Security Issues in Various Cloud Computing: Solution and Occur-Rent Solutions
Keywords:
Information security, Data Confidentiality, Data Privacy, Cloud Computing, Cloud Security.Abstract
Cloud computing modified the world around us. currently, individuals are moving their information to the cloud since information is obtaining larger and needs to be accessible from several devices. Therefore, storing the information in the cloud becomes a norm. However, there are several problems that counter information hold on within the cloud starting from the virtual machine that is supposed to share resources within the cloud and ending on cloud storage itself problems. during this paper, we tend to gift those problems that are preventing individuals from adopting the cloud and provides a survey of solutions that are done to reduce risks of those problems. for instance, the information held on within the cloud must be confidential, protecting the integrity and obtainable.Moreover, sharing the information held on within the cloud among several users continues to be a problem since the cloud service supplier is entrust to manage authentication and authorization. during this paper, we tend to list problems associated with information held on in cloud storage and solutions to those problems that disagree from different papers that concentrate on the cloud as general.
References
- "What is Cloud Computing?" Amazon Web Services. 2013-03-19. Retrieved 2013-03-20.
- J Baburajan, Rajani (2011-08-24). "The Rising Cloud Storage Market Opportunity Strengthens Vendors". It.tmcnet.com. Retrieved 2011-12-02.
- Oestreich, Ken, (2010-11-15). "Converged Infrastructure". CTO Forum. Thectoforum.com. Archived from the original on 2012-01-13. Retrieved 2011-12-02.
- "Where's The Rub: Cloud Computing's Hidden Costs". 2014-02-27. Retrieved 2014-07-14.
- "Cloud Computing: Clash of the clouds". The Economist. 2009-10-15. Retrieved 2009-11-03.
- "Gartner Says Cloud Computing Will Be As Influential As E-business". Gartner. Retrieved 2010-08-22.
- Gruman, Galen (2008-04-07). "What cloud computing really means". InfoWorld. Retrieved 2009-06-02.
- E. Aguiar, Y. Zhang, and M. Blanton, "An overview of issues and recent developments in cloud computing and storage security," in HighPerformance Cloud Auditing and Applications. Springer, 2014, pp. 3-33.
- I. Gul, M. Islam et al., "Cloud computing security auditing," in Next Generation Information Technology (ICNIT), 2011 The 2nd Interna- tional Conference on. IEEE, 2011, pp. 143-148.
- E. M. Mohamed, H. S. Abdelkader, and S. El-Etriby, "Enhanceddata security model for cloud computing," in Informatics and Systems (INFOS), 2012 8th International Conference on. IEEE, 2012, pp. CC- 12.
- S. Ramgovind, M. M. Eloff, and E. Smith, "The management of security in cloud computing," in Information Security for South Africa (ISSA), [12] 2010. IEEE, 2010, pp. 1-7.
- F. Sabahi, "Cloud computing security threats and responses," in Commu-nication Software and Networks (ICCSN), 2011 IEEE 3rd International Conference on. IEEE, 2011, pp. 245-249.
- X. Wang, B. Wang, and J. Huang, "Cloud computing and its key techniques," in Computer Science and Automation Engineering (CSAE), 2011 IEEE International Conference on, vol. 2. IEEE, 2011, pp. 404- 410.
- S. Subashini and V. Kavitha, "A survey on security issues in service delivery models of cloud computing," Journal of network and computer applications, vol. 34, no. 1, pp. 1-11, 2011.
- J. Yang and Z. Chen, "Cloud computing research and security issues, "in Computational Intelligence and Software Engineering (CiSE), 2010International Conference on. IEEE, 2010, pp. 1-3.
- M. Lori, "Data security in the world of cloud computing," Co-published by the IEEE Computer and reliability Societies, pp. 61-64, and 2009.
- C. Wang, K. Ren, W. Lou, and J. Li, "Toward publicly auditable secure cloud data storage services," Network, IEEE, vol. 24, no. 4, pp. 19-24, 2010.
- L. Wei, H. Zhu, Z. Cao, X. Dong, W. Jia, Y. Chen, and A. V. Vasilakos, "Security and privacy for storage and computation in cloud computing,"[19] Information Sciences, vol. 258, pp. 371-386, 2014.
- C. Wang, Q. Wang, K. Ren, and W. Lou, "Privacy-preserving public auditing for data storage security in cloud computing," in INFOCOM, 2010 Proceedings IEEE. IEEE, 2010, pp. 1-9.
Downloads
Published
Issue
Section
License
Copyright (c) IJSRCSEIT
This work is licensed under a Creative Commons Attribution 4.0 International License.