security challenges faced in cloud computing environment
Main Article Content
Abstract
Downloads
Article Details
COPYRIGHT
Submission of a manuscript implies: that the work described has not been published before, that it is not under consideration for publication elsewhere; that if and when the manuscript is accepted for publication, the authors agree to automatic transfer of the copyright to the publisher.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work
- The journal allows the author(s) to retain publishing rights without restrictions.
- The journal allows the author(s) to hold the copyright without restrictions.
References
Zaigham Mahmood and Richard Hill, Cloud Computing for enterprise architectures, Springer,2011
Peter Mell and Tim Grance,â€The NIST definition of cloud computing†53(6):50, 2009. 7, 9
http://en.wikipedia.org/wiki/Cloud_computing
T. Dillon, Chen Wu, and E. Chang, “Cloud computing: Issues and challengesâ€,
In 2010 24th IEEE International Conference on Advanced Information Networking and Applications (AINA), pages 27 {33, April 2010.
Geva Perry. How cloud and utility computing are different, Feb 2008.
Amazon. Amazon Elastic Compute Cloud(EC2). <http://aws.amazon.com/ec2/>.
Joo Lee Hong . “Analysis of business attributes in information technology environmentsâ€. J Inform Process Syst 2011;7(2):385–96.
Yang Jian feng,Chen Zhi bin , â€Cloud computing research and security issuesâ€, 2010 IEEE international conference on advance information networking and application
T. Dillon, C. Wu, and E. Chang, “Cloud Computing: Issues and Challenges,†in Advanced Information Networking and Applications (AINA), 2010 24th IEEE International Conference , pp. 27–33.
B. Grobauer, T. Walloschek, and E. Stocker, “Understanding Cloud Computing
Vulnerabilities,†Security Privacy, IEEE, vol. 9, no. 2, pp. 50–57, Mar. 2011.
Dropbox’s Blog. Privacy, security & yourdropbox;2011.http://blog.dropbox.com/?p=735 > [retrieved 25.04.11].
Chunming Rong, S.T.Nguyen, M.G.Jaatun, “Beyond Lighting:A servey on security challenges in cloud computingâ€, Elsevier ;2012.
Eken Hamm,â€Security Threats and solutions in cloud computingâ€.IEEE 2013.
X. Li, X. Jiang, P. Huang, and K. Ye, Dartcsim: An enhanced user-friendly cloud simulation system based on cloudsim with better performance," in Cloud Computing and Intelligent Systems (CCIS), 2012 IEEE 2nd Interna- tional Conference on, vol. 1, pp. 392{396, IEEE, 2012.
A. Li, X. Yang, S. Kandula, and M. Zhang, Cloudcmp: comparing public cloud providers," in Proceedings of the 10th ACM SIGCOMM conference on Internet measurement, pp. 1{14, ACM, 2010.
R Madhubala. An illustrative study on cloud computing. International journal of soft computing and engineering, 1(6):286{290, 2012.
Feng Zhao,Chao Li,Chun Feng liu,â€A cloud computing security solution based on fully homomorphic encryptionâ€.feb,19,2014.
R. L. Rivest, L. Adleman, and M. L. Dertouzos, On data banks and privacy homomorphisms," Foundations of secure computation, vol. 4, no. 11, pp. 169-180, 1978.
T. ElGamal, A public key cryptosystem and a signature scheme based on discrete logarithms," in Advances in Cryptology, pp. 10{18, Springer, 1985.
P. Paillier, Public-key cryptosystems based on composite degree residuosity classes," in Advances in cryptology EUROCRYPT99, pp. 223-238, Springer,1999.
C. Gentry, A fully homomorphic encryption scheme. PhD thesis, Stanford University, 2009.