CFP last date
20 January 2025
Reseach Article

A New Approach for Providing Security Mechanism in Cloud with Possible Solutions and Results

by Sarvesh Kumar, Punnet Kumar, Suraj Pal Singh, Ajit Saxena
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 67 - Number 12
Year of Publication: 2013
Authors: Sarvesh Kumar, Punnet Kumar, Suraj Pal Singh, Ajit Saxena
10.5120/11449-7044

Sarvesh Kumar, Punnet Kumar, Suraj Pal Singh, Ajit Saxena . A New Approach for Providing Security Mechanism in Cloud with Possible Solutions and Results. International Journal of Computer Applications. 67, 12 ( April 2013), 30-33. DOI=10.5120/11449-7044

@article{ 10.5120/11449-7044,
author = { Sarvesh Kumar, Punnet Kumar, Suraj Pal Singh, Ajit Saxena },
title = { A New Approach for Providing Security Mechanism in Cloud with Possible Solutions and Results },
journal = { International Journal of Computer Applications },
issue_date = { April 2013 },
volume = { 67 },
number = { 12 },
month = { April },
year = { 2013 },
issn = { 0975-8887 },
pages = { 30-33 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume67/number12/11449-7044/ },
doi = { 10.5120/11449-7044 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:24:40.018655+05:30
%A Sarvesh Kumar
%A Punnet Kumar
%A Suraj Pal Singh
%A Ajit Saxena
%T A New Approach for Providing Security Mechanism in Cloud with Possible Solutions and Results
%J International Journal of Computer Applications
%@ 0975-8887
%V 67
%N 12
%P 30-33
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In the field of IT technology, cloud computing is a next big thing in IT market. It is just internet based computing and on demand computing which gives reliability, scalability, availability compared to dedicated infrastructure. The main issues in cloud computing is security, trust and privacy issues. These issues arise at the time of deployment of cloud computing services in public and private cloud. In this paper security and privacy issues are reviewed and gives a proposed mechanism for securing data in cloud and also used Microsoft window azure tools for SACM (security access control mechanism) , and compare the system with SACM tools and NO SACM tools. The implementation result will show that security model is better than using SACM tools. It also defines web hosting in old manner and web hosting in cloud manner. In the future scope we can see multi tenancy security issues in cloud computing.

References
  1. An Analysis of the cloud computing security problem.
  2. N. Grushka. M. Tenson ," Attack Surfaces: A Taxonomy for attacks on cloud services," cloud computing, IEEE international conference on,pp-276-279,2010 3rd international conference on cloud computing,2010.
  3. Balchandra Reddy Kandukuri, Ramakrishna paturi and Atann Rakshit "cloud security issues" in proceedings of the 2009 IEEE international conference on services computing, 2009,pp 517-520. Forman, G. 2003. An extensive empirical study of feature selection metrics for text classification. J. Mach. Learn. Res. 3 (Mar. 2003), 1289-1305.
  4. S. Subhashint and V. Kavitna" A survey on security issues in services delivery models of cloud computing," J. Network and Computer applications,vol. 34 jan 2011,pp1-11.
  5. Sarvesh kumar, Nilesh Kumar dubey," cloud computing ( A survey on cloud computing security issues and attacks in private clouds)," International journal of Emerging trends in Engg. And Development " issue 3,vol. 1,jan 2013.
  6. Zhifang Xiao and Yang Xiao," Security and Privacy in cloud computing", IEEE communication surveys & Tutorial, march 2012.
  7. RAND Europe / time lex /University of Warwick.
  8. Z. Xiao, N. Kathiresshan, and Y. Xiao," PeerReview Re-evalution for Accountability in Distributed systems or networks," International J. Security and Networks(IJSN),2010,vol. 7 No. 1 in press.
  9. Z. Xiao, N. Kathiresshan, and y. Xiao," A survey of Accountability in computer networks and distributed systems," (wiley journal of) Security and communication networks ,accepted.
  10. E. Keller, J. Szefer, J. Rexford and R. B. Lee," Nohype:virtualized cloud infrastructure without the virtualization," in proc. 37annual international symposium on computer architecture, New York, NY, USA, 2010,pp 350-361.
  11. Q. Chai and G. Gong,"On the(in) security of two joint encryption and error Correction schemes," International j. Security and networks,vol. 6 No. 4,2011 pp. 181-190.
  12. Z. Wang and R. B. Lee," A novel cache design architecture with enhanced performance and security," IN 41st IEEE/ACM international symposium on microarchitecture, pages 494-505, june 2007.
  13. R. Maggiani;(2009)," cloud computing is changing how we communicate," 2009 IEEE international Professional communication conference, IPCC 2009,Waikiki, HI, United states, PP1,19-22 july.
  14. Geng L,David F,Jinzy Z; Glenn (2009) ," cloud computing IT as a service," IEEE computer society IT professional ", Vol. 11,pp 10-13, March-April 2009
  15. cloud security alliance(CSA). " Top Threats of cloud Computing V 1. 0," released March 2010.
  16. K. D. Bowers, A. Juels and A. Opera,"HAIL: a high Availability and integrity layer for cloud storage," Proc. 16th ACM conference on computer and communication security, 2009, pp. 213-222.
Index Terms

Computer Science
Information Sciences

Keywords

cloud computing IaaS PaaS SaaS