Call for Paper - September 2020 Edition
IJCA solicits original research papers for the September 2020 Edition. Last date of manuscript submission is August 20, 2020. Read More

Security Issues in Cloud Computing

Print
PDF
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Year of Publication: 2017
Authors:
Sanchi Kalra, Kunal Atal, Rachna Jain
10.5120/ijca2017914190

Sanchi Kalra, Kunal Atal and Rachna Jain. Security Issues in Cloud Computing. International Journal of Computer Applications 167(2):37-41, June 2017. BibTeX

@article{10.5120/ijca2017914190,
	author = {Sanchi Kalra and Kunal Atal and Rachna Jain},
	title = {Security Issues in Cloud Computing},
	journal = {International Journal of Computer Applications},
	issue_date = {June 2017},
	volume = {167},
	number = {2},
	month = {Jun},
	year = {2017},
	issn = {0975-8887},
	pages = {37-41},
	numpages = {5},
	url = {http://www.ijcaonline.org/archives/volume167/number2/27747-2017914190},
	doi = {10.5120/ijca2017914190},
	publisher = {Foundation of Computer Science (FCS), NY, USA},
	address = {New York, USA}
}

Abstract

Cloud computing is a framework for providing various computing and storage services on the on-demand basis via the internet. It provides access to a user pool of shared network and storage resources using the server of the service provider without materially acquiring these resources. Hence, it saves managing cost and time for various organizations as well as individual users. Many industries, such as education, banking, healthcare and manufacturing are widely adapting cloud services due to their efficiency, flexibility and reduction of costs. Since, cloud services are universally accessible; it makes accessing data process a lot easier than traditional storage methods. Some popular cloud providers where client data is stored and maintained are Google, Amazon, SalesForce, Microsoft, etc. However, cloud technology is completely internet dependent and hence, faces as many threats as that are existing in the networks such as intranets. These threats can occur in various forms such as traffic hijacking, insecure interface and APIs, malicious insiders, abuse of cloud services, shared technology vulnerabilities, data breaches, perimeter security model broken or unknown risk profile. The primary objective of this paper is to acknowledge the major issues of security and provide a solution to overcome them.

References

  1. “Azure Microsoft: A beginner’s guide”, 2017, Available: https://azure.microsoft.com/en-in/overview/what-is-cloud-computing/
  2. Sugandha Nandedkar and Sangeeta Kakarwal, “A Review on Cloud Computing Vulnerabilities,” International Journal of Innovative Research in Science, Engineering and Technology, 2014.
  3. P.Samundeeswari, “Cloud Computing Models and its Benefits”, International Journal for Research in Science Engineering and Technology (IJRSET) 2015, Volume 2, Issue 10, pp. 6-13, 2015.
  4. Sumit Goyal, “Public vs Private vs Hybrid vs Community - Cloud Computing: A Critical Review,” I.J. Computer Network and Information Security, 2014, pp. 20-29, Published Online February 2014 in MECS.
  5. “Cloud Computing”, 2016, Available: http://searchcloudcomputing.techtarget.com/definition/cloud-computing
  6. Saurin Khedia and Nishant Khatri, “A Review on Hybrid Techniques of Security In Cloud Computing,” International Journal of Innovative Research in Computer and Communication Engineering, Vol. 2, Issue 11, November 2014.
  7. Sana Belguith, Abderrazak Jemai and Rabah Attia, “Enhancing Data Security in Cloud Computing Using a Lightweight Cryptographic Algorithm,” ICAS 2015, The Eleventh International Conference on Autonomic and Autonomous Systems.
  8. L. Ertaul, S. Singhal, and S. Gökay, “Security challenges in Cloud Computing,” International conference on Security and Management (SAM), 2010, pp 36–42.
  9. Huaglory Tianfield, “Security Issues in cloud computing,” IEEE International Conference on Systems, Man and Cybernetics, October 14-17,2012, COEX, Seoul, Korea.
  10. Hu Shuijing, “Data security: the challenges of cloud computing”, Sixth International Conference on Measuring Technology and Mechatronics Automation, January 2014, Hunan, China.
  11. Pardeep Sharma, Sandeep K. Sood, and Sumeet Kaur, “Security Issues in Cloud Computing,” International Conference, HPAGC 2011, Chandigarh, India, July 19-20, 2011, pp 36-45.
  12. H.A. Dinesha and V.K. Agrawal,”Multi-level Authentication Technique for Accessing Cloud Services,” IEEE International Conference on Computing, Communication and Applications (ICCCA), 2012, pp. 1-4.
  13. Pachipala Yellamma, Challa Narasimham and Velagapudi Sreenivas, “Data Security In Cloud Using RSA, Computing,” Communications and Networking Technologies (ICCCNT),2013 Fourth International Conference, July 2013.
  14. G.Prabu kanna and V.Vasudevan, “Enhancing the Security of User Data Using the Keyword Encryption and Hybrid Cryptographic Algorithm in Cloud,” International Conference on Electrical, Electronics, and Optimization Techniques (ICEEOT), March 2016.
  15. Akshita Bhandari, Ashutosh Gupta and Debasis Das, “Secure Algorithm for Cloud Computing and Its Applications,” Cloud System and Big Data Engineering (Confluence), 2016 6th International Conference, January 2016.
  16. A. Ashok Kumar, Santhosha and A.Jagan, “Two layer Security for data storage in cloud,” Futuristic Trends on Computational Analysis and Knowledge Management (ABLAZE), 2015 International Conference, February 2015.

Keywords

Cloud Computing, Data Security, Compression, Encryption, Authenticity, Integrity