Public Infrastructure-As-A-Service Cloud Security

Authors

  • Dr. V. Goutham  Professor and HOD of CSE in Teegla Krishna Reddy Engineering College, Telangana , India

Keywords:

Security, privacy, virtualization, Distributed systems security, Networks, Cloud computing, Public Infrastructure-as-a-Service Cloud.

Abstract

The public Infrastructure-as-a-Service (IaaS) cloud trade has reached a important mass within the past few years, with several cloud service suppliers fielding competitor services. Despite the competition, we discover a number of the protection mechanisms offered by the services to be similar, indicating that the cloud trade has established variety of “best-practices,” whereas different security mechanisms vary wide, indicating that there's conjointly still area for innovation and experimentation. we have a tendency to investigate these variations and potential underlying reasons for it. we have a tendency to conjointly distinction the protection mechanisms offered by public IaaS cloud offerings and with security mechanisms planned by academe over an equivalent amount.

References

  1. Amazon AWS. 2013. Amazon Web Services Risk and Compliance. https://media.amazonwebservices.com/ AWS_Risk_and_Compliance_Whitepaper.pdf, Last accessed: June 2015.
  2. Amazon AWS. 2014. Amazon Web Services Overview of Security Processes. https://media. amazonwebservices.com/pdf/AWS_Security_Whitepaper.pdf, Last accessed: June 2015.
  3. Ittai Anati, Shay Gueron, Simon Johnson, and Vincent Scarlata. 2013. Innovative technology for CPU based attestation and sealing. In Proceedings of the Workshop on Hardware and Architectural Support for Security and Privacy.
  4. Michael Armbrust, Armando Fox, Rean Griffith, Anthony Joseph, Randy Katz, Andy Konwinski, Gunho Lee, David Patterson, Ariel Rabkin, Ion Stoica, et al. 2010. A view of cloud computing. Communications of the ACM 53, 4, 50-58.
  5. Giuseppe Ateniese, Randal Burns, Reza Curtmola, Joseph Herring, Osama Khan, Lea Kissner, Zachary Peterson, and Dawn Song. 2011. Remote data checking using provable data possession. ACM Transactions on Information and System Security (TISSEC) 14, 1, 12.
  6. Giuseppe Ateniese, Randal Burns, Reza Curtmola, Joseph Herring, Lea Kissner, Zachary Peterson, and Dawn Song. 2007. Provable data possession at untrusted stores. In Proceedings of the 14th ACM Conference on Computer and Communications Security (CCS’07). 598-609.
  7. Giuseppe Ateniese, Roberto Di Pietro, Luigi V. Mancini, and Gene Tsudik. 2008. Scalable and efficient provable data possession. In Proceedings of the 4th International Conference on Security and Privacy in Communication Networks (SECURECOMM’08).
  8. Amittai Aviram, Sen Hu, Bryan Ford, and Ramakrishna Gummadi. 2010. Determinating timing channels in compute clouds. In Proceedings of the 2010 ACM Workshop on Cloud Computing Security (CCSW’10). 103-108.

Downloads

Published

2017-11-30

Issue

Section

Research Articles

How to Cite

[1]
Dr. V. Goutham, " Public Infrastructure-As-A-Service Cloud Security, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 2, Issue 6, pp.1365-1371, November-December-2017.