Main Article Content

Gagandeep Kaur


In today’s era, cloud computing becomes the hottest topic due to its ability to reduce the cost associated with computing. Cloud computing provides the on-demand services like storage, servers, resources etc. to the users without physically acquiring them and the payment is according to pay per use. Since cloud provides the storage, reduces the managing cost and time for an organization to the user but security and confidentiality become one of the biggest obstacles in front of us. The major problem with cloud environment is the number of the user is uploading their data on cloud storage so sometimes due to lack of security, there may be chances of loss of confidentiality. To overcome these obstacles a third party is required to prevent data, data encryption, and integrity and control unauthorized access to data storage to the cloud. Cloud portability becomes critical in the situation of loss of confidentiality. To optimize better results we will review some paper and find the better results to remove the security barriers.


Download data is not yet available.

Article Details




X. Yu, “Intelligent Urban Traffic Management System Based on Cloud Computing and Internet of Things,†pp. 2169–2172, 2012.

B. Mills, T. Znati, and R. Melhem, “Shadow Computing: An energy-aware fault tolerant computing model,†2014 Int. Conf. Comput. Netw. Commun., pp. 73–77, 2014.

V. M. Sivagami, “Survey on Fault Tolerance Techniques in Cloud Computing Environment,†no. 9, pp. 419–425, 2015.

R. Jhawar, V. Piuri, and M. Santambrogio, “A Comprehensive Conceptual System-Level Approach to Fault Tolerance in Cloud Computing,†pp. 0–4, 2012.

C. A. Chen, M. Won, R. Stoleru, and G. G. Xie, “Energy-efficient fault-tolerant data storage and processing in mobile cloud,†IEEE Trans. Cloud Comput., vol. 3, no. 1, pp. 28–41, 2015.

S. S. Lakshmi, “Fault Tolerance in Cloud Computing,†vol. 04, no. 01, pp. 1285–1288, 2013.

R. Buyya, C. S. Yeo, and S. Venugopal, “Market-oriented cloud computing: Vision, hype, and reality for delivering IT services as computing utilities,†Proc. - 10th IEEE Int. Conf. High Perform. Comput. Commun. HPCC 2008, pp. 5–13, 2008.

Z. Xiao, W. Song, and Q. Chen, “Dynamic Resource Allocation Using Virtual Machines for Cloud Computing Environment,†IEEE Trans. Parallel Distrib. Syst., vol. 24, no. 6, pp. 1107–1117, Jun. 2013.

U. Wajid, C. Cappiello, P. Plebani, B. Pernici, N. Mehandjiev, M. Vitali, M. Gienger, K. Kavoussanakis, D. Margery, D. G. Perez, and P. Sampaio, “On Achieving Energy Efficiency and Reducing CO 2 Footprint in Cloud Computing,†vol. 7161, no. c, 2015.

Y. Xie, H. Wen, B. Wu, Y. Jiang, and J. Meng, “Transactions on Cloud Computing,†vol. 13, no. 9, 2015.

D. Ardagna, G. Casale, M. Ciavotta, J. F. Pérez, and W. Wang, “Quality-of-service in cloud computing : modeling techniques and their applications,†pp. 1–17, 2014.

M. Armbrust, I. Stoica, M. Zaharia, A. Fox, R. Griffith, A. D. Joseph, R. Katz, A. Konwinski, G. Lee, D. Patterson, and A. Rabkin, “A view of cloud computing,†Commun. ACM, vol. 53, no. 4, p. 50, 2010.

S. Saha, S. Pal, and P. K. Pattnaik, “A Novel Scheduling Algorithm for Cloud Computing Environment,†vol. 1, 2016.

A. Farahzadi, P. Shams, J. Rezazadeh, and R. Farahbakhsh, “Middleware technologies for cloud of things-a survey ☆,†Digit. Commun. Networks, no. April, pp. 1–13, 2017.

J. P. D. Comput, B. Javadi, J. Abawajy, and R. Buyya, “Failure-aware resource provisioning for hybrid Cloud infrastructure,†J. Parallel Distrib. Comput., vol. 72, no. 10, pp. 1318–1331, 2012.

J. Mohammed, C.-H. Lung, A. Ocneanu, A. Thakral, C. Jones, and A. Adler, “Internet of Things: Remote Patient Monitoring Using Web Services and Cloud Computing,†in 2014 IEEE International Conference on Internet of Things(iThings), and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom), 2014, pp. 256–263.

X. Cui, B. Mills, T. Znati, and R. Melhem, “Shadow replication: An energy-aware, fault-tolerant computational model for green cloud computing,†Energies, vol. 7, no. 8, pp. 5151–5176, 2014.

D. Boru, D. Kliazovich, F. Granelli, P. Bouvry, and A. Y. Zomaya, “Energy-efficient data replication in cloud computing datacenters,†Globecom Work. (GC Wkshps), 2013 IEEE, pp. 446–451, 2013.

C. Wang, N. Cao, J. Li, K. Ren, and W. Lou, “Secure Ranked Keyword Search over Encrypted Cloud Data,†in 2010 IEEE 30th International Conference on Distributed Computing Systems, 2010, pp. 253–262.

H. Wang, Z. Kang, and L. Wang, “Performance-Aware Cloud Resource Allocation via Fitness-Enabled Auction,†IEEE Trans. Parallel Distrib. Syst., vol. 27, no. 4, pp. 1160–1173, Apr. 2016.

Z. Amin, “Review on Fault Tolerance Techniques in Cloud Computing,†vol. 116, no. 18, pp. 11–17, 2015.

P. Zhang, S. Hu, J. He, Y. Zhang, G. Huang, and J. Zhang, “Building cloud-based healthcare data mining services,†Proc. - 2016 IEEE Int. Conf. Serv. Comput. SCC 2016, pp. 459–466, 2016.

E. A. Alomari and M. M. Monowar, “Towards Data Confidentiality and Portability in Cloud Storage Towards Data Confidentiality and Portability,†no. June 2014, 2016.

P. You, Y. Peng, W. Liu, and S. Xue, “Security Issues and Solutions in Cloud Computing,†2012.

M. Ouedraogo, S. Mignon, H. Cholez, S. Furnell, and E. Dubois, “Security transparency : the next frontier for security research in the cloud,†J. Cloud Comput., 2015.

S. Kaushik, “Cloud data security with hybrid symmetric encryption,†pp. 0–4, 2016.

J. Huang and D. M. Nicol, “Trust mechanisms for cloud computing,†pp. 1–14, 2013.

P. Derbeko, S. Dolev, E. Gudes, and S. Sharma, “ScienceDirect Security and privacy aspects in MapReduce on clouds : A survey,†Comput. Sci. Rev., pp. 1–28, 2016.

N. M. Dhanya and G. Kousalya, “Adaptive and Secure Application Partitioning for Of fl oading in Mobile Cloud Computing,†vol. 1, pp. 45–53, 2015.

J. I. A. You, Z. Zhong, G. Wang, B. O. Ai, and S. Member, “Security and Reliability Performance Analysis for Cloud Radio Access Networks With Channel Estimation Errors,†vol. 2, 2014.

X. Wu, R. Jiang, and B. Bhargava, “On the Security of Data Access Control for Multiauthority Cloud Storage Systems,†pp. 1–14, 2015.

K. Li, W. Zhang, C. Yang, and N. Yu, “Security Analysis on One-to-Many Order Preserving Encryption Based Cloud data Search,†vol. 6013, no. c, pp. 1–9, 2015.

D. Chen, “Data Security and Privacy Protection Issues in Cloud Computing,†no. 973, pp. 647–651, 2012.

K. Yang and X. Jia, “An Efficient and Secure Dynamic Auditing Protocol for Data Storage in Cloud Computing,†IEEE Trans. Parallel Distrib. Syst., vol. 24, no. 9, pp. 1717–1726, 0Sep. 2013.

V.Spoorthy and M.Mamatha," A Survey on Data Storage and Security in Cloud Computing", 2014.