A Literature Review on Security Issues in Cloud Computing

Authors

  • T. Sainath  CNIS, M.Tech Sreenidhi Institute of Science & Technology, Hyderabad, Telangana, India
  • Dr. B. Indira Reddy  CNIS, Sreenidhi Institute of Science & Technology, Hyderabad, Telangana, India

Keywords:

Cloud Computing, Service Level Agreement (SLA), IaaS, PaaS, SaaS, Cloud computing, data threats, information security, data security, threats in security, Security service, FPGA

Abstract

The use of Cloud Computing has increased rapidly in many organization .Cloud Computing provides many benefits in terms of low cost and accessibility of data. In addition Cloud Computing was predicted to transform the computing world from using local applications and storage into centralized services provided by organization. Ensuring the security of Cloud Computing is major factor in the Cloud Computing environment. Security and privacy are the key issues for Cloud Computing and still face some huge challenges. This article contains a review of technical literatures relating security challenges and security issues of Cloud Computing. I review the methodology and consequently solution, analysis, finding and other main points in these lectures. So the purpose of this paper is to search out various issues in cloud computing where all computing is done on the server side and both data & tasks are stored on the data centers.

References

  1. BKandukuri, R.Paturi And R.Rakshit." Cloud Securi-ty Issues".in: IEEE International Conference on Services Computing,(pp.517&520. 2009
  2. M Almorsy, J. Grundy and A. S. Ibrahim. "Collabo-ration-Based Cloud Computing Security Management Framework".in: IEEE 4th International Conference on Cloud Computing.(pp. 365&371. 2011
  3. Alexa Huth and James Cebula,"The Basics of Cloud Computing" Carnegie Mellon University. Produced for US-CERT, 2011
  4. Farzad Sabahi, "Cloud Computing Security Threats and Responses", 2011 IEEE 3rd International Conference on Communication Software and Network (ICCSN, pp. 245-249, May 2011.
  5. R Buyya, J. Broberg and A. Gosscinnski. 'Cloud computing.' Hoboken, N.J.: Wiley; 2011.
  6. JMMondol."Cloud security Solution using FPGA". In:IEEE . (pp.747&751-752. June 15, 2011.
  7. JJ Hwang, Taoyuan, Taiwan, Y.C. Hsu and C.H. Wu. 'A Business Model for Cloud Computing Based on a Separate Encryption and Decryption Service.' International Conference on Information Science and Applications (ICISA, pp 1-7, 2011.
  8. TKao, Ching-Hao.Mao, Chien-Yu.Chang and Kai-Chi Chang. "Cloud SSDLC:Cloud Security Governance Deployment Framework in Secure System Development Life Cycle". In: IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communi-cations.(pp.1143&1147.2012.
  9. Satveer Kaur and Amanpreet Singh, "The Concept of Cloud Computing and Issues Regarding its Privacy and Security", International Journal of Engineering Research & Technology (IJERT, Vol. 1 Issue 3, May 2012.
  10. A Bouayad, A.Bliliat, N.Mejhed And M.Elghazi." Cloud computing: security challenges".in:IEEE. (pp.26&31.2012.
  11. JK. Wang and X. Jia. 'Data security and authentication in hybrid cloud computing model.' IEEE Global High Tech Congress on Electronics, pp 117- 120, 2012.
  12. Sandip A.kale, Prof S.V Kulkarni, Department of CSE of MIT Aurangabad.Data Leakage Detection International journal of Advanced Research in Computer and Communication Engineering Vol 1, Issue 9, November 2012
  13. ABehl, K.Behl. "An Analysis of Cloud Computing Se-curity Issues".in:IEEE.(pp.109&113-114.2012.
  14. I M. Khali and A.Khreishah." Security Concerns in Cloud Computing".in:10th International Conference on Information Technology.(pp.411&414-415.2013.
  15. Simarjeet Kaur, "Cryptography and Encryption in Cloud Computing", VSRD International Journal of Computer Science and Information Technology, Vol.2(3, 242-249, 2012
  16. F Moghaddam F, Karimi O and Alrashdan M T. 'A Comparative Study of Applying Real-Time Encryption in Cloud Computing Environments.' Proceedings IEEE 2nd International Conference on Cloud Networking (CloudNet, San Francisco, USA, pp 185-189, 2013
  17. RChalse, A.Selokar and A.Katara." A New Technique of Data Integrity for Analysis of the Cloud Computing Security".in: 5th International Conference on Compu-tational Intelligence and Communication Networks. (pp.469&472.2013.
  18. NZhang, D.Liu and Yun-Yong Zhang."A Research on Cloud Computing Security".in: International Con-ference on Information Technology and Applications. (pp.370&373.2013.
  19. L A. Maghrabi." The Threats of Data Security over the Cloud as Perceived by Experts and University Students".in:IEEE.(pp.1&5.2014.
  20. N Sengupta and R. Chinnasamy. 'Contriving hybrid DESCAST algorithm for cloud security.' Elsevier, pp 47-56, 2015
  21. Kang II Choi, Jung Hee Lee, Bhum Cheol Lee. Network Computing Convergence Lab, ETRI, Daejeon, Korea. ICACT Transactions on Advanced Communications Technology(TACT Vol.5, Issue 3, May 2016
  22. Savitha D Torvi, Dr. K B Shivakumar, Rupam Das. AN UNIQUE DATA SECURITY USING TEXT STEGANOGRAPHY. 2016 International Conference for Sustainable for Global Development(INDIACom
  23. Shweta Singh1 M. Tech Scholar, Department of CSE, Jamia Hamdrad University, Delhi, India. International Journal of Computational Intelligence Research ISSN 0973-1873 Volume 13, Number 6 (2017, pp. 1419-1429
  24. Tabrez Nafis2 Assistant Professor , Department of CSE, Jamia Hamdrad University, Delhi, India. International Journal of Computational Intelligence Research ISSN 0973-1873 Volume 13, Number 6 (2017, pp. 1419-1429

Downloads

Published

2018-07-30

Issue

Section

Research Articles

How to Cite

[1]
T. Sainath, Dr. B. Indira Reddy, " A Literature Review on Security Issues in Cloud Computing , IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 3, Issue 6, pp.128-132, July-August-2018.