CFP last date
22 July 2024
Call for Paper
August Edition
IJCA solicits high quality original research papers for the upcoming August edition of the journal. The last date of research paper submission is 22 July 2024

Submit your paper
Know more
Reseach Article

A Review on Various Aspects of the Cloud Security

by Komal Jeet Kaur, Sarpreet Singh
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 161 - Number 7
Year of Publication: 2017
Authors: Komal Jeet Kaur, Sarpreet Singh

Komal Jeet Kaur, Sarpreet Singh . A Review on Various Aspects of the Cloud Security. International Journal of Computer Applications. 161, 7 ( Mar 2017), 17-21. DOI=10.5120/ijca2017913231

@article{ 10.5120/ijca2017913231,
author = { Komal Jeet Kaur, Sarpreet Singh },
title = { A Review on Various Aspects of the Cloud Security },
journal = { International Journal of Computer Applications },
issue_date = { Mar 2017 },
volume = { 161 },
number = { 7 },
month = { Mar },
year = { 2017 },
issn = { 0975-8887 },
pages = { 17-21 },
numpages = {9},
url = { },
doi = { 10.5120/ijca2017913231 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
%0 Journal Article
%1 2024-02-07T00:07:26.797917+05:30
%A Komal Jeet Kaur
%A Sarpreet Singh
%T A Review on Various Aspects of the Cloud Security
%J International Journal of Computer Applications
%@ 0975-8887
%V 161
%N 7
%P 17-21
%D 2017
%I Foundation of Computer Science (FCS), NY, USA

Cloud Computing plays a vital role in networking. All the applications nowadays shifted over the cloud as its easy availability of resources, sharing of resources, Virtualization makes the cloud computing popular. But with the immense growth of users over the cloud creates security issues that need to be resolved for the storage of data securely.The overall purpose of using the Mutual Authentication Algorithm is to detect the Malicious users over the network and avoiding side channel attack. Malicious user always try to grab the useful information of the authenticated user and makes the system vulnerable. The algorithm discussed in this paper for finding these types of users by using Mutual Authentication. Under this server and client authenticate each other credentials. Many researchers use various methods and techniques for secure the data i.e. AES algorithm, Deffie hellman algorithm, etc. This review paper proposed the algorithm for the authentication of user and provide a control the access by avoiding the untrusted entities.

  1. Bhavna Makhija, Vinit kumar gupta, Indrajit Rajput "Enchanced Data Security in Cloud Computing with Party Auditor" International journal of advanced Research in Computer Science and Software Engineering ISSN: 2277 128X Vol.- 3 issue no. -2 2013.
  2. Namita N. Pathak, Prof. Meghana Nagori "Enchanced Security for Multi Cloud Storage using AES Algorithm" 2015 International journal of Computer Science and Information Technologies ISSN: 0975-9646 Vol. – 62015
  3. Riddhi Ghevariya, Rajyalakshmi jaiswal “Secure data forwarding in cloud using AES Algorithm”International journal of Computer Applications (2395-4396) Vol.-2 issue no.-3 2016.
  4. Rajleen Kaur, Amanpreet Kaur“A review on evolution of cloud computing its approaches and comparison with Grid computing”International journal of Advances in Engineering Research ISSN: 2231-5152 Vol.-9 issue no.-4 2016.
  5. Deepak Puthal, B.P Sahoo, Sambit Mishra and Satyabrata Swain " Cloud Computing Features, Issues and Challanges A Big Picture " International Conference on Computational Intelligence and Networks 2015.
  6. Deyan Chen, Hong Zhao "Data Security and Privacy Protection Issues in Cloud Computing", International Conference on Computer Science and Electronics Engineering IEEE 2012.
  7. W.A. Jansen " Cloud hooks: Security and privacy issues in cloud computing" in 44th Hawaii International Conference on System Sciences IEEE pp. 1-10 2011.
  8. Md Bajlur Rashid, Nazrul Islam, Abdullah Al Mahedi Sabuj, Sajjad Waheed and Mohammad Badrul Alam Miah "Randomly Encrypted Key Generation Algorithm Against Side Channel Attack in Cloud Computing " 2nd International Conference on Electrical Engineering and Information and Communication Technology IEEE 2015.
  9. Harpreet Kaur, Usvir Kaur "Mutual Authentication in Cloud Computing A Review" International Journal of Computer and Technology ISSN: 2231-2803 Vol. - 34 2016.
  10. Keiko Hashizume, David G Rosado, Eduardo Fernández-Medina and Eduardo B Fernandez “An analysis of security issues for cloud computing”Journal of internet service and applications springer open journal 2013.
  11. Jian Yu, Quan Z. Sheng, Yanbo Han“Introduction to special issue on cloud and service computing”Springer-Verlag London26 April 2013
  12. Mohammed A. AlZain, Eric Pardede, Ben Soh , James A. Thom“Cloud Computing Security: From Single to Multi-Clouds”45th Hawaii International Conference 2012.
  13. Anas BOUA Y AD, Asmae BLILA T, Nour el houda MEJHED, Mohammed EL GHAZI “Cloud computing : security challenges”Sidi Mohamed Ben Abdellah UniversityIEEE 2012.
  14. Mohamed Hamdi(2012) “Security of Cloud Computing, Storage, and Networking” School of Communication Engineering, Technopark El Ghazala, 2083 Tunisia IEEE 2012.
  15. Huaglory Tianfield(2012) “Security Issues In Cloud Computing”International conference On systems, Man, Cybemetics October 14-17, IEEE 2012.
  16. Wentao Liu“ Research on Cloud Computing Security Problem and Strategy”International Conference on Consumer Electronics, Communications and Networks IEEE 2012.
  17. K.Nimmy, M.Sethumadhavan, "Novel mutual authenticationprotocol for cloud computing using secret sharing and steganography", Fifth International Conference on the Applications of Digital Information and Web Technologies feb,2014.
  18. Mrudula Sarvabhatla, M. Giri Chandra, Sekhar Vorugunti "A Secure Mutual Authentication Protocol for Cloud Computing using Secret Sharing and Steganography" Cloud Computing in Emerging Markets International Conference IEEE 2014.
  19. Subashini, S. and V. kavitha (2011) "A survey on security issues in service delivery models of cloud computing." journal of Network and Computer Applications, 34(1), pp.1- 11,2011.
  20. Vidyanand Choudary“ Software as a service: Implication for investment in software Development“ 40th Annual Hawaii International Conference on system Sciences, IEEE 2007.
  21. A Seccombe, et al. “Security guidance for critical areas of focus in cloud computing "Cloud Security Alliance in Cloud Computing, V2.1, 2009.
  22. Gajek , S., et al “Breaking and fixing the inline approach” Proceedings of 4thACM workshop on secure web services , November 2, 2007.
  23. Descher , M., et al. "Retaining data control to the client in infrastructure clouds”International Conference on Availability, Reliability and Security, IEEE, pp, 9-16 2009.
  24. Joel Gibson, Darren Eveleigh, Robin Rondeau and Qing Tan" Benefits and Challenges of Three Cloud Computing Service Models”4th International conference on Computational aspects of social networks IEEE 2012.
  25. Ravi jhawar, Vincenzo Piuri,Fellow,and Macro santanbrogio“Fault tolerance management” System Journal IEEE 2012.
  26. Alexandaru losup, Simon osterman, Nezih yigitbasi, Radhu Prodan, Thomas Fahringer and Dick epama "Performance Analysis of Cloud Computing Services for many tasks Scientific Computing" November 2010
  27. Balachandra Reddy Kandukuri, Ramakrishna Paturiv, Dr. Atanu Rakshit "Cloud Security Issues" International conference on Services Computing IEEE 2009.
Index Terms

Computer Science
Information Sciences


Cloud Computing Side channel Attack Mutual Authentication.