CFP last date
20 November 2024
Reseach Article

An Advanced Survey on Cloud Computing and Alleviation Techniques

by Vivekanandhan M.
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 181 - Number 24
Year of Publication: 2018
Authors: Vivekanandhan M.
10.5120/ijca2018917981

Vivekanandhan M. . An Advanced Survey on Cloud Computing and Alleviation Techniques. International Journal of Computer Applications. 181, 24 ( Oct 2018), 19-22. DOI=10.5120/ijca2018917981

@article{ 10.5120/ijca2018917981,
author = { Vivekanandhan M. },
title = { An Advanced Survey on Cloud Computing and Alleviation Techniques },
journal = { International Journal of Computer Applications },
issue_date = { Oct 2018 },
volume = { 181 },
number = { 24 },
month = { Oct },
year = { 2018 },
issn = { 0975-8887 },
pages = { 19-22 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume181/number24/30033-2018917981/ },
doi = { 10.5120/ijca2018917981 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T01:06:56.734523+05:30
%A Vivekanandhan M.
%T An Advanced Survey on Cloud Computing and Alleviation Techniques
%J International Journal of Computer Applications
%@ 0975-8887
%V 181
%N 24
%P 19-22
%D 2018
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Cloud computing is a set of resources and services that are offered by the network or internet. Cloud computing extends various computing techniques like grid computing, distributed computing. Today cloud computing is used in both industrial field and academic field. Cloud facilitates its users by providing virtual resources via internet. As the field of cloud computing is spreading the new techniques are developing. This increase in cloud computing environment also increases security challenges for cloud developers. Users of cloud save their data in the cloud hence the lack of security in cloud can lose the user’s trust.

References
  1. Amit Hendre and Karuna Pande Joshi CSEE Department, University of Maryland Baltimore County Baltimore, MD, USA “A Semantic Approach to Cloud Security and Compliance” 2015 IEEE
  2. Vahid Ashktorab , Seyed Reza Taghizadeh “Security Threats and Countermeasures in Cloud Computing Volume 1, Issue 2, October 2012
  3. Victor Chang, Muthu Ramachandran, Member, IEEE “Towards achieving Data Security with the Cloud Computing Adoption Framework”, 2015,IEEE
  4. Prince Jain Malwa Polytechnic College Faridkot, Punjab-151203, India “Security Issues and their Solution in Cloud Computing” International Journal of Computing & Business Research ISSN (Online): 2229-6166
  5. Martin Mulazzani, Sebastian Schrittwieser, Manuel Leithner, Markus Huber, Edgar Weippl, “Dark Clouds on the Horizon: Using Cloud Storage as Attack Vector and Online Slack Space”, Proceedings of the 20th USENIX conference on Security, Berkley, USA, 2011.
  6. Seny Kamara, Kristin Lauter, “Cryptographic cloud storage”, Lecture Notes in Computer Science, Financial Cryptography and Data Security, pp. 136- 149, vol. 6054, 2010.
  7. Cong Wang, Qian Wang, Kui Ren, and Wenjing Lou, “Ensuring Data Storage Security in Cloud Computing”, 17th International workshop on Quality of Service,2009, IWQoS, Charleston, SC, USA, pp.1- 9, July 13-15, 2009, ISBN: 978-1-4244-3875-4.
  8. W. Li, L. Ping, X. Pan, “Use trust management module to achieve effective security mechanisms in cloud environment”, 2010 International Conference on Electronics and Information Engineering (ICEIE), Volume: 1, pp. V1-14 - V1-19, 2010. DOI: 10.1109/ICEIE.2010.5559829.
  9. R. A. Vasudevan, A. Abraham, S.Sanyal, D.P. Agarwal, “Jigsaw-based secure data transfer over computer networks”, Int. Conference on Information Technology: Coding and Computing, pp. 2-6, vol.1, April, 2004.
  10. R. A. Vasudevan, S. Sanyal, “A Novel Multipath Approach to Security in Mobile Ad Hoc Networks (MANETs)”, Int. Conference on Computers and Devices for Communication, CODEC’04, Kolkata, India.
  11. Tim Mather, Subra Kumaraswamy, Shahed Latif, “Cloud Security and Privacy: An Enterprise Edition on Risks and Compliance (Theory in Practice)”, O’Reilly Media, Sep. 2009; ISBN: 978-0596802769. http://oreilly.com/catalog/9780596802776.
  12. Jeff Sedayao, Steven Su, Xiaohao Ma, Minghao Jiang and Kai Miao, “A Simple Technique for Securing Data at Rest”, Lecture Notes in Computer Science, pp. 553- 558, 2009.
  13. Yogesh L. Simmhan, Beth Plale, Dennis Gannon, “A Survey of Data Provenance Techniques”, ACM SIGMOD, vol. 34, issue. 3, Sep, 2005, NY, USA.
  14. Krishna Prakash and Balachandra “security issues and challenges in mobile computing and m-commerce” International Journal of Computer Science & Engineering Survey (IJCSES) Vol.6, No.2, April 2015
  15. Justin LeJeune, Cara Tunstall, Kuo-pao Yang and Ihssan Alkadi, CSIT Department at SLU “An Algorithmic Approach to Improving Cloud Security: The MIST and Malachi Algorithms”, 978-1-4673-7676 ,2016 IEEE
  16. Abdullah , Imran, Fida Hussain “The Secure Data Storage in Mobile Cloud Computing”
  17. Computer Engineering and Intelligent Systems
  18. P. R. Gallagher, “Guide to Understanding Data Remanence in Automated Information Systems”, The Rainbow Books, ch3 and ch.4, 1991.
  19. Farzad Sabahi, “Secure Virtualization for Cloud Environment Using Hypervisor-based Technology”, Int. Journal of Machine Learning and Computing, pp. 39-45, vol. 2, no. 1, February, 2012.
  20. David Goldman, “Why Amazon’s Cloud Titanic Went Down”, CNNMoney, April, 2011. http://money.cnn.com/2011/04/22/technology/amazon
  21. Rory Smith (SOC Analyst), “The Use of Legitimate Channels to distribute malicious software to Users”, Security Samurai, Aug. 2, 2011. http://www.thesecuritysamurai.com/2011/08/02/the- use-of-legitimate-channels-to-distribute-malicious- software-to-users-by-rory-smith-soc-analyst/
  22. Thomas Ristenpart, Eran Tromer, Hovav Shacham, Stefan Savage, “Hey, you get off my cloud: Exploring information leakage in third party compute clouds”, CCS’09, Proceedings of the 16th ACM conference. On Computer and Communications Security, pp. 199-212, ACM New York, NY, USA, 2009. ISBN: 978-1- 60558-894-0.
  23. Michael Krigsman, “MediaMax/The Linkup: When the Cloud fails”, IT Project Failures, News and Blogs, ZDNet, August, 2008. http://www.zdnet.com/blog/projectfailures/mediamax- the-linkup-when-the-cloud-fails/999
  24. K. Hwang, S Kulkarni and Y. Hu, “Cloud security with virtualized defence and Reputation-based Trust management”, Proceedings of 2009 Eighth IEEE International Conference on Dependable, Autonomic and Secure Computing (security in cloud computing), pp. 621-628, Chengdu, China, December, 2009. ISBN: 978-0-7695-3929-4.
  25. Larry Dignan (Editor in Chief- ZDNet), “Epsilon Data Breach: What’s the value of an email address”, IT Security Blogs, Tech Republic, April 5, 2011. http://www.techrepublic.com/blog/security/epsilon- data-breach-whats-the-value-of-an-email-address/5307
  26. www.iiste.org ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online) Vol.6, No.5,2015.
Index Terms

Computer Science
Information Sciences

Keywords

Cloud Computing Cloud Security Standard Authentication Security Threats Security Authentication Saas Paas Iaas