Public Infrastructure-As-A-Service Cloud Security

Authors(1) :-Dr. V. Goutham

The public Infrastructure-as-a-Service (IaaS) cloud trade has reached a important mass within the past few years, with several cloud service suppliers fielding competitor services. Despite the competition, we discover a number of the protection mechanisms offered by the services to be similar, indicating that the cloud trade has established variety of “best-practices,” whereas different security mechanisms vary wide, indicating that there's conjointly still area for innovation and experimentation. we have a tendency to investigate these variations and potential underlying reasons for it. we have a tendency to conjointly distinction the protection mechanisms offered by public IaaS cloud offerings and with security mechanisms planned by academe over an equivalent amount.

Authors and Affiliations

Dr. V. Goutham
Professor and HOD of CSE in Teegla Krishna Reddy Engineering College, Telangana , India

Security, privacy, virtualization, Distributed systems security, Networks, Cloud computing, Public Infrastructure-as-a-Service Cloud.

  1. Amazon AWS. 2013. Amazon Web Services Risk and Compliance. https://media.amazonwebservices.com/ AWS_Risk_and_Compliance_Whitepaper.pdf, Last accessed: June 2015.
  2. Amazon AWS. 2014. Amazon Web Services Overview of Security Processes. https://media. amazonwebservices.com/pdf/AWS_Security_Whitepaper.pdf, Last accessed: June 2015.
  3. Ittai Anati, Shay Gueron, Simon Johnson, and Vincent Scarlata. 2013. Innovative technology for CPU based attestation and sealing. In Proceedings of the Workshop on Hardware and Architectural Support for Security and Privacy.
  4. Michael Armbrust, Armando Fox, Rean Griffith, Anthony Joseph, Randy Katz, Andy Konwinski, Gunho Lee, David Patterson, Ariel Rabkin, Ion Stoica, et al. 2010. A view of cloud computing. Communications of the ACM 53, 4, 50-58.
  5. Giuseppe Ateniese, Randal Burns, Reza Curtmola, Joseph Herring, Osama Khan, Lea Kissner, Zachary Peterson, and Dawn Song. 2011. Remote data checking using provable data possession. ACM Transactions on Information and System Security (TISSEC) 14, 1, 12.
  6. Giuseppe Ateniese, Randal Burns, Reza Curtmola, Joseph Herring, Lea Kissner, Zachary Peterson, and Dawn Song. 2007. Provable data possession at untrusted stores. In Proceedings of the 14th ACM Conference on Computer and Communications Security (CCS’07). 598-609.
  7. Giuseppe Ateniese, Roberto Di Pietro, Luigi V. Mancini, and Gene Tsudik. 2008. Scalable and efficient provable data possession. In Proceedings of the 4th International Conference on Security and Privacy in Communication Networks (SECURECOMM’08).
  8. Amittai Aviram, Sen Hu, Bryan Ford, and Ramakrishna Gummadi. 2010. Determinating timing channels in compute clouds. In Proceedings of the 2010 ACM Workshop on Cloud Computing Security (CCSW’10). 103-108.

Publication Details

Published in : Volume 2 | Issue 6 | November-December 2017
Date of Publication : 2017-11-30
License:  This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) : 1365-1371
Manuscript Number : CSEIT183165
Publisher : Technoscience Academy

ISSN : 2456-3307

Cite This Article :

Dr. V. Goutham, "Public Infrastructure-As-A-Service Cloud Security", International Journal of Scientific Research in Computer Science, Engineering and Information Technology (IJSRCSEIT), ISSN : 2456-3307, Volume 2, Issue 6, pp.1365-1371, November-December.2017
URL : http://ijsrcseit.com/CSEIT183165

Follow Us

Contact Us