Cloud Computing Security: A Survey
AbstractToday, the world of Internet and Information technology, which is turned into a crucial part of human life, is growing rapidly. In this direction, the needs of societies` members including: information security, fast processing, immediate & dynamic access and the most important one, cost saving have been taken into consideration. Security issues used to be the main challenge of the systems` users constantly. A crucial achievement, by which users` data are accessed broadly & comprehensively, is cloud computing and storage in clouds, but this requires establishing data security in a very reliable environment. Cloud based computing, as a new generation of computing infrastructure, was created to reduce the costs of hardware & software resource management and it`s success is due to it`s efficacy, flexibility and it`s security in comparison to other computing approaches. Supporting security of stored data is one of the difficulties and issues discussed in cloud computing field. Our goal is to understand present challenges and solutions in cloud based environment; furthermore, we investigate present algorithms, in terms of application`s speed both in cloud based environment and local networks.
A. Sangroya, “Towards Analyzing Data Security Risks In Cloud Computing Environments,” JULY, August 2010.
Ch. Modi, D. Patel, B. Borisaniya, H. Patel, A. Patel, and M. Rajarajan, “A Survey Of Intrusion Detection Techniques In Cloud,” Journal of Network and Computer Applications, pp. 42–57, 2013.
Grobauer, T. Walloschek, and E. Stocker, "Understanding Cloud Computing Vulnerabilities," IEEE Security and Privacy, vol. 99, 2010.
K. J. Harauz. “Data security in the world of cloud computing,” IEEE Computer and Reliability Society, 2010.
K. S. Wagh, R. Jathar, S. Bangar, and A. Bhakthadas, “Securing Data Transfer in Cloud Environment,” International Journal of Engineering Research and Applications, Vol. 4, pp. 189-193, 2014.
M. A. Morsy, J. Grundy, and I. Muller, “An Analysis of the Cloud Computing Security Problem,” In ProcApsec 2010 Cloud Workshop, 2010.
M. Firdhous, O. Ghazali, and S. Hassan, “Trust Management in Cloud Computing: A Critical Review,” International Journal on Advances in ICT for Emerging Regions, vol 04 (02), pp. 24 – 36, 2011.
P. Kresimir and H. Zeljko, "Cloud Computing Security Issues And Challenges," In PROC Third International Conference on Advances in Human-oriented and Personalized Mechanisms, Technologies, and Services, pp. 344-349, 2010.
S. Kumar, and N. K. Dogra, “Cloud Storage and its Secure Overlay Techniques,” International Journal of Engineering Research and Applications, Vol. 4, pp. 33-37, 2014.
S. Ramgovind, M. M. Eloff, and E. Smith, “The Management of Security in Cloud Computing,” In PROC 2010 IEEE International Conference on Cloud Computing, 2010.
S. S. Kumar R, “Data integrity proofs in cloud storage,” 2011.
S. SHARMA, and A. CHUGH, “Survey Paper on Cloud Storage Security,” International Journal of Innovative Research in Computer and Communication Engineering, vol. 1, 2013.
S. Subashini, and V. Kavitha, “A Survey on Security Issues in Service Delivery Models of Cloud Computing,” J Network ComputAppl doi:10.1016/j.jnca.2010.07.006, 2010.
T. Ch. Dai Yuefa, and Wu Bo, “Data Security Model for Cloud Computing,” pp. 21-22, 2009.
V. Gampala, “Data Security in Cloud Computing with Elliptic Curve Cryptography,” International Journal of Soft Computing and Engineering (IJSCE), vol.2, 2012.
Zh. Xiao, and Y. Xiao, “Security and Privacy in Cloud Computing,” IEEE COMMUNICATIONS SURVEYS and TUTORIALS, 2015.
I. M. Khalil, A. Khreishah, & M. Azeem, “Cloud Computing Security: A Survey,” Computers, 3, 1-35; doi:10.3390/computers3010001, 2014.
Copyright (c) 2015 Journal of Information Sciences and Computing Technologies
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
TRANSFER OF COPYRIGHT
JISCT is pleased to undertake the publication of your contribution to Journal of Information Sciences and Computing Technologies
The copyright to this article is transferred to JISCT(including without limitation, the right to publish the work in whole or in part in any and all forms of media, now or hereafter known) effective if and when the article is accepted for publication thus granting JISCT all rights for the work so that both parties may be protected from the consequences of unauthorized use.
The copyright transfer covers the exclusive right to reproduce and distribute the article, including reprints, translations, photographic reproductions, microform, electronic form (offline, online) or any other reproductions of similar nature.
The author’s warrant that their contribution is an original work not published elsewhere, that they have the full power to make this grant and that the article contains no matter unlawful or which invades the right to privacy or infringes any proprietary right.
This Form must be signed by the lead author or, in the case of a "work made for hire," by the employer and must be received by JISCT before processing of the manuscript for publication can be completed.
Authors should understand that consistent with JISCT's policy of encouraging dissemination of information, each work published by JISCT appears with the JISCT copyright and the following notice:
"Intellectual properties and scientific inventions published with JISCT are protected under International and Federal Copyright Laws and Treaties. Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than JISCT must be honored. Abstracting with credit is permitted. To copy otherwise, to republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee."
However, it is at the discretion of JISCT if the copyright notice should be included in the published manuscript.
The JISCT copyright arrangements allow Cornell University Library non-exclusive and irrevocable license to distribute or certify that the work is available under JISCT license that conveys these rights.