A Systematic Review Paper on Cloud Security

Authors

  • Kirti Sharma  CSE, AIACT & R, GGSIPU, Delhi, India
  • Bharti Nagpal  CSE, AIACT & R, GGSIPU, Delhi, India

Keywords:

Cloud Security, Saas, Paas, And Iaas, Virtual Assets, Cloud Computing, Hadoop, Cryptography File Systems, HDFS System

Abstract

Cloud computing is a rising method for processing in software engineering. It expands different registering systems like framework figuring, dispersed processing. Today cloud computing is utilized as a part of both mechanical field and scholarly field. Cloud encourages its clients by giving virtual assets by means of web. As the field of cloud computing is spreading the new systems are creating. This expansion in cloud processing condition likewise expands security challenges for cloud engineers. Clients of cloud spare their information in the cloud subsequently the absence of security in cloud can lose the client's trust. This paper presents a systematic review on different cloud security issues with their respective pros and cons and imparting the existing methodologies done by the researchers for cloud security.

References

  1. NIST (Authors: P. Mell and T. Grance), "The NIST Definition of Cloud Computing (ver. 15)," National Institute of Standards and Technology, Information Technology Laboratory (October 7 2009).
  2. J. McDermott, (2009) "Security Requirements for Virtualization in Cloud Computing," presented at the ACSAC Cloud Security Workshop, Honolulu, Hawaii, USA, 2009.
  3. Almorsy, Mohamed, John Grundy, and Ingo Müller. "An analysis of the cloud computing security problem." arXiv preprint arXiv:1609.01107 (2016).
  4. Kalaiprasath, R., R. Elankavi, and Dr R. Udayakumar. "Cloud. Security and Compliance-A Semantic Approach in End to End Security." International Journal Of Mechanical Engineering And Technology (Ijmet) 8.5 (2017).
  5. McGee, Pat. C# 5.0: A Beginner's Guide. McGraw-Hill Education, 2015.
  6. slideplayer.com/slide/9476015/
  7. bigdata-madesimple.com/5-advantages-and-disadvantages-of-cloud-storage/
  8. computer.howstuffworks.com/cloud-computing/cloud-storage3.htm
  9. fac.ksu.edu.sa/sites/default/files/chapter_6._fundamental_cloud_security.pdf
  10. https://www.slideshare.net/InderBarara1/security-issues-and-challenges-in-cloud-computing
  11. sciencedirect.com/science/article/pii/S1361372318300058
  12. https://arxiv.org/ftp/arxiv/papers/1403/1403.5627.pdf
  13. Cigoj, Primož, and Borka Jerman Blažič. "An authentication and authorization solution for a multiplatform cloud environment." Information Security Journal: A Global Perspective 24.4-6 (2015): 146-156.
  14. Tamilarasi, R., S. Prabu, and P. Swarnalatha. An Approach for Data and Image Security in Public Cloud using Segmentation and Authentication (CSA) Protocol Suite. MAGNT Research Report 2015. 133-141.
  15. VarshaD.Mali,Prof.Pramod Patil,"Authentication and Access Control for Cloud Computing using RBDAC Mechanism", in International Journal of Innovative Research in Computer and Communicationngineering,vol.4,Issue11,Nov2016,DOI:10.15680/IJIRCCE.2016.
  16. Punam V.Maitri ,Aruna verma ,"Secure File Storage in Cloud Computing using Hybrid Cryptography Algorithm",in IEEE explore on WiSNET Conference, Sep 2013,DOI:10.1109/WiSPNET.2016.7566416.
  17. J.Mahalakshmi and K.Kuppusamy, "Security-As-A-Service for files in Cloud Computing-A Novel application Model", IEEE Digital Xplore, DOI: 10.1109/ISCO.2016.7726889, November 2016, pp: 1-5, IEEE.
  18. Irain, Malik, Jacques Jorda, and Zoubir Mammeri. "Landmark-based data location verification in the cloud: review of approaches and challenges." Journal of Cloud Computing 6.1 (2017): 31.
  19. Rakotondravony, Noëlle, and Hans P. Reiser. "Visualizing and Controlling VMI-based malware analysis in IaaS Cloud." Reliable Distributed Systems (SRDS), 2016 IEEE 35th Symposium on. IEEE, 2016.
  20. Wang, Rongzhi. "Research on Data Security Technology Based on Cloud Storage." Procedia engineering 174 (2017): 1340-1355.
  21. Tariq, Husna, and Parul Agarwal. "Secure keyword search using dual encryption in cloud computing." International Journal of Information Technology: 1-10.
  22. Singh, Iqjot, et al. "Enhanced K-means clustering with encryption on cloud." IOP Conference Series: Materials Science and Engineering. Vol. 263. No. 4. IOP Publishing, 2017.
  23. Storch, Mauro, and César AF De Rose. "Cloud Storage Cost Modeling for Cryptographic File Systems." Parallel, Distributed and Network-based Processing (PDP), 2017 25th Euromicro International Conference on. IEEE, 2017.
  24. Kumar, Narander, and Priyanka Chaudhary. "Diminishing Cyber stalking and Cyber bullying Issues using a Hashing Approach and Rail Fence Technique."
  25. Sette, Ioram S., David W. Chadwick, and Carlos AG Ferraz. "Authorization Policy Federation in Heterogeneous Multicloud Environments." IEEE Cloud Computing 4.4 (2017): 38-47.
  26. Chinnaiah, Mylara Reddy, and Nalini Niranjan. "Fault tolerant software systems using software configurations for cloud computing." Journal of Cloud Computing 7.1 (2018): 3.
  27. Moussa, Ahmed Nour, Norafida Ithnin, and Anazida Zainal. "CFaaS: bilaterally agreed evidence collection." Journal of Cloud Computing 7.1 (2018): 1.
  28. Attrapadung, Nuttapong; Herranz, Javier; Laguillaumie, Fabien; Libert,Benoît; de Panafieu, Elie; Ràfols, Carla (2012-03-09). "Attribute-based encryption schemes with constant-sizeciphertexts" Computer Science. 22: 15–38. doi:10.1016/j.tcs.2011.12.004.
  29. "Cloud Security Front and Center" (http://blogs.forrester.com/srm/2009/11/cloud-security-front-and-center.html). Forrester Research. 2009-11-18. Retrieved 2010-01-25.
  30. Wang, Huang He, Yuan, Liu Xiao, Xi, Xu Jing, Min, "Open Identity Management Framework for SaaS Ecosystem," in ICEBE '09. pp. 512-517.
  31. Aizat Azmi, Ahmad Amsyar Azman, Sallehuddin Ibrahim, and Mohd Amri Md Yunus, “Techniques In Advancing The Capabilities Of Various Nitrate Detection Methods: A Review”, International Journal on Smart Sensing and Intelligent Systems., VOL. 10, NO. 2, June 2017, pp. 223-261.

Downloads

Published

2018-06-30

Issue

Section

Research Articles

How to Cite

[1]
Kirti Sharma, Bharti Nagpal, " A Systematic Review Paper on Cloud Security, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 3, Issue 6, pp.5-10, July-August-2018.