Security Issues and Solutions in Cloud Storage as a Service : A Review

Authors

  • YSR Gayatri  M.Tech. Department of IT & Telecommunication, Raksha Shakti University, Ahmedabad, Gujarat, India
  • Chandresh Parekh  Asst. Professor, Department of IT & Telecommunication, Raksha Shakti University, Ahmedabad, Gujarat, India

Keywords:

Cloud Computing, Storage as a Service, Encryption Techniques

Abstract

Cloud computing (CC) is a fast growing business considering its attractive features and undeniable advantages at an affordable cost. The boon of immense flexibility, accessibility and availability of data of individual customers comes with attached security concerns. This review paper briefly introduces existing types of cloud services with emphasis on storage of data offered as a service. Data security is a big concern that can be detrimental to the growth of cloud users. The security issues in present day cloud storage have been reviewed. New cryptographic technique is proposed to enhance security with increased speed.

References

  1. http://searchcloudcomputing.techtarget.com/definition/cloud-computing accessed on: 27 Nov 2017
  2. https://azure.microsoft.com/en-in/overview/what-is-cloud-computing/ accessed on: 30 Nov 2017
  3. https://aws.amazon.com/what-is-cloud-storage/ accessed on: 30 Nov 2017
  4. http://searchstorage.techtarget.com/definition/Storage-as-a-Service-SaaS accessed on: 8 Nov 2017
  5. https://digitalguardian.com/blog/6-security-risks-enterprises-using-cloud-storage-and-file-sharing-apps accessed on: 30 Nov 2017
  6. https://www.infoworld.com/article/3041078/security/the-dirty-dozen-12-cloud-security-threats.html accessed on 18 Nov 2017
  7. Naresh vurukonda, and B.Thirumala Rao, “A Study on Data Storage Security Issues in Cloud Computing” in 2nd International Conference on Intelligent Computing, Communication & Convergence, ICCC - 2016, Bhubaneswar, Odisha, India
  8. Balkees Mohamed Shereek, ZaitonMuda, and SharifahYasin, “Improve Cloud Computing Security Using RSA Encryption With Fermat’s Little Theorem” in IOSR Journal of Engineering, Vol. 04, Issue 02 (February. 2014), ||V6|| PP 01-08
  9. https://securosis.com/blog/cloud-data-security-archive-and-delete-rough-cut accessed on: 06 Dec 2017
  10. https://www.veracode.com/security/byod-security accessed on: 11 Dec 2017
  11. https://www.joyent.com/blog/cloud-security-the-challenges-with-key-management-in-the-cloud-and-everywhere-else accessed on: 11 Dec 2017
  12. Atulay Mahajan, and Sangeeta Sharma, “The Malicious Insiders Threat in the Cloud” in International Journal of Engineering Research and General Science Volume 3, Issue 2, Part 2, March-April 2015
  13. https://www.sam-solutions.com/blog/top-5-tips-for-cloud-computing-security/ accessed on: 11 Dec 2017
  14. Ashima Pansotra, and Simar Preet Singh, “Cloud Security Algorithms” in International Journal of Security and Its Applications Vol.9, No.10 (2015), pp.353-360
  15. https://brilliant.org/wiki/fermats-little-theorem/ accessed on: 12 Dec 2017

Downloads

Published

2017-12-31

Issue

Section

Research Articles

How to Cite

[1]
YSR Gayatri, Chandresh Parekh, " Security Issues and Solutions in Cloud Storage as a Service : A Review, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 2, Issue 6, pp.930-933, November-December-2017.