Security Issues and Solutions in Cloud Storage as a Service : A Review
Keywords:
Cloud Computing, Storage as a Service, Encryption TechniquesAbstract
Cloud computing (CC) is a fast growing business considering its attractive features and undeniable advantages at an affordable cost. The boon of immense flexibility, accessibility and availability of data of individual customers comes with attached security concerns. This review paper briefly introduces existing types of cloud services with emphasis on storage of data offered as a service. Data security is a big concern that can be detrimental to the growth of cloud users. The security issues in present day cloud storage have been reviewed. New cryptographic technique is proposed to enhance security with increased speed.
References
- http://searchcloudcomputing.techtarget.com/definition/cloud-computing accessed on: 27 Nov 2017
- https://azure.microsoft.com/en-in/overview/what-is-cloud-computing/ accessed on: 30 Nov 2017
- https://aws.amazon.com/what-is-cloud-storage/ accessed on: 30 Nov 2017
- http://searchstorage.techtarget.com/definition/Storage-as-a-Service-SaaS accessed on: 8 Nov 2017
- https://digitalguardian.com/blog/6-security-risks-enterprises-using-cloud-storage-and-file-sharing-apps accessed on: 30 Nov 2017
- https://www.infoworld.com/article/3041078/security/the-dirty-dozen-12-cloud-security-threats.html accessed on 18 Nov 2017
- Naresh vurukonda, and B.Thirumala Rao, “A Study on Data Storage Security Issues in Cloud Computing” in 2nd International Conference on Intelligent Computing, Communication & Convergence, ICCC - 2016, Bhubaneswar, Odisha, India
- Balkees Mohamed Shereek, ZaitonMuda, and SharifahYasin, “Improve Cloud Computing Security Using RSA Encryption With Fermat’s Little Theorem” in IOSR Journal of Engineering, Vol. 04, Issue 02 (February. 2014), ||V6|| PP 01-08
- https://securosis.com/blog/cloud-data-security-archive-and-delete-rough-cut accessed on: 06 Dec 2017
- https://www.veracode.com/security/byod-security accessed on: 11 Dec 2017
- https://www.joyent.com/blog/cloud-security-the-challenges-with-key-management-in-the-cloud-and-everywhere-else accessed on: 11 Dec 2017
- Atulay Mahajan, and Sangeeta Sharma, “The Malicious Insiders Threat in the Cloud” in International Journal of Engineering Research and General Science Volume 3, Issue 2, Part 2, March-April 2015
- https://www.sam-solutions.com/blog/top-5-tips-for-cloud-computing-security/ accessed on: 11 Dec 2017
- Ashima Pansotra, and Simar Preet Singh, “Cloud Security Algorithms” in International Journal of Security and Its Applications Vol.9, No.10 (2015), pp.353-360
- https://brilliant.org/wiki/fermats-little-theorem/ accessed on: 12 Dec 2017
Downloads
Published
Issue
Section
License
Copyright (c) IJSRCSEIT

This work is licensed under a Creative Commons Attribution 4.0 International License.