Cloud Computing Security: A Survey

  • Elaheh Golzardi Department of Electrical and Electronic Engineering, Kurdistan PNU, Iran
Keywords: Cloud Computing, Decryption, Encryption.

Abstract

Today, the world of Internet and Information technology, which is turned into a crucial part of human life, is growing rapidly. In this direction, the needs of societies` members including: information security, fast processing, immediate & dynamic access and the most important one, cost saving have been taken into consideration. Security issues used to be the main challenge of the systems` users constantly. A crucial achievement, by which users` data are accessed broadly & comprehensively, is cloud computing and storage in clouds, but this requires establishing data security in a very reliable environment. Cloud based computing, as a new generation of computing infrastructure, was created to reduce the costs of hardware & software resource management and it`s success is due to it`s efficacy, flexibility and it`s security in comparison to other computing approaches. Supporting security of stored data is one of the difficulties and issues discussed in cloud computing field. Our goal is to understand present challenges and solutions in cloud based environment; furthermore, we investigate present algorithms, in terms of application`s speed both in cloud based environment and local networks.

Downloads

Download data is not yet available.

References

A. Sangroya, “Towards Analyzing Data Security Risks In Cloud Computing Environments,” JULY, August 2010.

Ch. Modi, D. Patel, B. Borisaniya, H. Patel, A. Patel, and M. Rajarajan, “A Survey Of Intrusion Detection Techniques In Cloud,” Journal of Network and Computer Applications, pp. 42–57, 2013.

Grobauer, T. Walloschek, and E. Stocker, "Understanding Cloud Computing Vulnerabilities," IEEE Security and Privacy, vol. 99, 2010.

K. J. Harauz. “Data security in the world of cloud computing,” IEEE Computer and Reliability Society, 2010.

K. S. Wagh, R. Jathar, S. Bangar, and A. Bhakthadas, “Securing Data Transfer in Cloud Environment,” International Journal of Engineering Research and Applications, Vol. 4, pp. 189-193, 2014.

M. A. Morsy, J. Grundy, and I. Muller, “An Analysis of the Cloud Computing Security Problem,” In ProcApsec 2010 Cloud Workshop, 2010.

M. Firdhous, O. Ghazali, and S. Hassan, “Trust Management in Cloud Computing: A Critical Review,” International Journal on Advances in ICT for Emerging Regions, vol 04 (02), pp. 24 – 36, 2011.

P. Kresimir and H. Zeljko, "Cloud Computing Security Issues And Challenges," In PROC Third International Conference on Advances in Human-oriented and Personalized Mechanisms, Technologies, and Services, pp. 344-349, 2010.

S. Kumar, and N. K. Dogra, “Cloud Storage and its Secure Overlay Techniques,” International Journal of Engineering Research and Applications, Vol. 4, pp. 33-37, 2014.

S. Ramgovind, M. M. Eloff, and E. Smith, “The Management of Security in Cloud Computing,” In PROC 2010 IEEE International Conference on Cloud Computing, 2010.

S. S. Kumar R, “Data integrity proofs in cloud storage,” 2011.

S. SHARMA, and A. CHUGH, “Survey Paper on Cloud Storage Security,” International Journal of Innovative Research in Computer and Communication Engineering, vol. 1, 2013.

S. Subashini, and V. Kavitha, “A Survey on Security Issues in Service Delivery Models of Cloud Computing,” J Network ComputAppl doi:10.1016/j.jnca.2010.07.006, 2010.

T. Ch. Dai Yuefa, and Wu Bo, “Data Security Model for Cloud Computing,” pp. 21-22, 2009.

V. Gampala, “Data Security in Cloud Computing with Elliptic Curve Cryptography,” International Journal of Soft Computing and Engineering (IJSCE), vol.2, 2012.

Zh. Xiao, and Y. Xiao, “Security and Privacy in Cloud Computing,” IEEE COMMUNICATIONS SURVEYS and TUTORIALS, 2015.

I. M. Khalil, A. Khreishah, & M. Azeem, “Cloud Computing Security: A Survey,” Computers, 3, 1-35; doi:10.3390/computers3010001, 2014.

Published
2015-10-27
How to Cite
Golzardi, E. (2015). Cloud Computing Security: A Survey. Journal of Information Sciences and Computing Technologies, 5(1), 377-385. Retrieved from http://scitecresearch.com/journals/index.php/jisct/article/view/363
Section
Articles