We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 December 2024
Reseach Article

Survey on Security Issues in File Management in Cloud Computing Environment

by Udit Gupta
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 120 - Number 5
Year of Publication: 2015
Authors: Udit Gupta
10.5120/21224-3948

Udit Gupta . Survey on Security Issues in File Management in Cloud Computing Environment. International Journal of Computer Applications. 120, 5 ( June 2015), 22-24. DOI=10.5120/21224-3948

@article{ 10.5120/21224-3948,
author = { Udit Gupta },
title = { Survey on Security Issues in File Management in Cloud Computing Environment },
journal = { International Journal of Computer Applications },
issue_date = { June 2015 },
volume = { 120 },
number = { 5 },
month = { June },
year = { 2015 },
issn = { 0975-8887 },
pages = { 22-24 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume120/number5/21224-3948/ },
doi = { 10.5120/21224-3948 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:05:27.721978+05:30
%A Udit Gupta
%T Survey on Security Issues in File Management in Cloud Computing Environment
%J International Journal of Computer Applications
%@ 0975-8887
%V 120
%N 5
%P 22-24
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Cloud computing has pervaded through every aspect of Information technology in past decade. It has become easier to process plethora of data generated by various devices in real time with the advent of cloud networks. The privacy of user's data is maintained by data centers around the world and hence it has become feasible to operate on that data from lightweight portable devices. But with ease of processing comes the security aspect of the data. One such security aspect is secure file transfer either internally within cloud or externally from one cloud network to another. File management is central to cloud computing and it's paramount to address the security concerns which arise out of it. This survey paper aims to elucidate the various protocols which can be used for secure file transfer and analyze the ramifications of using each protocol.

References
  1. L. Wang, Gregor Laszewski, Marcel Kunze, Jie Tao, "Cloud Computing: A Perspective Study", New Generation Computing- Advances of Distributed Information Processing, pp. 137-146, vol. 28, no. 2, 2008
  2. Rohit Bhadauria, Sugata Sanyal; "Survey on Security Issues in Cloud Computing and Associated Mitigation Techniques" International Journal of Computer Applications, Vol. 47, No. 18, June, 2012, pp. 47-66.
  3. Rabi Prasad Padhy, Manas Ranjan Patra, Suresh Chandra Satapathy; "Cloud Computing: Security Issues and Research challenges", International Journal of Computer Science and Information Technology & Security (IJCSITS), Vol. 1, No. 2
  4. RFC 2577, FTP Security considerations; https://www. ietf. org/rfc/rfc2577. txt
  5. J. Postel and J. Reynolds. File transfer protocol (ftp). Internet Draft (RFC 959), 1985. https://www. ietf. org/rfc/rfc959. txt
  6. Pradeep Kumar Panwar, Devendra Kumar; "Security through SSL", International Journal of Advanced Research in Computer Science and Software Engineering, Vol. 2, Issue 12, December, 2012, pp. 178-184
  7. A. O. Freier P. Karlton and P. C. Kocher. The SSL Protocol, Version 3. 0. Netscape Communications, 1996, http://wp. netscape. com/eng/ssl3/draft302. txt (2003)
  8. http://www. webopedia. com/TERM/S/SSL. html
  9. Homin K. Lee, Tal Malkin, Erich Nahum; "Cryptographic Strength of SSL/TLS Servers: Current and Recent Practices"
  10. T Ylonen, "SSH – secure login connections over the internet", Proceedings of the 6th USENIX Security Symposium, July 22-25, 1996, San Jose, California, USA – https://www. usenix. org/legacy/publications/library/proceedings/sec96/full_papers/ylonen/
  11. FileZilla -Client Features. Available at: http://filezilla-project. org/client_features. php [Accessed February 20, 2010].
  12. Weinhardt C, Anandasivam A, Blau B, Borissov N, Meinl T, Michalk W, Stößer J (2009) "Cloud Computing – A Classification, Business Models and Research"
  13. Shantanu Pal, Sunirmal Khatua, Nabendu Chaki, Sugata Sanyal; "A New Trusted and Collaborative Agent Based Approach for Ensuring Cloud Security"; in Annals of Faculty Engineering Hunedoara International Journal of Engineering; Vol. 10, Issue 1, February, 2012. pp. 71-78. ISSN: 1584-2665.
  14. Farhan Bashir Shaikh, Sajjad Haider, "Security Threats in Cloud computing", 6th International conference on Internet technology and secured transactions, 11-14 December, 2011, Abu Dhabi
  15. IPsec Tools Homepage. Available at: http://ipsec-tools. sourceforge. net/ [Accessed December 11, 2009].
  16. A Tridgell, P Mackerras, "The rsync algorithm", Joint Computer Science Technical report series; https://cs. anu. edu. au/techreports/1996/TR-CS-96-05. pdf
  17. Tapalina Bhattasali, Rituparna Chaki, Sugata Sanyal; "Sleep Deprivation Attack Detection in Wirelss Sensor network"; International Journal of Computer Applications, Volume 40,Number 15, pp. 19-25, February 2012, Foundation of Computer Science, New York, USA
Index Terms

Computer Science
Information Sciences

Keywords

File transfer protocol (FTP) Secure Shell (SSH) Secure file transfer protocol (SFTP) Secure Socket layer (SSL) Transport layer security (TLS) IPSec Tunneling Secure copy (SCP) File Transfer Protocol over Secure Socket Layer (FTPS)