CFP last date
20 May 2024
Reseach Article

Addressing Data Security and Performance Issues on the Cloud

by Shikha Banga, Abhishek Kapoor
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 107 - Number 14
Year of Publication: 2014
Authors: Shikha Banga, Abhishek Kapoor
10.5120/18822-0236

Shikha Banga, Abhishek Kapoor . Addressing Data Security and Performance Issues on the Cloud. International Journal of Computer Applications. 107, 14 ( December 2014), 28-34. DOI=10.5120/18822-0236

@article{ 10.5120/18822-0236,
author = { Shikha Banga, Abhishek Kapoor },
title = { Addressing Data Security and Performance Issues on the Cloud },
journal = { International Journal of Computer Applications },
issue_date = { December 2014 },
volume = { 107 },
number = { 14 },
month = { December },
year = { 2014 },
issn = { 0975-8887 },
pages = { 28-34 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume107/number14/18822-0236/ },
doi = { 10.5120/18822-0236 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:41:04.749881+05:30
%A Shikha Banga
%A Abhishek Kapoor
%T Addressing Data Security and Performance Issues on the Cloud
%J International Journal of Computer Applications
%@ 0975-8887
%V 107
%N 14
%P 28-34
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Cloud computing has, with its advent, brought what IT always dreamt of adding capabilities on the fly without any new investments, thereby also reducing the cost. Be it an individual or a big organization, everyone is using cloud computing either knowingly or unknowingly. If we talk about the services and advantages of cloud computing, the benefits are astonishing like pay-as-you-go service, flexibility, accessibility, scalability, etc. but what is it that is still bothering the cloud providers and its customers? Some famous and prominent attacks indicate the lack of security in the cloud which ultimately leads to mistrust of customers toward the cloud provider. Although, cloud computing provides security to some extent, but the rising demand and use of big data require a solution to the poor security in the cloud. Confidentiality and privacy are the main reasons that people still hesitate to use the services of cloud in-spite of such promising technology and positive outcomes. For this purpose, we are proposing a technique in which the centralized data is fragmented based on its sensitivity and thereby improving the performance also.

References
  1. Dimitrios Zissis and Dimitrios Lekkas, Addressing cloud computing security issues, Elsevier-Future Generation Computer Systems, 2012.
  2. Greg Boss, Padma Malladi, Dennis Quan, Linda Legregni and Harold Hall, Cloud Computing, IBM, 2007.
  3. Introduction to Cloud Computing Architecture, White paper, First edition, Sun Microsystems, 2009.
  4. Marios D. Dikaiakos and George Pallis, Cloud Computing-Distributed Internet Computing for IT and Scientific Research; IEEE Internet Computing, 2009.
  5. Olivier Brian, Thomas Brunschwiler, Heinz Dill, et al. , Cloud Computing; Swiss Academy of Engineering Sciences, 2012.
  6. Mohamed Al Morsy, John Grundy and Ingo Müller, An Analysis of The Cloud Computing Security Problem; Swinburne University of Technology, 2010.
  7. Kevin Curran, Sean Carlin and Mervyn Adams, Security Issues in Cloud Computing, Elixir International Journal, 2011.
  8. S. Subashini and V. Kavitha, A survey of security issues in service delivery models of cloud computing, Elsevier-Journal of Network and Computer Applications, 2011.
  9. Aleksandar Hudic, Shareeful Islam, Peter Kieseberg and Edgar R. Weippl, Data Confidentiality using Fragmentation in Cloud Computing, International Journal of Communication Networks and Distributed Systems, Vol. 1 ,2012.
  10. Robert Taylor, Query Optimization for Distributed Database Systems, University of Oxford, 2010, Unpublished.
  11. P. R. Bhuyar, A. D. Gawande and A. B. Deshmukh, Horizontal Fragmentation Technique in Distributed Database, International Journal of Scientific and Research Publications, vol. 2, 2012.
  12. Santosh Kumar and R. H. Goudar, Cloud Computing – Research Issues, Challenges, Architecture, Platforms and Applications, International Journal of Future Computer and Communication, Vol. 1, 2012.
  13. Kevin Curran, Sean Carlin and Mervyn Adams, Security Issues in Cloud Computing, IGI Global, 2012.
  14. Amir Mohamed Talib, Rodziah Atan, Rusli Abdullah, Masrah Azrifah and Azmi Murad, Towards a Comprehensive Security Framework of Cloud Data Storage based on Multi-Agent System Architecture, Journal of Information Security, 2012.
  15. searchcloudsecurity. techtarget. com/, Last accessed: - February 2014.
  16. Oscar Diez and Andrés Silva, Using Cloud Computing in Public Organizations, IEEE Technology and Society Magazine, 2013.
  17. http://bigideasblog. infusionsoft. com/public-and-private-cloud/
  18. exploreb2b. com/articles/pros-and-cons-of-hybrid-cloud
  19. www. idganswers. com/question/3551/what-are-the-main-advantages-disadvantages-of-a-hybrid-cloud-model-vs-the-public-cloud
  20. www. MKyong. com, last accessed March 2014.
Index Terms

Computer Science
Information Sciences

Keywords

Cloud computing cloud security data privacy fragmentation database-as-a-service distributed computing PostgreSQL.