Techniques for Future Enhancement for Security of Cloud Computing
Diksha Sagotra1 , Harjinder Kaur2
Section:Survey Paper, Product Type: Journal Paper
Volume-9 ,
Issue-9 , Page no. 52-58, Sep-2021
CrossRef-DOI: https://doi.org/10.26438/ijcse/v9i9.5258
Online published on Sep 30, 2021
Copyright © Diksha Sagotra, Harjinder Kaur . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
View this paper at Google Scholar | DPI Digital Library
How to Cite this Paper
- IEEE Citation
- MLA Citation
- APA Citation
- BibTex Citation
- RIS Citation
IEEE Style Citation: Diksha Sagotra, Harjinder Kaur, “Techniques for Future Enhancement for Security of Cloud Computing,” International Journal of Computer Sciences and Engineering, Vol.9, Issue.9, pp.52-58, 2021.
MLA Style Citation: Diksha Sagotra, Harjinder Kaur "Techniques for Future Enhancement for Security of Cloud Computing." International Journal of Computer Sciences and Engineering 9.9 (2021): 52-58.
APA Style Citation: Diksha Sagotra, Harjinder Kaur, (2021). Techniques for Future Enhancement for Security of Cloud Computing. International Journal of Computer Sciences and Engineering, 9(9), 52-58.
BibTex Style Citation:
@article{Sagotra_2021,
author = {Diksha Sagotra, Harjinder Kaur},
title = {Techniques for Future Enhancement for Security of Cloud Computing},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {9 2021},
volume = {9},
Issue = {9},
month = {9},
year = {2021},
issn = {2347-2693},
pages = {52-58},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=5395},
doi = {https://doi.org/10.26438/ijcse/v9i9.5258}
publisher = {IJCSE, Indore, INDIA},
}
RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v9i9.5258}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=5395
TI - Techniques for Future Enhancement for Security of Cloud Computing
T2 - International Journal of Computer Sciences and Engineering
AU - Diksha Sagotra, Harjinder Kaur
PY - 2021
DA - 2021/09/30
PB - IJCSE, Indore, INDIA
SP - 52-58
IS - 9
VL - 9
SN - 2347-2693
ER -
VIEWS | XML | |
432 | 734 downloads | 201 downloads |
Abstract
In cloud computing data and applications have been maintained using remote servers that is distributed and it utilizes internet. The main advantage of using cloud computing is that it allow user to use applications over the internet and also share files at any computer over the internet. The use of cloud computing has tremendous impact over the IT industry and also it provides efficient use of resources like bandwidth, storage and processing. As the growth of cloud computing increases many users interact with each other and security issues are arising. The cloud computing growth is hampered by these security issues. There are risks of data breach, data loss, unauthorized access, denial of services etc. In this paper the analysis cloud computing security issues and also surveyed various techniques that are used to handle cloud security.
Key-Words / Index Term
cloud computing, security
References
[1]. Ahram, T., Sargolzaei, A., Sargolzaei, S., Daniels, J., & Amaba, B. (2017). Blockchain Technology Innovations, (2016).
[2]. Bharadwaj, D. R., Bhattacharya, A., & Chakkaravarthy, M. (2019). Cloud Threat Defense - A Threat Protection and Security Compliance Solution. Proceedings - 7th IEEE International Conference on Cloud Computing in Emerging Markets, CCEM 2018, 95–99. https://doi.org/10.1109/CCEM.2018.00024
[3]. Biswas, K., & Technology, A. B. (2016). Securing Smart Cities Using Blockchain Technology. 2016 IEEE 18th International Conference on High Performance Computing and Communications; IEEE 14th International Conference on Smart City; IEEE 2nd International Conference on Data Science and Systems (HPCC/SmartCity/DSS), 1392–1393. https://doi.org/10.1109/HPCC-SmartCity-DSS.2016.0198
[4]. Chang, J. (2012). Reversible Fragile Database Watermarking Technology using Difference Expansion Based on SVR Prediction. https://doi.org/10.1109/IS3C.2012.179
[5]. Cui, A., Member, S., Chang, C. H., & Member, S. (2008). IP Watermarking Using Incremental Technology Mapping at Logic Synthesis Level, 27(9), 1565–1570.
[6]. D, F. J. (2017). Advanced Encryption Standard ( AES ) Security Enhancement using Hybrid Approach, 647–652.
[7]. Dai, Y., Zhang, L., & Yang, Y. (1845). A New Method of MPEG Video Watermarking Technology, 1(4), 1845–1847.
[8]. Deshpande, H. S., Karande, K. J., & Mulani, A. (2014). EFFICIENT IMPLEMENTATION OF AES ALGORITHM ON FPGA, 1895–1899.
[9]. Ecosystems, D. (2010). Design and Implementation of an Improved RSA Algorithm Yunfei Li, 390–393.
[10]. Egwutuoha, I. P., Chen, S., Levy, D., Selic, B., & Calvo, R. (2012). A proactive fault tolerance approach to High Performance Computing (HPC) in the cloud. Proceedings - 2nd International Conference on Cloud and Green Computing and 2nd International Conference on Social Computing and Its Applications, CGC/SCA 2012, 268–273. https://doi.org/10.1109/CGC.2012.22
[11]. Egwutuoha, I. P., Cheny, S., Levy, D., Selic, B., & Calvo, R. (2013). Energy efficient fault tolerance for high performance computing (HPC) in the cloud. IEEE International Conference on Cloud Computing, CLOUD, 762–769. https://doi.org/10.1109/CLOUD.2013.69
[12]. Elhouni, A., Elfgee, E., Isak, M. A., & Ben Ammer, K. (2014). Study of security mechanisms implemented in Cloud computing. 2014 World Congress on Computer Applications and Information Systems, WCCAIS 2014, (2). https://doi.org/10.1109/WCCAIS.2014.6916631
[13]. Galla, L. K., Koganti, V. S., & Nuthalapati, N. (2016). Implementation of RSA, 81–87.
[14]. Gordin, I., Graur, A., Potorac, A., & Balan, D. (2018). Security assessment of OpenStack cloud using outside and inside software tools. 2018 14th International Conference on Development and Application Systems, DAS 2018 - Proceedings, 170–174. https://doi.org/10.1109/DAAS.2018.8396091
[15]. Hahn, C., Kwon, H., & Hur, J. (2018). Toward Trustworthy Delegation: Verifiable Outsourced Decryption with Tamper-Resistance in Public Cloud Storage. IEEE International Conference on Cloud Computing, CLOUD, 2018–July, 920–923. https://doi.org/10.1109/CLOUD.2018.00136
[16]. Halpin, H., & Piekarska, M. (2017). 2017 European Introduction to Security and Privacy on the Blockchain. https://doi.org/10.1109/EuroSPW.2017.43
[17]. Hsu, F., & Wang, S. (2012). Dual-watermarking by QR-code Applications in Image Processing, 638–643. https://doi.org/10.1109/UIC-ATC.2012.91
[18]. Kong, W., Lei, Y., & Ma, J. (2018). Data security and privacy information challenges in cloud computing. International Journal of Computational Science and Engineering, 16(3), 215–218. https://doi.org/10.1504/IJCSE.2018.091772
[19]. Koo, J., Kim, Y. G., & Lee, S. H. (2019). Security Requirements for Cloud-based C4I Security Architecture. 2019 International Conference on Platform Technology and Service, PlatCon 2019 - Proceedings, 1–4. https://doi.org/10.1109/PlatCon.2019.8668963
[20]. Liu, J., & Zhao, J. (2016). Providing Proactive Fault Tolerance as a Service for Cloud Applications, 1–2. https://doi.org/10.1109/SERVICES.2016.26
[21]. Manzoor, S., Zhang, H., & Suri, N. (2018). Threat modeling and analysis for the cloud ecosystem. Proceedings - 2018 IEEE International Conference on Cloud Engineering, IC2E 2018, 278–281. https://doi.org/10.1109/IC2E.2018.00056
[22]. Matt, L. (1953). ELECTRONIC WATERMARKING?: THE FIRST 50 YEARS, 225–230.
[23]. Nie, W., Xiao, X., Wu, Z., Wu, Y., Shen, F., & Luo, X. (2018). The research of information security for the education cloud platform based on appscan technology. Proceedings - 5th IEEE International Conference on Cyber Security and Cloud Computing and 4th IEEE International Conference on Edge Computing and Scalable Cloud, CSCloud/EdgeCom 2018, 185–189. https://doi.org/10.1109/CSCloud/EdgeCom.2018.00040
[24]. Noorbasha, F., Divya, Y., Poojitha, M., Navya, K., Bhavishya, A., Rao, K. K., & Kishore, K. H. (2019). FPGA Design and Implementation of Modified AES Based Encryption and Decryption Algorithm, (6), 132–136.
[25]. Pir, R. M. (2016). Security improvement and Speed Monitoring of RSA Algorithm, 4(1), 195–200.
[26]. Ramamoorthy, S., & Poorvadevi, R. (2018). Security solution for hybrid cloud information management using fuzzy deductive systems. Proceedings of the International Conference on Smart Systems and Inventive Technology, ICSSIT 2018, (Icssit), 457–462. https://doi.org/10.1109/ICSSIT.2018.8748395
[27]. Shen, J., Zhou, T., He, D., Zhang, Y., Sun, X., & Xiang, Y. (2017). Block Design-based Key Agreement for Group Data Sharing in Cloud Computing. IEEE Transactions on Dependable and Secure Computing, 5971(c), 1–15. https://doi.org/10.1109/TDSC.2017.2725953
[28]. Soliman, S. M., Magdy, B., Abd, M. A., & Ghany, E. (2016). Efficient Implementation of the AES Algorithm for Security Applications, 206–210.
[29]. Vishal, V., & Johari, R. (2018). SOAiCE: Simulation of Attacks in Cloud Computing Environment. Proceedings of the 8th International Conference Confluence 2018 on Cloud Computing, Data Science and Engineering, Confluence 2018, 152–157. https://doi.org/10.1109/CONFLUENCE.2018.8442733
[30]. Wei, W. (2012). An Implementation of AES Algorithm Based on FPGA, (Fskd), 1615–1617.
[31]. Zhou, X., & Tang, X. (2011). Research and Implementation of RSA Algorithm for Encryption and Decryption, 1118–1121.