CFP last date
20 December 2024
Reseach Article

A Framework based in Security Issues in Cloud Computing

Published on May 2014 by N. Suganya, N. Boopal
International Conference on Simulations in Computing Nexus
Foundation of Computer Science USA
ICSCN - Number 3
May 2014
Authors: N. Suganya, N. Boopal
5f2214f4-723d-4c8a-8968-70cf8063c8c0

N. Suganya, N. Boopal . A Framework based in Security Issues in Cloud Computing. International Conference on Simulations in Computing Nexus. ICSCN, 3 (May 2014), 19-21.

@article{
author = { N. Suganya, N. Boopal },
title = { A Framework based in Security Issues in Cloud Computing },
journal = { International Conference on Simulations in Computing Nexus },
issue_date = { May 2014 },
volume = { ICSCN },
number = { 3 },
month = { May },
year = { 2014 },
issn = 0975-8887,
pages = { 19-21 },
numpages = 3,
url = { /proceedings/icscn/number3/16162-1036/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 International Conference on Simulations in Computing Nexus
%A N. Suganya
%A N. Boopal
%T A Framework based in Security Issues in Cloud Computing
%J International Conference on Simulations in Computing Nexus
%@ 0975-8887
%V ICSCN
%N 3
%P 19-21
%D 2014
%I International Journal of Computer Applications
Abstract

Resource sharing is the vital notion of cloud computing. Everything that is available in cloud can be accessed as a service. The users can move the data to the cloud environment because of the accessing flexibility. While moving the data to the cloud ,the infrastructure can pose severe security and privacy issues. There is a chance that the attacker can easily spoof an authorized user's data. This study explains an overview of the possible threats and attacks that occurs in cloud computing and provides certain solution to overcome those threats and attacks.

References
  1. "Security Guidance for Critical Areas of Focus in Cloud Computing", April 2009, presented by Cloud Security Alliance (CSA).
  2. Ayesha Malik, Muhammad MohsinNazir "Security Framework for Cloud Computing Environment: A Review"Journal of Emerging Trends in Computing and Information Sciences VOL. 3, NO. 3, March 2012.
  3. Cong Wang, Qian Wang, and KuiRen and Wenjing Lou "Ensuring Data Storage Security in Cloud Computing"- IEEE Transaction on Parallel and Distributed Systems, Vol. 22, No. 5, May 2011.
  4. EysteinMathisen "Security Challenges and Solutions in Cloud Computing" 5th IEEE International Conference on Digital Ecosystems and Technologies (IEEE DEST 2011), 31 May -3 June 2011, Daejeon, Korea.
  5. GurudattKulkarni&JayantGambhir, TejswiniPatil, AmrutaDongare (2012) "A security aspect in cloud computing" 3rd IEEE International Conference on Software Engineering and Service Science (ICSESS).
  6. IrfanGul, AtiqurRehman and M Hasan Islam (2011) "Cloud computing security Auditing", 2nd International Conference on Next Generation Information Technology (ICNIT).
  7. Mina Deng, Milan Petkovi, Marco Nalin and IlariaBaroni "A home healthcare system in the cloud – addressing security and privacy challenges" -IEEE 4th International Conference on Cloud Computing,2011.
  8. RajnishChoubey, RajshreeDubey, Joy Bhattacharjee "A Survey on Cloud Computing Security,Challenges and Threats"-International Journal on Computer Science and Engineering (IJCSE) ,Vol. 3 No. 3 Mar 2011.
  9. Sameera and Chan, "Cloud Computing Security Management",Second International Conference on Engineering Systems Management and Its Applications (ICESMA), 30 March, 2010.
  10. ShivlalMewada , Umeshkumar Singh and Pradeep Sharma "Security Based Model for Cloud Computing", IRACST – International Journal of Computer Networks and Wireless Communications (IJCNWC), Vol. 1, No. 1, December 2011.
  11. Wentao Liu (2012) "Research on Cloud Computing Security Problem and strategy" 2nd International Conference on Consumer Electronics, Communications and Networks (CECNet).
Index Terms

Computer Science
Information Sciences

Keywords

Cloud Computing Threats And Attacks