Security Issues in Various Cloud Computing: Solution and Occur-Rent Solutions

Authors(2) :-Banoth Anantharam, Gurnadha Guptha

Cloud computing modified the world around us. currently, individuals are moving their information to the cloud since information is obtaining larger and needs to be accessible from several devices. Therefore, storing the information in the cloud becomes a norm. However, there are several problems that counter information hold on within the cloud starting from the virtual machine that is supposed to share resources within the cloud and ending on cloud storage itself problems. during this paper, we tend to gift those problems that are preventing individuals from adopting the cloud and provides a survey of solutions that are done to reduce risks of those problems. for instance, the information held on within the cloud must be confidential, protecting the integrity and obtainable.Moreover, sharing the information held on within the cloud among several users continues to be a problem since the cloud service supplier is entrust to manage authentication and authorization. during this paper, we tend to list problems associated with information held on in cloud storage and solutions to those problems that disagree from different papers that concentrate on the cloud as general.

Authors and Affiliations

Banoth Anantharam
CSE Department, Assistant Professor, Sri Indu College of Engineering and Technology, JNTU Hyderabad, Hyderabad, India
Gurnadha Guptha
CSE Department, Assistant Professor, Sri Indu College of Engineering and Technology, JNTU Hyderabad, Hyderabad, India

Information security, Data Confidentiality, Data Privacy, Cloud Computing, Cloud Security.

  1. "What is Cloud Computing?" Amazon Web Services. 2013-03-19. Retrieved 2013-03-20.
  2. J Baburajan, Rajani (2011-08-24). "The Rising Cloud Storage Market Opportunity Strengthens Vendors". It.tmcnet.com. Retrieved 2011-12-02.
  3. Oestreich, Ken, (2010-11-15). "Converged Infrastructure". CTO Forum. Thectoforum.com. Archived from the original on 2012-01-13. Retrieved 2011-12-02.
  4. "Where's The Rub: Cloud Computing's Hidden Costs". 2014-02-27. Retrieved 2014-07-14.
  5. "Cloud Computing: Clash of the clouds". The Economist. 2009-10-15. Retrieved 2009-11-03.
  6. "Gartner Says Cloud Computing Will Be As Influential As E-business". Gartner. Retrieved 2010-08-22.
  7. Gruman, Galen (2008-04-07). "What cloud computing really means". InfoWorld. Retrieved 2009-06-02.
  8. E. Aguiar, Y. Zhang, and M. Blanton, "An overview of issues and recent developments in cloud computing and storage security," in HighPerformance Cloud Auditing and Applications. Springer, 2014, pp. 3-33.
  9. I. Gul, M. Islam et al., "Cloud computing security auditing," in Next Generation Information Technology (ICNIT), 2011 The 2nd Interna- tional Conference on. IEEE, 2011, pp. 143-148.
  10. E. M. Mohamed, H. S. Abdelkader, and S. El-Etriby, "Enhanceddata security model for cloud computing," in Informatics and Systems (INFOS), 2012 8th International Conference on. IEEE, 2012, pp. CC- 12.
  11. S. Ramgovind, M. M. Eloff, and E. Smith, "The management of security in cloud computing," in Information Security for South Africa (ISSA), [12] 2010. IEEE, 2010, pp. 1-7.
  12. F. Sabahi, "Cloud computing security threats and responses," in Commu-nication Software and Networks (ICCSN), 2011 IEEE 3rd International Conference on. IEEE, 2011, pp. 245-249.
  13. X. Wang, B. Wang, and J. Huang, "Cloud computing and its key techniques," in Computer Science and Automation Engineering (CSAE), 2011 IEEE International Conference on, vol. 2. IEEE, 2011, pp. 404- 410.
  14. S. Subashini and V. Kavitha, "A survey on security issues in service delivery models of cloud computing," Journal of network and computer applications, vol. 34, no. 1, pp. 1-11, 2011.
  15. J. Yang and Z. Chen, "Cloud computing research and security issues, "in Computational Intelligence and Software Engineering (CiSE), 2010International Conference on. IEEE, 2010, pp. 1-3.
  16. M. Lori, "Data security in the world of cloud computing," Co-published by the IEEE Computer and reliability Societies, pp. 61-64, and 2009.
  17. C. Wang, K. Ren, W. Lou, and J. Li, "Toward publicly auditable secure cloud data storage services," Network, IEEE, vol. 24, no. 4, pp. 19-24, 2010.
  18. L. Wei, H. Zhu, Z. Cao, X. Dong, W. Jia, Y. Chen, and A. V. Vasilakos, "Security and privacy for storage and computation in cloud computing,"[19] Information Sciences, vol. 258, pp. 371-386, 2014.
  19. C. Wang, Q. Wang, K. Ren, and W. Lou, "Privacy-preserving public auditing for data storage security in cloud computing," in INFOCOM, 2010 Proceedings IEEE. IEEE, 2010, pp. 1-9.

Publication Details

Published in : Volume 1 | Issue 2 | September-October 2016
Date of Publication : 2017-12-31
License:  This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) : 163-170
Manuscript Number : CSEIT1726170
Publisher : Technoscience Academy

ISSN : 2456-3307

Cite This Article :

Banoth Anantharam, Gurnadha Guptha, "Security Issues in Various Cloud Computing: Solution and Occur-Rent Solutions", International Journal of Scientific Research in Computer Science, Engineering and Information Technology (IJSRCSEIT), ISSN : 2456-3307, Volume 1, Issue 2, pp.163-170, September-October-2016. |          | BibTeX | RIS | CSV

Article Preview