conference on Cloud Computing, 2011.
  20. Wang, Qian, Cong Wang, Kui Ren, Wenjing Lou, and Jin Li. "Enabling public auditability and data dynamics for storage security in cloud computing. " Parallel and Distributed Systems, IEEE Transactions on 22, no. 5 (2011): 847-859.
  21. Naqvi, S. ; Michot, A. ; Van de Borne, M. , "Analysing Impact of Scalability and Heterogeneity on the Performance of Federated Cloud Security," Trust, Security and Privacy in Computing and Communications (TrustCom), 2012 IEEE 11th International Conference on , vol. , no. , pp. 1137,1142, 25-27 June 2012.
  22. Tianfield, H. , "Security issues in cloud computing," Systems, Man, and Cybernetics (SMC), 2012 IEEE International Conference on , vol. , no. , pp. 1082,1089, 14-17 Oct. 2012.
  23. Abuhussein, A. ; Bedi, H. ; Shiva, S. , "Evaluating security and privacy in cloud computing services: A Stakeholder's perspective," Internet Technology And Secured Transactions, 2012 International Conference for, vol. , no. , pp. 388,395, 10-12 Dec. 2012.
  24. Wentao Liu, "Research on cloud computing security problem and strategy," Consumer Electronics, Communications and Networks (CECNet), 2012 2nd International Conference on , vol. , no. , pp. 1216,1219, 21-23 April 2012.
  25. Pant, N. ; Parappa, S. , "Seeding the cloud in a secured way: Cloud adoption and security compliance assessment methodologies," Software Engineering and Service Science (ICSESS), 2013 4th IEEE International Conference on, vol. , no. , pp. 305, 308, 23-25 May 2013.
  26. Du meng," Data security in cloud computing", The 8th International Conference on Computer Science & Education (ICCSE 2013) April 26-28, 2013. Colombo, Sri Lanka.
  27. Fan Yang; Li Pan; Muzhou Xiong; Shanyu Tang, "Establishment of Security Levels in Trusted Cloud Computing Platforms," Green Computing and Communications (GreenCom), 2013 IEEE and Internet of Things (iThings/CPSCom), IEEE International Conference on and IEEE Cyber, Physical and Social Computing , vol. , no. , pp. 2119,2122, 20-23 Aug. 2013.
  28. Varadharajan, Vijay, and Udaya Tupakula. "TREASURE: Trust enhanced security for cloud environments. " In Trust, Security and Privacy in Computing and Communications (TrustCom), 2012 IEEE 11th International Conference on, pp. 145-152. IEEE, 2012.
  29. Astrova, Irina, Stella Gatziu Grivas, Marc Schaaf, Arne Koschel, Jan Bernhardt, Mark Dennis Kellermeier, Stefan Nitz, Francisco Carriedo Scher, and Michael Herr. "Security of a Public Cloud. " In Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS), 2012 Sixth International Conference on, pp. 564-569. IEEE, 2012.
  30. Hojabri, M. , and K. V. Rao. "Innovation in cloud computing: Implementation of Kerberos version5in cloud computing in order to enhance the security issues. " In Information Communication and Embedded Systems (ICICES), 2013 International Conference on, pp. 452-456. IEEE, 2013.
  31. Xiao-hui, Liu, and Song Xin-fang. "Analysis on cloud computing and its security. " In Computer Science & Education (ICCSE), 2013 8th International Conference on, pp. 839-842. IEEE, 2013.
Index Terms

Computer Science
Information Sciences

Keywords

Cloud Computing Virtualization Optimization Security.