Cloud Security Issues, Techniques and Concerns – An Overview
V. Negi1
Section:Review Paper, Product Type: Journal Paper
Volume-7 ,
Issue-1 , Page no. 610-614, Jan-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i1.610614
Online published on Jan 31, 2019
Copyright © V. Negi . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
View this paper at Google Scholar | DPI Digital Library
How to Cite this Paper
- IEEE Citation
- MLA Citation
- APA Citation
- BibTex Citation
- RIS Citation
IEEE Style Citation: V. Negi, “Cloud Security Issues, Techniques and Concerns – An Overview,” International Journal of Computer Sciences and Engineering, Vol.7, Issue.1, pp.610-614, 2019.
MLA Style Citation: V. Negi "Cloud Security Issues, Techniques and Concerns – An Overview." International Journal of Computer Sciences and Engineering 7.1 (2019): 610-614.
APA Style Citation: V. Negi, (2019). Cloud Security Issues, Techniques and Concerns – An Overview. International Journal of Computer Sciences and Engineering, 7(1), 610-614.
BibTex Style Citation:
@article{Negi_2019,
author = {V. Negi},
title = {Cloud Security Issues, Techniques and Concerns – An Overview},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {1 2019},
volume = {7},
Issue = {1},
month = {1},
year = {2019},
issn = {2347-2693},
pages = {610-614},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=3553},
doi = {https://doi.org/10.26438/ijcse/v7i1.610614}
publisher = {IJCSE, Indore, INDIA},
}
RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v7i1.610614}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=3553
TI - Cloud Security Issues, Techniques and Concerns – An Overview
T2 - International Journal of Computer Sciences and Engineering
AU - V. Negi
PY - 2019
DA - 2019/01/31
PB - IJCSE, Indore, INDIA
SP - 610-614
IS - 1
VL - 7
SN - 2347-2693
ER -
VIEWS | XML | |
304 | 244 downloads | 131 downloads |
Abstract
Among cloud computing resources like networks, servers, storage, applications and services, Storage is one of the major resource that is being used at large by the cloud users. Small to mid-sized business houses use Storage-as-a-Service to enhance business availability and reliability, managing backups and to extenuate risks involved in disaster recovery. Security, therefore, becomes the most critical aspect due to the confidential and intimate information being stored on the public cloud. In public cloud, since the services are being provided by the third party service providers, which are geographically dispersed and involve resources outside the user’s premises, the three service models (IaaS, PaaS, SaaS) face serious security threats. Public cloud can fall prey to threats like Data breaches, insufficient identity, insecure APIs, system vulnerabilities, account hijacking, malicious insiders, data loss, insufficient due diligence, DoS and abuse of cloud services. This paper presents a review on the most pressing security issues within cloud computing, the techniques that can be employed in addressing such cloud security issues and the challenges.
Key-Words / Index Term
Cloud Computing, Security Issues, Cloud Security, Cloud Data Storage Security
References
[1] G. Vandana T. et al, “Improve Security of Data Access in Cloud Computing using Location”, International Journal of Computer Science and Mobile Computing, Vol.4 Issue.2, February-2015.
[2] P. Xul, et al, “SSDS-MC: Slice-based Secure Data Storage in MultiCloud Environment”, In the Proceedings of the 11th EAI International Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness (QSHINE 2015) pp. 304-309, 2015.
[3] N. Jose, C. Kanmani A, “Data Security Mode Enhancement in Cloud Environment”, Journal of Computer Engineering Vol. 10, Issue 2, 2013.
[4] V. R. Balasaraswathi, S. Manikandan, “Enhanced security for multi-cloud storage using cryptographic data splitting with dynamic approach”, In the Proceedings of the 2014 IEEE Advanced Communication, Control and Computing Technologies (ICACCCT 2014), pp. 1190-1194, 2014.
[5] S. Ajoudanian, M. R. Ahmadi, “A Novel Data Security Model for Cloud Computing”, International Journal of Engineering and Technology, Vol.4, No.3, June 2012.
[6] B. Fabian et al, “Collaborative and secure sharing of healthcare data in multi-clouds”, Information Systems, Vol. 48, pp. 132-150, 2015.
[7] D. Manivannan, R. Sujarani, “Light Weight and Secure Database Encryption using Tsfs Algorithm”, In the Proceedings of the Second International Conference on Computing Communication and Networking Technologies, Karur, pp. 1-7, 2010.
[8] Mazhar Ali, et al, “SeDaSC: Secure Data Sharing in Clouds”, Systems Journal, IEEE pp 1-10, 2014.
[9] V. Negi, M. Kalra, “Optimizing Battery Utilization and Reducing Time Consumption in Smartphones Exploiting the Power of Cloud Computing”, In the Proceedings of the Second International Conference on Soft Computing for Problem Solving (SocProS 2012), New Delhi, India, pp. 865-872, 2012.
[10] V. Negi, M. Kalra, “Framework for energy saving in the Android smartphone”, 2013 2nd International Conference on Information Management in the Knowledge Economy, India, pp. 161-165, 2013.
[11] J. Gantz, P. Miller, “The Salesforce Economy: Enabling 1.9 Million New Jobs and $389 Billion in New Revenue Over the Next Five Years”, IDC Whitepaper, IDC #US41691316, September 2016.
[12] L. Goasduff, C. Pettey, “Worldwide Public Cloud Services Market to Grow 18 Percent in 2017”, Gartner Press Releases, Stamford, February 22, 2017.
[13] J. M. Brook, et al, “The Treacherous 12 - Top Threats to Cloud Computing and Industry Insights”, Cloud Security Alliance, 2017.
[14] R. V. Dharmadhikari, et al, “Cloud Computing: Data Storage Protocols and Security Techniques”, International Journal of Scientific Research in Computer Science and Engineering, Vol.6, Issue.2, pp.113-118, 2018.
[15] Yogita G. Patil, Pooja S. Deshmukh, "A Review: Mobile Cloud Computing: Its Challenges and Security", International Journal of Scientific Research in Network Security and Communication, Vol.06, Issue.01, pp.11-13, 2018.