We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 December 2024
Reseach Article

A Parametric Analysis of Cloud Computing Security Models and Threats

by Ashish Kumar Gaur, Poonam Rana, Vineet Sharma
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 133 - Number 13
Year of Publication: 2016
Authors: Ashish Kumar Gaur, Poonam Rana, Vineet Sharma
10.5120/ijca2016908125

Ashish Kumar Gaur, Poonam Rana, Vineet Sharma . A Parametric Analysis of Cloud Computing Security Models and Threats. International Journal of Computer Applications. 133, 13 ( January 2016), 27-32. DOI=10.5120/ijca2016908125

@article{ 10.5120/ijca2016908125,
author = { Ashish Kumar Gaur, Poonam Rana, Vineet Sharma },
title = { A Parametric Analysis of Cloud Computing Security Models and Threats },
journal = { International Journal of Computer Applications },
issue_date = { January 2016 },
volume = { 133 },
number = { 13 },
month = { January },
year = { 2016 },
issn = { 0975-8887 },
pages = { 27-32 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume133/number13/23848-2016908125/ },
doi = { 10.5120/ijca2016908125 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:31:06.969138+05:30
%A Ashish Kumar Gaur
%A Poonam Rana
%A Vineet Sharma
%T A Parametric Analysis of Cloud Computing Security Models and Threats
%J International Journal of Computer Applications
%@ 0975-8887
%V 133
%N 13
%P 27-32
%D 2016
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Cloud computing is a resource sharing paradigm through the Internet. Cloud computing provides the sharing of data, application and also provide the communication among the users. Universal example of cloud services are Microsoft SharePoint and Google apps provided by Google. The cloud computing field is growing rapidly but still there are some security concerns. Lack of security is the only obstacle in wide acceptance of cloud computing. The cloud computing has brought lots of security challenges for the consumers as well as for the service providers. How will the users come to know that their information is not having any availability and security issues? This study aims to find out the most appropriate security model for cloud computing to resolve the maximum of the security threats in cloud computing.

References
  1. S. Subashini , V. Kavitha , " A Survey on Security issues in service delivery models of cloud computing ", Journal of Network and Computer Application , ELSEVIER , 2011
  2. Ritesh G. Anantwar , Dr. P.N. Chatur , Swati G. Anantwar, "Cloud Computing and security models : A Survey", IJESIT , Vol. 1 , Issue 2, November 2012.
  3. Peter Mell, Timothy Grance. "The NIST Definition of Cloud Computing (Draft)". NIST. 2011.
  4. AlZain, M.A.; Soh, B. , Pardede, E. "MCDB: Using Multi-clouds to Ensure Security in Cloud Computing. Dependable, Autonomic and Secure Computing (DASC)". IEEE Ninth International Conference on , vol., no., pp.784,791, 12-14, 2011.
  5. Jianhua Che, Yamin Duan, Tao Zhang, Jie Fan, "Study on the security and strategies of cloud computing" , International Conference on Power Electronics and engineering Application, Elsevier ,2011
  6. "VMware. Inc. Understanding full virtualization, paravirtualization and hardware assist. Technical report", VMware, 2007.
  7. "Cloud Security Alliance. Security guidance for critical areas of focus in cloud computing(v2.1)." December, 2009.
  8. Barindar Kaur and Sandeep Sharma , "Parametric Analysis of Various Cloud Computing Security Models" , International Journal of Information and Computation Technology , ISSN 0974-2239 vol. 4, Number 15, 2014.
  9. Gansen Zhao , Chunming Rong , "Deployment Models : towards Eliminating Security concerns from Cloud ", International Conference on High Performance Computing and Simulation , IEEE , ISBN 978-1-4244-6828-7 , 2010.
  10. Bhaskar Prasad Rimal , Eunmi Choi , Ian Lumb , "A Taxonomy and Survey of Cloud Computing Systems ", 5th International Joint Conference on INC, IMS and IDC , 2009.
  11. Rohit Bhadauria , Ritu Chaki , Nabendu Chaki , Sugata Sanyal , " A survey on Security Issues in Cloud Computing ", ACTA TECHNICA CORVINIENSIS - Bulletin of Engineering , ISSN : 2067 - 2809 , Fascicule 4 [October - December] , Tome VII
  12. Neal Leavitt, “Is Cloud Computing Really Ready for Prime Time?” IEEE Computer Society, CA, USA, Computer, vol. 42, issue. 1, pp. 15-20, ISSN: 0018-9162, January 2009.
  13. Robert Minnear, “Latency: The Achilles Heel of Cloud Computing,”,
  14. Cloud Expo: Article, Cloud Computing Journal, March 9, 2011, http://cloudcomputing.sys- con.com/node/1745523.
  15. Mohamed Al Morsy , John Grundy and Igno Muller , " An Analysis of The Cloud Computing Security Problem ", 17th Asia - Pacific Software Engineering Conference (APSEC 2010) Cloud Workshop , Sydney , Australia , 30 November - 03 December 2010.
  16. Virtualization and cloud computing : Security Threats to evolving data centers, Trend Micro.
  17. G. Zhao, et al., Deployment models: Towards eliminating security concerns from cloud computing. in: Int. Conf. on High Performance Computing and Simulation (HPCS), June 28 - July 2, 2010, Caen, France, pp. 189 – 195.
Index Terms

Computer Science
Information Sciences

Keywords

Introduction security threats security models