security challenges faced in cloud computing environment

Main Article Content

eakta kumari

Abstract

Cloud computing is a forthcoming revolution in information technology (IT) industry because of its performance, accessibility, low cost and many other luxuries. Cloud computing is a model to provide convenient, on-demand access to a shared pool configurable computing resources. It provides gigantic storage for data and faster computing to customers over the internet. This paper gives an overview of cloud computing, and discusses related security challenges and some techniques to deal with them. There are many approaches which can be used to improve the security but no one provides better solution.

Downloads

Download data is not yet available.

Article Details

Section
Articles
Author Biography

eakta kumari, Central University of Haryana, INDIA

Assistant Professor, SOE&T

References

Zaigham Mahmood and Richard Hill, Cloud Computing for enterprise architectures, Springer,2011

Peter Mell and Tim Grance,â€The NIST definition of cloud computing†53(6):50, 2009. 7, 9

http://en.wikipedia.org/wiki/Cloud_computing

T. Dillon, Chen Wu, and E. Chang, “Cloud computing: Issues and challengesâ€,

In 2010 24th IEEE International Conference on Advanced Information Networking and Applications (AINA), pages 27 {33, April 2010.

Geva Perry. How cloud and utility computing are different, Feb 2008.

Amazon. Amazon Elastic Compute Cloud(EC2). <http://aws.amazon.com/ec2/>.

Joo Lee Hong . “Analysis of business attributes in information technology environmentsâ€. J Inform Process Syst 2011;7(2):385–96.

Yang Jian feng,Chen Zhi bin , â€Cloud computing research and security issuesâ€, 2010 IEEE international conference on advance information networking and application

T. Dillon, C. Wu, and E. Chang, “Cloud Computing: Issues and Challenges,†in Advanced Information Networking and Applications (AINA), 2010 24th IEEE International Conference , pp. 27–33.

B. Grobauer, T. Walloschek, and E. Stocker, “Understanding Cloud Computing

Vulnerabilities,†Security Privacy, IEEE, vol. 9, no. 2, pp. 50–57, Mar. 2011.

Dropbox’s Blog. Privacy, security & yourdropbox;2011.http://blog.dropbox.com/?p=735 > [retrieved 25.04.11].

Chunming Rong, S.T.Nguyen, M.G.Jaatun, “Beyond Lighting:A servey on security challenges in cloud computingâ€, Elsevier ;2012.

Eken Hamm,â€Security Threats and solutions in cloud computingâ€.IEEE 2013.

X. Li, X. Jiang, P. Huang, and K. Ye, Dartcsim: An enhanced user-friendly cloud simulation system based on cloudsim with better performance," in Cloud Computing and Intelligent Systems (CCIS), 2012 IEEE 2nd Interna- tional Conference on, vol. 1, pp. 392{396, IEEE, 2012.

A. Li, X. Yang, S. Kandula, and M. Zhang, Cloudcmp: comparing public cloud providers," in Proceedings of the 10th ACM SIGCOMM conference on Internet measurement, pp. 1{14, ACM, 2010.

R Madhubala. An illustrative study on cloud computing. International journal of soft computing and engineering, 1(6):286{290, 2012.

Feng Zhao,Chao Li,Chun Feng liu,â€A cloud computing security solution based on fully homomorphic encryptionâ€.feb,19,2014.

R. L. Rivest, L. Adleman, and M. L. Dertouzos, On data banks and privacy homomorphisms," Foundations of secure computation, vol. 4, no. 11, pp. 169-180, 1978.

T. ElGamal, A public key cryptosystem and a signature scheme based on discrete logarithms," in Advances in Cryptology, pp. 10{18, Springer, 1985.

P. Paillier, Public-key cryptosystems based on composite degree residuosity classes," in Advances in cryptology EUROCRYPT99, pp. 223-238, Springer,1999.

C. Gentry, A fully homomorphic encryption scheme. PhD thesis, Stanford University, 2009.