INTERNATIONAL RESEARCH JOURNAL OF SCIENCE ENGINEERING AND TECHNOLOGY

( Online- ISSN 2454 -3195 ) New DOI : 10.32804/RJSET

Impact Factor* - 6.2311


**Need Help in Content editing, Data Analysis.

Research Gateway

Adv For Editing Content

   No of Download : 192    Submit Your Rating     Cite This   Download        Certificate

CLOUD COMPUTING AND ITS SECURITY CHALLENGES & ISSUES

    1 Author(s):  DR. D. SRINIVAS

Vol -  6, Issue- 2 ,         Page(s) : 79 - 87  (2016 ) DOI : https://doi.org/10.32804/RJSET

Abstract

Cloud Computing is an emerging paradigm which has become today’s hottest research area due to its ability to reduce the costs associated with computing. In today’s era, it is most interesting and enticing technology which is offering the services to its users on demand over the internet. Since Cloud computing stores the data and its disseminated resources in the environment, security has become the main obstacle which is hampering the deployment of cloud environments. There are number of users used cloud to store their personal data, so that data storage security is required on the storage media. The major concern of cloud environment is security during upload the data on cloud server. Data storage at cloud server attracted incredible amount of consideration or spotlight from different communities. For outsourcing the data there is a need of third party. The importance of third party is to prevent and control unauthorized access to data store to the cloud. This research paper discuss the security issues of cloud storage.

  1. Boldreva A., Chenette N., Lee Y, O’neill A.  (2009),  “Order-preserving  Symmetric  encryption”,
  2. Advances in Cryptology-EUROCRYPT 2009 Springer, Berlin/Heidelberg, pp. 224-241.
  3. Boneh D., Di G., Ostrovsky R., Persiano G. (2004), “Public key encryption with keyword search”, Advances in Cryptology-Eurocrypt, Springer, Berlin/Heidelberg, pp 506–522.
  4. B.R kandukuri, R.Paturi V, and A.Rakshit, “cloud security issues”,2009 IEEE International Conference on Services Computing, sep. 21-25, 2009, Bangalore, India, pp. 517-520.
  5. Campbell, Jeronimo, “Applied Virtualization Technology,” Hillsboro, Intel Press (ISBN 09764832-3-8), 2006, pp. 69-73.
  6. Chandrahasan, R. Kalaichelvi, S. Shanmuga Priya, and L. Arockiam. "Research Challenges and Security Issues in Cloud Computing." International Journal of Computational Intelligence and Information Security 3.3 (2012): 42-48.
  7. Chun-Ting Huang, Zhongyuan Qin, C.-C. Jay Kuo., “Multimedia Storage Security in Cloud
  8. Computing: an Overview” 978-1-457701434- 4/11/$26.00,IEEE,2011.
  9. Cloud Security Alliance, “Top Threats to Cloud Computing v1.0,” Prepared by the Cloud Security
  10. Alliance, March 2010, pp. 1-14.
  11. Dong Xin, et al.”Achieving secure and efficient data collaboration in cloud computing. ”Quality of service, 2013 IEEE/ACM 21st International symposium on.IEEE,2013.
  12. Feng-Tse  Lin,  Teng-San Shih,  “Cloud  Computing:  The  Emerging Computing Technology,”  ICIC
  13. Express Letters Part B: Applications (ISSN: 2185-2766), v1, September 2010, pp. 33-38.
  14. Foster, I. T., Zhao, Y., Raicu, I., & Lu, S. (2009). Cloud Computing and Grid Computing 360-Degree Compared CoRR. abs/0901.0131.
  15. G. Hughes, D. Al-Jumeily & A. Hussain,” Supporting Cloud Computing Management through an Object Mapping Declarative Language”, 2010 Developments in E-systems engineering.
  16. Jouni Mäenpää, “Cloud Computing with the Azure Platform,” TKK T-110.5190 Seminar on Internet Working, April 27, 2009.
  17. Kant, Dr Chander, and Yogesh Sharma. "Enhanced Security Architecture for Cloud Data Security." International Journal of Advanced Research in Computer Science and Software Engineering 3.5 (2013): 571-575.
  18. Rajkumar Buyya, Chee Shin Yeo, Srikumar Venugopal, James Broberg and Ivona Brandic, “Cloud
  19. Computing and Emerging IT Platforms: Vision, Hype, and Reality for Delivering Computing as the 5th Utility,” Future Generation Computer System, 2009, pp. 599-616.
  20. Ren K, Wang C, Wang Q (2012) Security challenges for the public cloud. IEEE Internet Computation 16(1):69–73.
  21. Tout, Sverdlik, and Lawver, “Cloud Computing and its Security in Higher Education,” In proceedings of the Proc ISECON 2009.
  22. Vaquero, Merino and Lindner, “A Break in the Clouds: Towards a Cloud Definition,” ACM
  23. SIGCOMM Computer Communication Review, v.39 n.1, January, 2009, pp. 50-55.
  24. W. Zeng, Y. Zhao, K. Ou, and W. Song, "Research on cloud storage architecture and key technologies," in Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, Culture and Human, Seoul, Korea, 2009, pp. 1044-1048.
  25. Xia Z., Zhu Y., Sun X. and Chen L. (2014), "Secure semantic expansion based search over encrypted cloud data supporting similarity ranking "Journal of Cloud Computing”, Springer 3.1, pp. 1-11.
  26. Yunqi Ye, Liangliang Xiao, I-Ling Yen, Farokh Bastani, “Secure, Dependable, and High Performance Cloud Storage”, 2010 29th IEEE International Symposium on Reliable.

*Contents are provided by Authors of articles. Please contact us if you having any query.






Bank Details