Call for Paper - January 2022 Edition
IJCA solicits original research papers for the January 2022 Edition. Last date of manuscript submission is December 20, 2021. Read More

Cloud Computing: Secure and Scalable Data Access Security Models

International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Year of Publication: 2017
Anupama Prasanth

Anupama Prasanth. Cloud Computing: Secure and Scalable Data Access Security Models. International Journal of Computer Applications 170(4):5-9, July 2017. BibTeX

	author = {Anupama Prasanth},
	title = {Cloud Computing: Secure and Scalable Data Access Security Models},
	journal = {International Journal of Computer Applications},
	issue_date = {July 2017},
	volume = {170},
	number = {4},
	month = {Jul},
	year = {2017},
	issn = {0975-8887},
	pages = {5-9},
	numpages = {5},
	url = {},
	doi = {10.5120/ijca2017914810},
	publisher = {Foundation of Computer Science (FCS), NY, USA},
	address = {New York, USA}


Cloud computing has built up itself as a standout amongst the most famous advancements accessible presently. It has increased much veneration, yet with fast usage of cloud computing, the security factor has come to forefront. Organizations are pushing toward cloud computing for getting advantage of its cost lessening and versatility highlights. However cloud computing has potential risks and vulnerabilities. One of real obstacle in moving to cloud computing is its security and protection concerns. As in cloud computing environment data is out of client ownership this prompts extraordinary danger of information trustworthiness, information secrecy and information weakness and so on. Various security models have been produced to adapt to these security dangers. Our study aims at the various security models that were produced for securing information. The different well known security models of distributed computing like "The Cloud Multiple Tenancy Model of NIST", "The Cloud Risk Accumulation Model of CSA", "Jerico Forum's Cloud Cube Model" and "Multi-Clouds Database Model" have been reviewed in this paper.


  1. Vaquero L.M., Rodero-Merino L, Caceres J., Lindner M. A break in the clouds: towards a cloud definition. In: ACM SIGCOMM, editor. Computer communication review 2009. New York: ACM Press; 2009. p. 50–5.
  2. Boss G, Malladi P, Quan D, Legregni L, Hall H. Cloud computing, 2009. websphere /zones/hipods/ library.html.
  3. Amazon Web Services (AWS), Online at http://aws.
  4. Google App Engine, Online at
  5. Microsoft Azure,
  6. 104th United States Congress, “Health Insurance Portability and Accountability Act of 1996 (HIPPA),” Online at admnsimp/pl104191.htm, 1996
  7. H. Harney, A. Colgrove, and P. D. McDaniel, “Principles of policy in secure groups,” in Proc. of NDSS’01, 2001.
  8. P. D. McDaniel and A. Prakash, “Methods and limitations of security policy reconciliation,” in Proc. of SP’02, 2002.
  9. T. Yu and M. Winslett, “A unified scheme for resource protection in automated trust negotiation,” in Proc. of SP’03, 2003.
  10. J. Li, N. Li, and W. H. Winsborough, “Automated trust negotiation using cryptographic credentials,” in Proc. of CCS’05, 2005.
  11. J. Anderson, “Computer Security Technology Planning Study,” Air Force Electronic Systems Division, Report ESD-TR-73-51, 1972, projects/history/.
  12. M. Kallahalla, E. Riedel, R. Swaminathan, Q. Wang, and K. Fu, “Scalable secure file sharing on untrusted storage,” in Proc. of FAST’03, 2003.
  13. E. Goh, H. Shacham, N. Modadugu, and D. Boneh, “Sirius: Securing remote untrusted storage,” in Proc. of NDSS’03, 2003.
  14. G. Ateniese, K. Fu, M. Green, and S. Hohenberger, “Improved proxy re-encryption schemes with applications to secure distributed storage,” in Proc. of NDSS’05, 2005.
  15. S. D. C. di Vimercati, S. Foresti, S. Jajodia, S. Paraboschi, and P. Samarati, “Over-encryption: Management of access control evolution on outsourced data,” in Proc. of VLDB’07, 2007.
  16. ZHANG, S. et al. Cloud computing research and development trend. Future Networks, 2010. ICFN'10. Second International Conference on, 2010, IEEE. p.93-97.
  17. SABAHI, F. Cloud computing security threats and responses. Communication Software and Networks (ICCSN), 2011 IEEE 3rd International Conference on, 2011, IEEE. p.245-249.
  18. Su Qinggang; Wang Fu; Hang Qiangwei. (2012). Study of Cloud Computing Security Service Model," Engineering and Technology (S-CET), 2012 Spring Congress on, vol., no., pp.1,4, 27-30.
  19. Che Jianhua, Duan Yamin, Zhang Tao, Fan Jie. (2012). Study on the security models and strategies of cloud computing. 2011 International Conference on Power Electronics and Engineering Application. Procedia Engineering 23 (2011) 586 – 593.
  20. Hopkins Hupert. (2012). Securing the Cloud. diebold.
  21. Chang, V.; Bacigalupo, D.; Wills, G.; De Roure, D. (2010). A Categorisation of Cloud Computing Business Models. Cluster, Cloud and Grid Computing (CCGrid). 2010 10th IEEE/ACM International Conference on , vol., no., pp.509,512, 17-20.
  22. AlZain, M.A.; Soh, B.; Pardede, E. (2011). MCDB: Using Multi-clouds to Ensure Security in Cloud Computing. Dependable, Autonomic and Secure Computing (DASC). 2011 IEEE Ninth International Conference on , vol., no., pp.784,791, 12-14.
  23. K. Tserpes, F. Aisopos, D. Kyriazis, T. Varvarigou, Service selection decision support in the Internet of services, in: Economics of Grids, Clouds, Systems, and Services, in: Lecture Notes in Computer Science, vol. 6296, 2010, pp. 16–33. doi:10.1007/978-3-642-15681-6_2
  24. Cloud Security Alliance. Top threats to cloud computing, Cloud Security Alliance, 2010.


Cloud Security, Multiple Tenancy Model, Risk Accumulation Model, Jerico Forum’s Model, Multi-Cloud Database Model.