Network Security Issues In Cloud Computing
Keywords:
Security issues for clouds, Cloud Computing Challenges, and Security Problem SpaceAbstract
Today, cloud computing is a rising way of computing in computer knowledge. Cloud computing is a set of possessions and services that are on hand by the network or internet. Cloud computing extend a variety of computing techniques like grid compute, distributed computing. Today cloud computing is used in both industrial pasture and educational field. As the meadow of cloud computing is scattering the new technique are increasing. This amplifies in cloud computing location also increases security challenges for cloud developers. Users of confuse save their data in the shade hence the lack of security in cloud can lose the user’s trust. In this paper we will discuss some of the cloud security issue in a mixture of aspects like multi-tenancy, stretch, accessibility etc. the paper also argue existing security technique and approaches for a protected cloud.
References
- Akhil Behl (2011), Emerging Security Challenges in Cloud Computing (An insight to Cloud security challenges and their mitigation).
- Bertino, E. (2002). Access Control for XML Docu- ments. Data & Knowledge Engineering, 43(3).
- Bertino, E. (2004). Selective and Authentic Third Party Distribution of XML Documents. IEEE Transactions on Knowledge and Data Engineering, 16(10). doi:10.1109/TKDE.2004.63
- DeVries, B. W., Gupta, G., Hamlen, K. W., Moore, S., & Sridhar, M. (2009). ActionScript Bytecode Verifi- cation with Co-Logic Programming. In Proceedings of the ACM SIGPLAN Workshop on Programming Languages and Analysis for Security (PLAS).
- Arijit Ukil, Debasish Jana and Ajanta De Sarkar” A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE “International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.5, September 2013 DOI: 10.5121/ijnsa.2013.5502 11.
- Rabi Prasad Padhy, Manas Ranjan Patra and Suresh Chandra Satapathy ,” Cloud Computing: Security Issues and Research Challenges”, IRACST - International Journal of Computer Science and Information Technology & Security (IJCSITS) Vol. 1, No. 2, December 2011.
- Kashif Munir and Prof Dr. Sellapan Palaniappan," FRAMEWORK FOR SECURE CLOUD COMPUTING ", International Journal on Cloud Computing: Services and Architecture (IJCCSA), Vol.3, No.2, April 2013.
- J. Brodkin. (2008, Jun.). “Gartner: Seven cloud-computing security risks.” Infoworld , Available: <http://www.infoworld.com/d/security-central/gartner-seven-cloudcomputing- security-risks-853?page=0,1> [Mar. 13, 2009].
- Arjun Kumar, Byung Gook Lee, HoonJae Lee, Anu Kumari, “Secure Storage and Access of Data in Cloud Computing”, 2012 International Conference on ICT Convergence (ICTC), 15-17 Oct. 2012
- Uma Somani, Kanika Lakhani, Manish Mundra, “Implementing Digital Signature with RSA Encryption Algorithm to Enhance the Data Security of Cloud in Cloud Computing”, 1st International Conference on Parallel, Distributed and Grid Computing (PDGC - 2010).
- V.Nirmala, R.K.Sivanandhan, Dr.R.Shanmuga Lakshmi, “Data Confidentiality and Integrity Verification usingUser Authenticator scheme in cloud”, Proceedings of 2013 International Conference on Green High Performance Computing (ICGHPC 2013). March 14-15, 2013, India.
- Sultan Aldossary, William Allen, “Data Security, Privacy, Availability and Integrity in Cloud Computing: Issues and Current Solutions”, in International Journal of Advanced Computer Science and Applications, Vol. 7, No. 4, 2016
- Kuyoro S. O., Ibikunle F. & Awodele O. International Journal of Computer Networks (IJCN), Volume (3) : Issue (5) : 2011 254
- Cloud Computing Use Case Discussion Group. "Cloud Computing UseCases Version 3.0," 2010.
- Streitberger W. Ruppel, A.: Cloud computing security - protection goals, taxon- omy, market review. Tech. rep., Institute for Secure Information Technology SIT (2010)
- Abi Haidar, D., Cuppens-Boulahia, N., Cuppens, F., Debar, H.: XeNA: an access negotiation framework using XACML. Annals
Downloads
Published
Issue
Section
License
Copyright (c) IJSRCSEIT

This work is licensed under a Creative Commons Attribution 4.0 International License.