We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 November 2024
Reseach Article

A Review on Various Approaches for Security of Data on Cloud Environment

by Amandeep Kaur, Navpreet Kaur
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 117 - Number 21
Year of Publication: 2015
Authors: Amandeep Kaur, Navpreet Kaur
10.5120/20680-3527

Amandeep Kaur, Navpreet Kaur . A Review on Various Approaches for Security of Data on Cloud Environment. International Journal of Computer Applications. 117, 21 ( May 2015), 25-27. DOI=10.5120/20680-3527

@article{ 10.5120/20680-3527,
author = { Amandeep Kaur, Navpreet Kaur },
title = { A Review on Various Approaches for Security of Data on Cloud Environment },
journal = { International Journal of Computer Applications },
issue_date = { May 2015 },
volume = { 117 },
number = { 21 },
month = { May },
year = { 2015 },
issn = { 0975-8887 },
pages = { 25-27 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume117/number21/20680-3527/ },
doi = { 10.5120/20680-3527 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:00:26.420341+05:30
%A Amandeep Kaur
%A Navpreet Kaur
%T A Review on Various Approaches for Security of Data on Cloud Environment
%J International Journal of Computer Applications
%@ 0975-8887
%V 117
%N 21
%P 25-27
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Cloud computing has grabbed the spotlight within some time span. The cloud computing trend is increasing rapidly so to implement it into an organization we need to observe the threats of cloud computing. At an unusual pace it has turned the face of government and business and has created some new challenges. However developers have created new vulnerabilities, including security issues whose full impressions are still rising. This paper presents an overview and study of cloud computing, with several security threats, security issues, currently used cloud technologies and security solutions [3].

References
  1. Sharma, Rajeev, and Bright Keswani. "study& analysis of cloud based erp services. " Communication Software and Networks (ICCSN), 2011, PP 468 – 471.
  2. Juneja, Gurpreet K. "Use of Modeling Language to deploy applications in clouds. " International workshop on Maintenance and Evolution of Service-Oriented and Cloud-Based Systems (MESOCA), 2012, pp 58 - 59
  3. DHIWAR, KAMLESH KUMAR. "aspect of cloud computing", IEEE Conf. on Software, Telecommunications and Computer Networks (SoftCOM), 2014, pp 192 – 200.
  4. Akintomide, O. A. "Cloud computing: The third revolution in IT. " Library Progress (International) 33. 1 (2013): 77-94.
  5. Mell, Peter, and Timothy Grance. "The NIST definition of cloud computing (draft). " NIST special publication 800. 145 (2011): 7.
  6. Pearson, Siani, Yun Shen, and Miranda Mowbray "A privacy manager for cloud computing" Cloud Computing. Springer Berlin Heidelberg, 2009, pp. 90-106.
  7. T OGRAPH, B. , and Y. RICHARD MORGENS.
  8. "Cloud computing" Communications of the ACM 51. 7 (2008).
  9. Velte, Toby, Anthony Velte, and Robert Elsenpeter. Cloud computing, a practical approach. McGraw-Hill, Inc. , 2009.
  10. Marinos, Alexandros, and Gerard Briscoe. "Community cloud computing. "Cloud Computing. Springer Berlin Heidelberg, 2009, pp 472-484
  11. Zhang, Qi, Lu Cheng, and Raouf Boutaba. "Cloud computing: state-of-the-art and research challenges. " Journal of internet services and applications 1. 1 (2010), pp 7-18.
  12. Qian, Ling, et al. "Cloud computing: An overview. " Cloud Computing. Springer Berlin Heidelberg, 2009. Pp 626-631.
  13. Leavitt, Neal. "Is cloud computing really ready for prime time" Growth 27. 5 (2009).
  14. Voorsluys, William, James Broberg, and Rajkumar Buyya. "Introduction to cloud computing. " Cloud Computing (2011), pp 1-41.
  15. Wang, Lizhe, et al. "Cloud computing: a perspective study. " New Generation Computing 28. 2 (2010), pp 137-146.
  16. Santos, Nuno, Krishna P. Gummadi, and Rodrigo Rodrigues. "Towards trusted cloud computing. " Proceedings of the 2009 conference on hot topics in cloud computing, pp 2009.
  17. Chen, Quan, and Qianni Deng. "Cloud computing and its key techniques"Journal of Computer Applications 29. 9 (2009), pp 2565.
  18. Zhang, Liang-Jie, and Qun Zhou. "CCOA: Cloud computing open architecture "Web Services, 2009. ICWS IEEE International Conference on IEEE, 2009.
Index Terms

Computer Science
Information Sciences

Keywords

Cloud Security Encryption Algorithm Fully Homomorphic Encryption