CFP last date
20 January 2025
Reseach Article

Security Mechanisms at different Levels in Cloud Infrastructure

by Harpreet Saini, Amandeep Saini
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 108 - Number 2
Year of Publication: 2014
Authors: Harpreet Saini, Amandeep Saini
10.5120/18880-0153

Harpreet Saini, Amandeep Saini . Security Mechanisms at different Levels in Cloud Infrastructure. International Journal of Computer Applications. 108, 2 ( December 2014), 1-6. DOI=10.5120/18880-0153

@article{ 10.5120/18880-0153,
author = { Harpreet Saini, Amandeep Saini },
title = { Security Mechanisms at different Levels in Cloud Infrastructure },
journal = { International Journal of Computer Applications },
issue_date = { December 2014 },
volume = { 108 },
number = { 2 },
month = { December },
year = { 2014 },
issn = { 0975-8887 },
pages = { 1-6 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume108/number2/18880-0153/ },
doi = { 10.5120/18880-0153 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:41:55.188160+05:30
%A Harpreet Saini
%A Amandeep Saini
%T Security Mechanisms at different Levels in Cloud Infrastructure
%J International Journal of Computer Applications
%@ 0975-8887
%V 108
%N 2
%P 1-6
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Cloud computing refers to a set of services and resources offered to its consumers through internet. The user data and applications software shift to highly optimal data i. e. cloud. Either it may be a small or medium business infrastructure must focus on resource and information sharing among various users due to minimization of infrastructure cost. Cloud computing provides a lot of benefit, instead of its security is key inhibitor to cloud adoption. So, Cloud computing has brought various security threats which leads to lack of wide adoption of Cloud computing. This study aims to identify major security threats and security mechanisms and how to assess these security threats or vulnerabilities.

References
  1. Deepak Panth, Dhananjay Mehta, Rituparna Shelgaonkar, "A Survey on Security Mechanisms of Leading Cloud Service Providers", International Journal of Computer Applications, vol. 98-No. 1, July 2014.
  2. Rajarshi Roy Chowdhury, "Security in Cloud Computing", International Journal of Computer Applications, vol. 96-No. 15, June 2014.
  3. Rabi Prasad Padhy, Manas Ranjan Patra, Suresh Chandra Satapathy, " Cloud Computing: Security Issues and Research Challenges", IRACST - International Journal of Computer Science and Information Technology & Security (IJCSITS), Vol. 1, No. 2, December 2011.
  4. Parminder Singh, Sarpreet Singh, "A New Advance Efficient RBAC to Enhance the Security in Cloud Computing", International Journal of Advanced Research in Computer Science and Software Engineering, Volume 3, Issue 6, June 2013.
  5. Samy Gerges, Sherif Khattab, Hesham Hassan, Fatma A Omara, "Scalable Multi-Tenant Authorization in Highly-Collaborative Cloud Applications", Vol. 2, No. 2, April 2013, pp 106~115.
  6. Te-Shun Chou, "Security Threats on Cloud Computing Vulnerabilities", International Journal of Computer Science & Information Technology (IJCSIT) Vol 5, No 3, June 2013.
  7. Rajani Sharma, Rajender Kumar Trivedi, "Literature review: Cloud Computing –Security Issues, Solution and Technologies", International Journal of Engineering Research ISSN:2319-6890)(online),2347-5013(print) Volume No. 3, Issue No. 4, pp : 221-225 01 April 2014.
  8. Subashini, V. Kavitha "A survey on security issues in service delivery models of cloud computing. " Journal of Network and Computer Applications 34(1): 1-11.
  9. Qian, Ling, et al. "Cloud computing: An overview. " Cloud Computing. Springer Berlin Heidelberg, 2009. 626-631.
  10. Piplode,k. singh. ?An Overview and Study of Security Issues & Challenges in Cloud Computing ?. Volume 2, Issue 9, September 2012, ISSN: 2277 128X.
  11. Kangchan Lee, "Security Threats in Cloud Computing Environments", International Journal of Security and Its Applications Vol. 6, No. 4, October, 2012
  12. W. Li and L. Ping, "Trust Model to Enhance Security and Interoperability of Cloud Environment", Cloud Computing, Proceedings on First International Conference, CloudCom 2009, Beijing, China, December 1-4, 2009, Lecture Notes in Computer Science, vol. 5931, (2009), pp. 69-79.
  13. T. Ormandy, "An Empirical Study into the Security Exposure to Hosts of Hostile Virtualized Environments", Whitepaper, (2008).
  14. B. P. Rimal, Choi Eunmi, I. Lumb, "A Taxonomy and Survey of Cloud Computing Systems", Intl. Joint Conference on INC, IMS and IDC, 2009, pp. 44-51, Seoul, Aug, 2009. DOI: 10. 1109/NCM. 2009. 218.
  15. Fernandes, Diogo AB, et al. "Security issues in cloud environments: a survey" International Journal of Information Security (2013): 1-58.
Index Terms

Computer Science
Information Sciences

Keywords

Cloud Computing Types of Cloud Security Concerns Security Mechanisms in cloud.