INFORMATION CHANGE THE WORLD

International Journal of Education and Management Engineering(IJEME)

ISSN: 2305-3623 (Print), ISSN: 2305-8463 (Online)

Published By: MECS Press

IJEME Vol.5, No.5, Oct. 2015

A Review of Cloud Computing Security Issues

Full Text (PDF, 443KB), PP.32-41


Views:93   Downloads:8

Author(s)

Manpreet kaur, Hardeep Singh

Index Terms

Cloud computing;cloud data storage;cloud data security;Deployment models;Service models;cloud security challenges

Abstract

Cloud computing is an emerging paradigm which has become today's hottest research area due to its ability to reduce the costs associated with computing. In today's era, it is most interesting and enticing technology which is offering the services to its users on demand over the internet. Since Cloud computing stores the data and its disseminated resources in the environment, security has become the main obstacle which is hampering the deployment of cloud environments. There are number of users used cloud to store their personal data, so that data storage security is required on the storage media. The major concern of cloud environment is security during upload the data on cloud server. Data storage at cloud server attracted incredible amount of consideration or spotlight from different communities. For outsourcing the data there is a need of third party. The importance of third party is to prevent and control unauthorized access to data store to the cloud. This research paper discuss the security issues of cloud storage.

Cite This Paper

Manpreet kaur, Hardeep Singh,"A Review of Cloud Computing Security Issues", International Journal of Education and Management Engineering(IJEME), Vol.5, No.5, pp.32-41, 2015.DOI: 10.5815/ijeme.2015.05.04

Reference

[1]Balachandra Reddy Kandukuri, Rama Krishna Paturi and Dr. AtanuRakshit, "Cloud security issues" In Services Computing, 2009. IEEE International Conference on, page 517520, 2009.

[2]Boldreva A., Chenette N., Lee Y, O'neill A. (2009), "Order-preserving Symmetric encryption", Advances in Cryptology-EUROCRYPT 2009 Springer, Berlin/Heidelberg, pp. 224-241. 

[3]Boneh D., Di G., Ostrovsky R., Persiano G. (2004), "Public key encryption with keyword search", Advances in Cryptology-Eurocrypt, Springer, Berlin/Heidelberg, pp 506–522.

[4]B.R kandukuri, R.Paturi V, and A.Rakshit, "cloud security issues",2009 IEEE International Conference on Services Computing, sep. 21-25, 2009, Bangalore, India, pp. 517-520.

[5]Campbell, Jeronimo, "Applied Virtualization Technology," Hillsboro, Intel Press (ISBN 09764832-3-8), 2006, pp. 69-73. 

[6]Chandrahasan, R. Kalaichelvi, S. Shanmuga Priya, and L. Arockiam. "Research Challenges and Security Issues in Cloud Computing." International Journal of Computational Intelligence and Information Security 3.3 (2012): 42-48.

[7]Chun-Ting Huang, Zhongyuan Qin, C.-C. Jay Kuo., "Multimedia Storage Security in Cloud Computing: an Overview" 978-1-457701434- 4/11/$26.00,IEEE,2011.

[8]Cloud Security Alliance, "Top Threats to Cloud Computing v1.0," Prepared by the Cloud Security Alliance, March 2010, pp. 1-14. 

[9]Cong.Wang and Kui Ren Wenjing Lou and Jin Li "Towards Publicity Auditable Secure Cloud Data Storage". Cong Wang, Qian Wang, Kui Ren, Wenjing Lou, "Privacy Preserving Public Auditing for Data Storage Security in , cloud Computing", 2010.

[10]Cong Wang, Qian Wang, KuiRen and Wenjing Lou, "Ensuring Data Storage Security in Cloud Computing", In Quality of Service, 2009. 17th International Workshop on, page 19, 2009.

[11]Dong Xin, et al."achieving secure and efficient data collaboration in cloud computing. "Quality of service, 2013 IEEE/ACM 21st International symposium on.IEEE,2013. 

[12]Dr.R.Manicka Chezian and C.bagyalakshmi "a survey on cloud data security Using encryption technique" in International journal of advanced research in computer engineering & technology , Volume 1, Issue 5, July 2012.

[13]Er.Rimmy Chuchra,Lovely Professional University,Phagwara, India, "Data Security in Cloud Computing", International Journal Nov.,2012.

[14]Feng-Tse Lin, Teng-San Shih, "Cloud Computing: The Emerging Computing Technology," ICIC Express Letters Part B: Applications (ISSN: 2185-2766), v1, September 2010, pp. 33-38.

[15]Foster, I. T., Zhao, Y., Raicu, I., & Lu, S. (2009). Cloud Computing and Grid Computing 360-Degree Compared CoRR. abs/0901.0131.

[16]G. Hughes, D. Al-Jumeily & A. Hussain," Supporting Cloud Computing Management through an Object Mapping Declarative Language", 2010 Developments in E-systems engineering.

[17]Hassan Takabi, James B. D. Joshi and Gail-JoonAhn, "Secure Cloud: Towards a Comprehensive Security Framework for Cloud Computing Environments" Proceedings of the 2010 IEEE 34th Annual Computer Software and Applications Conference Workshops, p.393-398, July 19-23, 2010.

[18]John Harauz, Lori M. Kaufman and Bruce Potter, "Data security in the world of cloud computing" published by the IEEE computer and reliability societies in July/August 2009.

[19]Jouni Mäenpää, "Cloud Computing with the Azure Platform," TKK T-110.5190 Seminar on Internet Working, April 27, 2009. 

[20]Kant, Dr Chander, and Yogesh Sharma. "Enhanced Security Architecture for Cloud Data Security." International Journal of Advanced Research in Computer Science and Software Engineering 3.5 (2013): 571-575.

[21]Meiko Jensen, JlorgSchwenk, Nils Gruschka and Luigi Lo Iacono, "On Technical Security Issues In Cloud Computing",IEEE International Conference on Cloud Computing,2009.

[22]Nabendu Chaki, "A Survey on Security issue in Cloud Computing " in 6th International conference on Electrical Engineering/Electronics, Computer, Telecommunication and Information Technology, May 2009.

[23]Rajkumar Buyya, Chee Shin Yeo, Srikumar Venugopal, James Broberg and Ivona Brandic, "Cloud Computing and Emerging IT Platforms: Vision, Hype, and Reality for Delivering Computing as the 5th Utility," Future Generation Computer System, 2009, pp. 599-616. 

[24]Ren K, Wang C, Wang Q (2012) Security challenges for the public cloud. IEEE Internet Comput 16(1):69–73.

[25]Tout, Sverdlik, and Lawver, "Cloud Computing and its Security in Higher Education," In Proceedings of the Proc ISECON 2009. 

[26]Vaquero, Merino and Lindner, "A Break in the Clouds: Towards a Cloud Definition," ACM SIGCOMM Computer Communication Review, v.39 n.1, January, 2009, pp. 50-55. 

[27]W. Zeng, Y. Zhao, K. Ou, and W. Song, "Research on cloud storage architecture and key technologies," in Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, Culture and Human, Seoul, Korea, 2009, pp. 1044-1048.

[28]Xia Z., Zhu Y., Sun X. and Chen L. (2014), "Secure semantic expansion based search over encrypted cloud data supporting similarity ranking "Journal of Cloud Computing",Springer 3.1, pp. 1-11.

[29]Yunqi Ye, Liangliang Xiao, I-Ling Yen, Farokh Bastani, "Secure, Dependable, and High Performance Cloud Storage", 2010 29th IEEE International Symposium on Reliable.

[30]www.academicroom.com/topics/cloud-computing