Cloud Computing Security Issues and Challenges

Authors

  • Arwinder Kaur  CGC-CCT, Landran, Ajitgarh, Punjab, India
  • Gurpreet Singh  SSIET, Derabassi, Punjab, India

DOI:

https://doi.org//10.32628/CSEIT206253

Keywords:

Cloud Computing, Deployment Model, Network, Database, Virtualization, Resource Scheduling, Transaction Management, Load Balancing.

Abstract

Cloud computing is a technology which works on plethora of computation such as sharing, managing, configuring, storing, and processing with the use of virtualized dynamic resources pooling on demand self-services with high availability on round clock as pay as you go with measured services. It is the most tempting technology in today’s paradigms due to its positives like scalability, flexibility, cost efficiency and recovery. In this paper, we will study significance of cloud computing and its services worldwide in almost every field. Also, survey open confronts allied to cloud. This paper is a review particularly on diverse concerns and challenges that occur recurrently while using cloud computing tools.

References

  1. S. Ramgovind, M. M. Eloff, and E. Smith, “The management of security in cloud computing,” in Information Security for South Africa (ISSA), 2010. IEEE, 2010, pp.1–7.
  2. M.R. Tribhuwan, V.A. Bhuyar, Shabana Pirzade, “Ensuring Data Storage Security in Cloud Computing through Two-way Handshake based on Token Management”, 2010 International Conference on Advances in Recent Technologies in Communication and Computing.
  3. Uma Somani, Kanika Lakhani, Manish Mundra, “Implementing Digital Signature with RSA Encryption Algorithm to Enhance the Data Security of Cloud in Cloud Computing”, 1st International Conference on Parallel, Distributed and Grid Computing (PDGC - 2010).
  4. F. Sabahi, “Cloud computing security threats and responses,” in Communication Software and Networks (ICCSN), 2011 IEEE 3rd International Conference on. IEEE, 2011, pp. 245–249.
  5. X. Wang, B. Wang, and J. Huang, “Cloud computing and its key techniques,” in Computer Science and Automation Engineering (CSAE), 2011 IEEE International Conference on, vol. 2. IEEE, 2011, pp.404–410
  6. I. Gul, M. Islam et al., “Cloud computing security auditing,” in Next Generation Information Technology (ICNIT), 2011 The 2nd International Conference on. IEEE, 2011, pp.143–148.
  7. Arjun Kumar, Byung Gook Lee, HoonJae Lee, Anu Kumari, “Secure Storage and Access of Data in Cloud Computing”, 2012 International Conference on ICT Convergence (ICTC), 15-17 Oct. 2012.
  8. M. AlZain, E. Pardede, B. Soh, and J. Thom, “Cloud computing security: From single to multi-clouds,” in System Science (HICSS), 2012 45th Hawaii International Conference on, Jan 2012, pp.5490–5499.
  9. E. M. Mohamed, H. S. Abdelkader, and S. El- Etriby, “Enhanced data security model for cloud computing,” in Informatics and Systems (INFOS), 2012 8th International Conference on. IEEE, 2012, pp.CC–12.
  10. Mr. Prashant Rewagad, Ms.Yogita Pawar, “Use of Digital Signature with Diffie Hellman Key Exchange and AES Encryption Algorithm to Enhance Data Security in Cloud Computing”, 2013 International Conference on Communication Systems and Network Technologies.
  11. V. Nirmala, R. K. Sivanandhan, Dr. R. Shanmuga Lakshmi, “Data Confidentiality and Integrity Verification using User Authenticator scheme in cloud”, Proceedings of 2013 International Conference on Green High Performance Computing (ICGHPC 2013). March 14-15, 2013,India.
  12. M. Sookhak, H. Talebian, E. Ahmed, A. Gani, and M. K. Khan, “A review on remote data auditing in single cloud server: Taxonomy and open issues,” Journal of Network and Computer Applications, vol. 43, pp. 121–141,2014.
  13. E. Aguiar, Y. Zhang, and M. Blanton, “An overview of issues and recent developments in cloud computing and storage security,” in High Performance Cloud Auditing and Applications. Springer, 2014, pp.3–33.
  14. Tejashri Khandve, Megha Talekar, Sheetal Dwar,”Secuity and Load Balancing In Cloud Computing” October 2015 in International Journal of Advanced Research in Computer Engineering. Vol 4 Issue10 ISSN: 2278 – 1323 PP 3871-3874.
  15. J. Antony John Prabhu, Dr. S Britto, Ramesh Kumar,”Issues and Challenges of Data Transaction Management in Cloud Environment” July 2015 in Internatioal Research Journal of Engineering and Technology(IRJET) e-ISSSN:2395-0056 Vol :02 Issue :04 PP 123-128.
  16. A. M. Chandra Shekhar, Shashi Kumar, ”Cloud Computing Service & Deployment Models” June 2017 in International Journal for Research in Applied Science & Engineering Volume 5 Issue VI, ISSN: 2321-9653 PP 1085-1088

Downloads

Published

2020-04-30

Issue

Section

Research Articles

How to Cite

[1]
Arwinder Kaur, Gurpreet Singh, " Cloud Computing Security Issues and Challenges, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 6, Issue 2, pp.265-270, March-April-2020. Available at doi : https://doi.org/10.32628/CSEIT206253