Network Security Issues In Cloud Computing

Authors

  • Rajarathinam B  PG Scholar, PG Department of IT, Hindusthan College of Arts and Science (Autonomous), Avinashi Road, Coimbatorem, TamilNadu, India
  • Marrynal S Eastaff  Assistant Professor, PG Department of IT, Hindusthan College of Arts and Science (Autonomous), Coimbatorem, TamilNadu, India

Keywords:

Security issues for clouds, Cloud Computing Challenges, and Security Problem Space

Abstract

Today, cloud computing is a rising way of computing in computer knowledge. Cloud computing is a set of possessions and services that are on hand by the network or internet. Cloud computing extend a variety of computing techniques like grid compute, distributed computing. Today cloud computing is used in both industrial pasture and educational field. As the meadow of cloud computing is scattering the new technique are increasing. This amplifies in cloud computing location also increases security challenges for cloud developers. Users of confuse save their data in the shade hence the lack of security in cloud can lose the user’s trust. In this paper we will discuss some of the cloud security issue in a mixture of aspects like multi-tenancy, stretch, accessibility etc. the paper also argue existing security technique and approaches for a protected cloud.

References

  1. Akhil Behl (2011), Emerging Security Challenges in Cloud Computing (An insight to Cloud security challenges and their mitigation).
  2. Bertino, E. (2002). Access Control for XML Docu- ments. Data & Knowledge Engineering, 43(3).
  3. Bertino, E. (2004). Selective and Authentic Third Party Distribution of XML Documents. IEEE Transactions on Knowledge and Data Engineering, 16(10). doi:10.1109/TKDE.2004.63
  4. DeVries, B. W., Gupta, G., Hamlen, K. W., Moore, S., & Sridhar, M. (2009). ActionScript Bytecode Verifi- cation with Co-Logic Programming. In Proceedings of the ACM SIGPLAN Workshop on Programming Languages and Analysis for Security (PLAS).
  5. Arijit Ukil, Debasish Jana and Ajanta De Sarkar” A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE “International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.5, September 2013 DOI: 10.5121/ijnsa.2013.5502 11. 
  6. Rabi Prasad Padhy, Manas Ranjan Patra and Suresh Chandra Satapathy ,” Cloud Computing: Security Issues and Research Challenges”, IRACST - International Journal of Computer Science and Information Technology & Security (IJCSITS) Vol. 1, No. 2, December 2011.
  7. Kashif Munir and Prof Dr. Sellapan Palaniappan," FRAMEWORK FOR SECURE CLOUD COMPUTING ", International Journal on Cloud Computing: Services and Architecture (IJCCSA), Vol.3, No.2, April 2013.
  8. J. Brodkin. (2008, Jun.). “Gartner: Seven cloud-computing security risks.” Infoworld , Available: <http://www.infoworld.com/d/security-central/gartner-seven-cloudcomputing- security-risks-853?page=0,1> [Mar. 13, 2009]. 
  9. Arjun Kumar, Byung Gook Lee, HoonJae Lee, Anu Kumari, “Secure Storage and Access of Data in Cloud Computing”, 2012 International Conference on ICT Convergence (ICTC), 15-17 Oct. 2012
  10. Uma Somani, Kanika Lakhani, Manish Mundra, “Implementing Digital Signature with RSA Encryption Algorithm to Enhance the Data Security of Cloud in Cloud Computing”, 1st International Conference on Parallel, Distributed and Grid Computing (PDGC - 2010).
  11. V.Nirmala, R.K.Sivanandhan, Dr.R.Shanmuga Lakshmi, “Data Confidentiality and Integrity Verification usingUser Authenticator scheme in cloud”, Proceedings of 2013 International Conference on Green High Performance Computing (ICGHPC 2013). March 14-15, 2013, India.
  12. Sultan Aldossary, William Allen, “Data Security, Privacy, Availability and Integrity in Cloud Computing: Issues and Current Solutions”, in International Journal of Advanced Computer Science and Applications, Vol. 7, No. 4, 2016
  13. Kuyoro S. O., Ibikunle F. & Awodele O. International Journal of Computer Networks (IJCN), Volume (3) : Issue (5) : 2011 254
  14. Cloud Computing Use Case Discussion Group. "Cloud Computing UseCases Version 3.0," 2010.
  15. Streitberger W. Ruppel, A.: Cloud computing security - protection goals, taxon- omy, market review. Tech. rep., Institute for Secure Information Technology SIT (2010)
  16.  Abi Haidar, D., Cuppens-Boulahia, N., Cuppens, F., Debar, H.: XeNA: an access negotiation framework using XACML. Annals

Downloads

Published

2018-02-28

Issue

Section

Research Articles

How to Cite

[1]
Rajarathinam B, Marrynal S Eastaff, " Network Security Issues In Cloud Computing, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 3, Issue 1, pp.1752-1756, January-February-2018.