CFP last date
20 January 2025
Reseach Article

Analyzing Security Solutions in Cloud Computing

by Shashi Chhikara, Iti Raghav, Nitasha Hasteer
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 68 - Number 25
Year of Publication: 2013
Authors: Shashi Chhikara, Iti Raghav, Nitasha Hasteer
10.5120/11750-7247

Shashi Chhikara, Iti Raghav, Nitasha Hasteer . Analyzing Security Solutions in Cloud Computing. International Journal of Computer Applications. 68, 25 ( April 2013), 17-21. DOI=10.5120/11750-7247

@article{ 10.5120/11750-7247,
author = { Shashi Chhikara, Iti Raghav, Nitasha Hasteer },
title = { Analyzing Security Solutions in Cloud Computing },
journal = { International Journal of Computer Applications },
issue_date = { April 2013 },
volume = { 68 },
number = { 25 },
month = { April },
year = { 2013 },
issn = { 0975-8887 },
pages = { 17-21 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume68/number25/11750-7247/ },
doi = { 10.5120/11750-7247 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:28:52.592796+05:30
%A Shashi Chhikara
%A Iti Raghav
%A Nitasha Hasteer
%T Analyzing Security Solutions in Cloud Computing
%J International Journal of Computer Applications
%@ 0975-8887
%V 68
%N 25
%P 17-21
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In spite of the potential advantages of cloud computing, security is a major barrier to the adoption of cloud services for organizations, which forms the reasons for them not moving into the cloud. This paper provides a brief introduction to the cloud computing platforms and services it provides and we intend to discuss some of the key security issues that are associated with the cloud computing and analyze the possible security solutions.

References
  1. Hisham A. Kholidy, Fabrizio Baiardi, Salim Hariri, Esraa M. Elhariri, Ahmed M. Yousof and Sahar A. Shehata. 2012. A Hierarchical Intrusion Detection System For Clouds: Design And Evaluation. International Journal on Cloud Computing: Services and Architecture.
  2. Peter Mell, and Tim Grance, 2009 "The NIST Definition of Cloud Computing," Version 15, National Institute of Standards and Technology (NIST)
  3. A. Lenk, M. Klems, J. Nimis, S. Tai, and T. Sandholm 2009. "What's Inside the Cloud? An Architectural Map of the Cloud Landscape". Software Engineering Challenges of Cloud Computing. CLOUD'09. ICSE Workshop in 2009.
  4. Security Guidance for Critical Areas of Focus in Cloud Computing, April 2009. DOI = http://www. cloudsecurityalliance. org/topthreats/csathreats. v1. 0. pdf
  5. Miranda Mowbray, Siani Pearson. 2009. "A Client-Based Privacy Manager for Cloud Computing. " COMSWARE '09: Proceedings of the Fourth International ICST Conference on COMmunication System software and middleware
  6. Jinpeng Wei, Xiaolan Zhang, Glenn Ammons, Vasanth Bala, Peng Ning. 2009. "Managing security of virtual machine images in a cloud environment. " CCSW '09: Proceedings of the 2009 ACM workshop on Cloud computing security.
  7. D. Cappelli, A. Moore, and R. Trzeciak, 2012. "The CERT Guide to Insider Threats: How to Prevent, Detect, and Respond to Information Technology Crimes (Theft, Sabotage, Fraud)", ser. SEI Series in Software Engineering. Addison-Wesley, Professional.
  8. B. Meena, Krishnaveer Abhishek Challa. 2012. "Cloud Computing Security Issues with Possible Solutions. "in IJCST
  9. Steve Hanna. A security analysis of Cloud Computing. Cloud Computing Journal. DOI = http://cloudcomputing. sys-con. com/node/1203943
  10. Guide to Cloud Computing: Principles and Practice By Richard Hill, Laurie. Hirsch, Peter. Lake, Siavash Moshiri, Page 16-18, 1996.
  11. Vahid Ashktorab, Seyed Reza Taghizadeh, 2012. "Security Threats and Countermeasures in Cloud Computing" in IJAIEM.
  12. David Munoz Sanchez, Comparison between security solutions in Cloud and Grid Computing. Aalto University, T-110. 5290 Seminar on Network Security Fall 2010.
Index Terms

Computer Science
Information Sciences

Keywords

Infrastructure as a service ( IaaS) Platform as a Service (PaaS) Software as a Service (SaaS) Virtual Machine (VM) SOAP (Simple Object Access Protocol)