A Survey on Cloud Security Issues
Foram Suthar1 , Samarat V.O. Khanna2 , Jignesh Patel3
Section:Survey Paper, Product Type: Journal Paper
Volume-7 ,
Issue-3 , Page no. 120-123, Mar-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i3.120123
Online published on Mar 31, 2019
Copyright © Foram Suthar, Samarat V.O. Khanna, Jignesh Patel . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
View this paper at Google Scholar | DPI Digital Library
How to Cite this Paper
- IEEE Citation
- MLA Citation
- APA Citation
- BibTex Citation
- RIS Citation
IEEE Style Citation: Foram Suthar, Samarat V.O. Khanna, Jignesh Patel, “A Survey on Cloud Security Issues,” International Journal of Computer Sciences and Engineering, Vol.7, Issue.3, pp.120-123, 2019.
MLA Style Citation: Foram Suthar, Samarat V.O. Khanna, Jignesh Patel "A Survey on Cloud Security Issues." International Journal of Computer Sciences and Engineering 7.3 (2019): 120-123.
APA Style Citation: Foram Suthar, Samarat V.O. Khanna, Jignesh Patel, (2019). A Survey on Cloud Security Issues. International Journal of Computer Sciences and Engineering, 7(3), 120-123.
BibTex Style Citation:
@article{Suthar_2019,
author = {Foram Suthar, Samarat V.O. Khanna, Jignesh Patel},
title = {A Survey on Cloud Security Issues},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {3 2019},
volume = {7},
Issue = {3},
month = {3},
year = {2019},
issn = {2347-2693},
pages = {120-123},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=3807},
doi = {https://doi.org/10.26438/ijcse/v7i3.120123}
publisher = {IJCSE, Indore, INDIA},
}
RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v7i3.120123}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=3807
TI - A Survey on Cloud Security Issues
T2 - International Journal of Computer Sciences and Engineering
AU - Foram Suthar, Samarat V.O. Khanna, Jignesh Patel
PY - 2019
DA - 2019/03/31
PB - IJCSE, Indore, INDIA
SP - 120-123
IS - 3
VL - 7
SN - 2347-2693
ER -
VIEWS | XML | |
1500 | 460 downloads | 222 downloads |
Abstract
Everyone is moving from traditional services towards various cloud-based services at minimal cost. People are commonly using data storing and virtualization services because of their advantages. Increase in the use of these services is indeed increasing the challenges for its security in the cloud environment. Hence, security of cloud data and challenges related to it becomes the priority in the domain of cyber security. Many researchers have published different papers and have conducted different surveys related to security of cloud-based services, but researches show certain gap between cloud issue and their solution, few of them address data security issue and rest have virtualization problem. Here an effort is made to cover all factors related to security issue, and it has been derived properly and in clear way, which gives proper view of clouds security and challenges. Security of cloud platform is a major concern as the treats and attacks are increasing with advancement in the domain.
Key-Words / Index Term
Cloud Computing, Security, Virtualization, Cloud services
References
[1] Dean, Jeffery, S. Ghemawat, “Map Reduce Simplified Data Processing on Large Clusters”, OSDI, 2008.
[2] Chen, Deyan, and Hong Zhao, "Data security and privacy protection issues in cloud computing", In the Proceedings of the 2012 International Conference on Computer Science and Electronics Engineering, Vol. 1, pp. 647-651, 2012.
[3] T. Chou, ”Security threats on cloud computing vulnerabilitie”, International Journal of Computer Science & Information Technology 5, no. 3 ,p: 79, 2013.
[4] S. Nuno, K. Gummadi, and R. Rodrigues. "Towards Trusted Cloud Computing." HotCloud 9, no. 9, p:3, 2009.
[5] S. Basu, A. Bardhan, K. Gupta, P. Saha, M. Pal, M. Bose, K. Basu, S. Chaudhury, and P. Sarkar, "Cloud computing security challenges & solutions-a survey", In the Proceedings of the 2018 IEEE 8th Annual Computing and Communication Workshop and Conference (CCWC), pp. 347-356, 2018.
[6] Goyal, Sumit. "Public vs private vs hybrid vs community-cloud computing: a critical review." , International Journal of Computer Network and Information Security 6, no. 3, p: 20, 2014.
[7] J. Wayne, and T. Grance. "Guidelines on security and privacy in public cloud computing." , 2011.
[8] K. Hashizume, D. Rosado, E. Fernández-Medina, and E. B. Fernandez. "An analysis of security issues for cloud computing." Journal of internet services and applications 4, no. 1, p:5, 2013.
[9] Mahalakshmi, B., and G. Suseendran. "An Analysis of Cloud Computing Issues on Data Integrity, Privacy and Its Current Solutions." In Data Management, Analytics and Innovation, Springer, Singapore, pp. 467-482., 2019.
[10] W. Hanqian, Y. Ding, CH. Winer, and L. Yao, "Network security for virtual machine in cloud computing", In the Proceedings of the 2010 5th International Conference on Computer Sciences and Convergence Information Technology, Seoul, pp. 18-21.
[11] Q. Wang, C. Wang, L. Jin, R. Kui, and L. Wenjing. "Enabling public verifiability and data dynamics for storage security in cloud computing." In European symposium on research in computer security, Springer, Berlin, Heidelberg, pp. 355-370, 2009.
[12] Z. Kazi, and S. Vrbsky. "Security attacks and solutions in clouds." In Proceedings of the 2010 1st international conference on cloud computing, pp. 145-156.
[13] J. Sen, "Security and privacy issues in cloud computing." In Cloud Technology: Concepts, Methodologies, Tools, and Applications, IGI Global pp. 1585-1630., 2015.
[14] S. Aguru, and B.MadhavaRao “Data Security In Cloud Computing Using RC6 Encryption and Steganography Algorithms” In International Journal of Scientific Research in Computer Science and Engineering, Vol.07, Issue.01, pp.6-9, 2019.
[15] Y. Patil, and P. Deshmukh “A Review: Mobile Cloud Computing: Its Challenges and Security” In International Journal of Scientific Research in Network Security and Communication, Vol.06, Issue.01, pp.11-13, 2018.