Cloud Computing Security: A Survey
Abstract
Today, the world of Internet and Information technology, which is turned into a crucial part of human life, is growing rapidly. In this direction, the needs of societies` members including: information security, fast processing, immediate & dynamic access and the most important one, cost saving have been taken into consideration. Security issues used to be the main challenge of the systems` users constantly. A crucial achievement, by which users` data are accessed broadly & comprehensively, is cloud computing and storage in clouds, but this requires establishing data security in a very reliable environment. Cloud based computing, as a new generation of computing infrastructure, was created to reduce the costs of hardware & software resource management and it`s success is due to it`s efficacy, flexibility and it`s security in comparison to other computing approaches. Supporting security of stored data is one of the difficulties and issues discussed in cloud computing field. Our goal is to understand present challenges and solutions in cloud based environment; furthermore, we investigate present algorithms, in terms of application`s speed both in cloud based environment and local networks.Downloads
References
A. Sangroya, “Towards Analyzing Data Security Risks In Cloud Computing Environments,” JULY, August 2010.
Ch. Modi, D. Patel, B. Borisaniya, H. Patel, A. Patel, and M. Rajarajan, “A Survey Of Intrusion Detection Techniques In Cloud,” Journal of Network and Computer Applications, pp. 42–57, 2013.
Grobauer, T. Walloschek, and E. Stocker, "Understanding Cloud Computing Vulnerabilities," IEEE Security and Privacy, vol. 99, 2010.
K. J. Harauz. “Data security in the world of cloud computing,” IEEE Computer and Reliability Society, 2010.
K. S. Wagh, R. Jathar, S. Bangar, and A. Bhakthadas, “Securing Data Transfer in Cloud Environment,” International Journal of Engineering Research and Applications, Vol. 4, pp. 189-193, 2014.
M. A. Morsy, J. Grundy, and I. Muller, “An Analysis of the Cloud Computing Security Problem,” In ProcApsec 2010 Cloud Workshop, 2010.
M. Firdhous, O. Ghazali, and S. Hassan, “Trust Management in Cloud Computing: A Critical Review,” International Journal on Advances in ICT for Emerging Regions, vol 04 (02), pp. 24 – 36, 2011.
P. Kresimir and H. Zeljko, "Cloud Computing Security Issues And Challenges," In PROC Third International Conference on Advances in Human-oriented and Personalized Mechanisms, Technologies, and Services, pp. 344-349, 2010.
S. Kumar, and N. K. Dogra, “Cloud Storage and its Secure Overlay Techniques,” International Journal of Engineering Research and Applications, Vol. 4, pp. 33-37, 2014.
S. Ramgovind, M. M. Eloff, and E. Smith, “The Management of Security in Cloud Computing,” In PROC 2010 IEEE International Conference on Cloud Computing, 2010.
S. S. Kumar R, “Data integrity proofs in cloud storage,” 2011.
S. SHARMA, and A. CHUGH, “Survey Paper on Cloud Storage Security,” International Journal of Innovative Research in Computer and Communication Engineering, vol. 1, 2013.
S. Subashini, and V. Kavitha, “A Survey on Security Issues in Service Delivery Models of Cloud Computing,” J Network ComputAppl doi:10.1016/j.jnca.2010.07.006, 2010.
T. Ch. Dai Yuefa, and Wu Bo, “Data Security Model for Cloud Computing,” pp. 21-22, 2009.
V. Gampala, “Data Security in Cloud Computing with Elliptic Curve Cryptography,” International Journal of Soft Computing and Engineering (IJSCE), vol.2, 2012.
Zh. Xiao, and Y. Xiao, “Security and Privacy in Cloud Computing,” IEEE COMMUNICATIONS SURVEYS and TUTORIALS, 2015.
I. M. Khalil, A. Khreishah, & M. Azeem, “Cloud Computing Security: A Survey,” Computers, 3, 1-35; doi:10.3390/computers3010001, 2014.
Copyright (c) 2015 Journal of Information Sciences and Computing Technologies
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
TRANSFER OF COPYRIGHT
JISCT is pleased to undertake the publication of your contribution to Journal of Information Sciences and Computing Technologies
The copyright to this article is transferred to JISCT(including without limitation, the right to publish the work in whole or in part in any and all forms of media, now or hereafter known) effective if and when the article is accepted for publication thus granting JISCT all rights for the work so that both parties may be protected from the consequences of unauthorized use.