CFP last date
20 December 2024
Reseach Article

Cloud Computing Security: A Survey

by Sheetal Mahalle, Ranjeet Jaiswal
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 115 - Number 6
Year of Publication: 2015
Authors: Sheetal Mahalle, Ranjeet Jaiswal
10.5120/20157-2318

Sheetal Mahalle, Ranjeet Jaiswal . Cloud Computing Security: A Survey. International Journal of Computer Applications. 115, 6 ( April 2015), 21-25. DOI=10.5120/20157-2318

@article{ 10.5120/20157-2318,
author = { Sheetal Mahalle, Ranjeet Jaiswal },
title = { Cloud Computing Security: A Survey },
journal = { International Journal of Computer Applications },
issue_date = { April 2015 },
volume = { 115 },
number = { 6 },
month = { April },
year = { 2015 },
issn = { 0975-8887 },
pages = { 21-25 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume115/number6/20157-2318/ },
doi = { 10.5120/20157-2318 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:54:05.244270+05:30
%A Sheetal Mahalle
%A Ranjeet Jaiswal
%T Cloud Computing Security: A Survey
%J International Journal of Computer Applications
%@ 0975-8887
%V 115
%N 6
%P 21-25
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Due to volume output, easy access of information, less time more work to be done, virtualization technique and pay per use increase the use of cloud computing in today's era. It may be used in all the area including Social websites, E-Commerce, Education and heavy data warehouse system. The on demand remote capacity makes it the first reason to choose cloud service. Now several companies are choosing the services of cloud computing. Then the question of security of the cloud data may arise. As the data on the cloud computing should be secure. In this paper a study has been made in the direction of cloud computing security. Based on the study some new insights has been gathered and suggested.

References
  1. G K Patra, Nilotpal Chakraborty," Securing Cloud Infrastructure for High Performance Scientific Computations Using Cryptographic Techniques", International Journal of Advanced Computer Research (IJACR), Volume-4 Number-1 Issue-14 March-2014.
  2. Nilesh Pachorkar, Rajesh Ingle," Multi-dimensional Affinity Aware VM Placement Algorithm in Cloud Computing", International Journal of Advanced Computer Research (IJACR) Volume-3 Number-4 Issue-13 December-2013.
  3. Adigun A. Adebisi, Adegun A. Adekanmi, Asani E. Oluwatobi, " A Study of Cloud Computing in the University Enterprise " , International Journal of Advanced Computer Research (IJACR), Volume-4, Issue-15, June-2014 ,pp. 450-458.
  4. Abdur Rahim Choudhary, "Baseline Requirements and Architecture for Cloud Computing Services", International Journal of Advanced Computer Research (IJACR), Volume-2, Issue-7, December-2012, pp. 1-7.
  5. Nilesh Pachorkar and Rajesh Ingle, "Affinity Aware VM Colocation Mechanism for Cloud", International Journal of Advanced Computer Research (IJACR), Volume-4, Issue-17, December-2014, pp. 956-960.
  6. Gaurav, Nitesh Kaushik, Jitender Bhardwaj, " A Computation Offloading Framework to Optimize Makespan in Mobile Cloud Computing Environment " , International Journal of Advanced Computer Research (IJACR), Volume-4, Issue-15, June-2014 ,pp. 442-449.
  7. Pritam Fulsoundar, Rajesh Ingle, " Prediction of Performance Degradation in Cloud Computing " , International Journal of Advanced Computer Research (IJACR), Volume-3, Issue-13, December-2013 ,pp. 126-129.
  8. Sampada Kembhavi and Gajendra Singh, " Auto Upload and Chi-Square Test on Application Software as a Service for Cloud Computing Environment " , International Journal of Advanced Technology and Engineering Exploration (IJATEE), Volume-1, Issue-1, December-2014 ,pp. 26-31.
  9. Adigun Abimbola Adebisi, Akande Noah Oluwatobi and Ajagbe Oluwafemi Adeola, " Design and Implementation of a Mobile Students' Course Registration Platform " , International Journal of Advanced Technology and Engineering Exploration (IJATEE), Volume-2, Issue-3, February-2015 ,pp. 25-30.
  10. Tianfield, H. , "Security issues in cloud computing," Systems, Man, and Cybernetics (SMC), 2012 IEEE International Conference on , vol. , no. , pp. 1082,1089, 14-17 Oct. 2012.
  11. Abuhussein, A. ; Bedi, H. ; Shiva, S. , "Evaluating security and privacy in cloud computing services: A Stakeholder's perspective," Internet Technology And Secured Transactions, 2012 International Conference for, vol. , no. , pp. 388, 395, 10-12 Dec. 2012.
  12. Wentao Liu, "Research on cloud computing security problem and strategy," Consumer Electronics, Communications and Networks (CECNet), 2012 2nd International Conference on , vol. , no. , pp. 1216,1219, 21-23 April 2012.
  13. Sanjay Kumar Brahman, Brijesh Patel, "Data sharing and Management based on RC4 in User Cloud Environment", International Journal of Advanced Computer Research (IJACR), Volume-3, Issue-12, September-2013 ,pp. 201-206.
  14. Ashutosh Kumar Dubey, Animesh Kumar Dubey, Mayank Namdev, Shiv Shakti Shrivastava,"Cloud-User Security Based on RSA and MD5 Algorithm for Resource Attestation and Sharing in Java Environment", CONSEG 2012.
  15. Surya Prabha. U. S, Marikkannu. P, Arul Vineeth. A. D, " Ciphertext Policy Attribute Set Based Encryption with One-Fold Data Access in Cloud " , International Journal of Advanced Computer Research (IJACR), Volume-4, Issue-14, March-2014 ,pp. 110-115.
  16. Pant, N. ; Parappa, S. , "Seeding the cloud in a secured way: Cloud adoption and security compliance assessment methodologies," Software Engineering and Service Science (ICSESS), 2013 4th IEEE International Conference on, vol. , no. , pp. 305, 308, 23-25 May 2013.
  17. Du meng," Data security in cloud computing", The 8th International Conference on Computer Science & Education (ICCSE 2013) April 26-28, 2013. Colombo, Sri Lanka.
  18. Fan Yang; Li Pan; Muzhou Xiong; Shanyu Tang, "Establishment of Security Levels in Trusted Cloud Computing Platforms," Green Computing and Communications (GreenCom), 2013 IEEE and Internet of Things (iThings/CPSCom), IEEE International Conference on and IEEE Cyber, Physical and Social Computing , vol. , no. , pp. 2119,2122, 20-23 Aug. 2013.
  19. Khalil, I. M. ; Khreishah, A. ; Bouktif, S. ; Ahmad, A. , "Security Concerns in Cloud Computing," Information Technology: New Generations (ITNG), 2013 Tenth International Conference on , vol. , no. , pp. 411,416, 15-17 April 2013.
  20. M. Krishnaveni, P. Subashini, A. Vanitha, "A Bayes fusion method based ensemble classification approach for Brown cloud application" , International Journal of Advanced Computer Research (IJACR), Volume-4, Issue-14, March-2014 ,pp. 299-304.
  21. Benameur, A. ; Evans, N. S. ; Elder, M. C. , "Cloud resiliency and security via diversified replica execution and monitoring," Resilient Control Systems (ISRCS), 2013 6th International Symposium on, pp. 150, 155, 13-15 Aug. 2013.
  22. Liu Xiao-hui; Song Xin-fang, "Analysis on cloud computing and its security," Computer Science & Education (ICCSE), 2013 8th International Conference on, vol. , no. , pp. 839,842, 26-28 April 2013.
  23. Varadharajan, Vijay, and Udaya Tupakula. "TREASURE: Trust enhanced security for cloud environments. " In Trust, Security and Privacy in Computing and Communications (TrustCom), 2012 IEEE 11th International Conference on, pp. 145-152. IEEE, 2012.
  24. Astrova, Irina, Stella Gatziu Grivas, Marc Schaaf, Arne Koschel, Jan Bernhardt, Mark Dennis Kellermeier, Stefan Nitz, Francisco Carriedo Scher, and Michael Herr. "Security of a Public Cloud. " In Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS), 2012 Sixth International Conference on, pp. 564-569. IEEE, 2012.
  25. Hojabri, M. , and K. V. Rao. "Innovation in cloud computing: Implementation of Kerberos version5in cloud computing in order to enhance the security issues. " In Information Communication and Embedded Systems (ICICES), 2013 International Conference on, pp. 452-456. IEEE, 2013.
  26. Saravanakumar, C. ; Arun, C. , "Survey on interoperability, security, trust, privacy standardization of cloud computing," Contemporary Computing and Informatics (IC3I), 2014 International Conference on , vol. , no. , pp. 977,982, 27-29 Nov. 2014.
  27. Al-Anzi, F. S. ; Yadav, S. K. ; Soni, J. , "Cloud computing: Security model comprising governance, risk management and compliance," Data Mining and Intelligent Computing (ICDMIC), 2014 International Conference on , vol. , no. , pp. 1,6, 5-6 Sept. 2014
  28. Zhao, Feng, Chao Li, and Chun Feng Liu. "A cloud computing security solution based on fully homomorphic encryption. " Advanced Communication Technology (ICACT), 2014 16th International Conference on. IEEE, 2014.
  29. Dinadayalan, P. , S. Jegadeeswari, and D. Gnanambigai. "Data Security Issues in Cloud Environment and Solutions. " Computing and Communication Technologies (WCCCT), 2014 World Congress on. IEEE, 2014.
Index Terms

Computer Science
Information Sciences

Keywords

Cloud Computing Virtualization Security E-commerce