Call for Paper - September 2022 Edition
IJCA solicits original research papers for the September 2022 Edition. Last date of manuscript submission is August 22, 2022. Read More

A New Approach for Providing Security Mechanism in Cloud with Possible Solutions and Results

International Journal of Computer Applications
© 2013 by IJCA Journal
Volume 67 - Number 12
Year of Publication: 2013
Sarvesh Kumar
Punnet Kumar
Suraj Pal Singh
Ajit Saxena

Sarvesh Kumar, Punnet Kumar, Suraj Pal Singh and Ajit Saxena. Article: A New Approach for Providing Security Mechanism in Cloud with Possible Solutions and Results. International Journal of Computer Applications 67(12):30-33, April 2013. Full text available. BibTeX

	author = {Sarvesh Kumar and Punnet Kumar and Suraj Pal Singh and Ajit Saxena},
	title = {Article: A New Approach for Providing Security Mechanism in Cloud with Possible Solutions and Results},
	journal = {International Journal of Computer Applications},
	year = {2013},
	volume = {67},
	number = {12},
	pages = {30-33},
	month = {April},
	note = {Full text available}


In the field of IT technology, cloud computing is a next big thing in IT market. It is just internet based computing and on demand computing which gives reliability, scalability, availability compared to dedicated infrastructure. The main issues in cloud computing is security, trust and privacy issues. These issues arise at the time of deployment of cloud computing services in public and private cloud. In this paper security and privacy issues are reviewed and gives a proposed mechanism for securing data in cloud and also used Microsoft window azure tools for SACM (security access control mechanism) , and compare the system with SACM tools and NO SACM tools. The implementation result will show that security model is better than using SACM tools. It also defines web hosting in old manner and web hosting in cloud manner. In the future scope we can see multi tenancy security issues in cloud computing.


  • An Analysis of the cloud computing security problem.
  • N. Grushka. M. Tenson ," Attack Surfaces: A Taxonomy for attacks on cloud services," cloud computing, IEEE international conference on,pp-276-279,2010 3rd international conference on cloud computing,2010.
  • Balchandra Reddy Kandukuri, Ramakrishna paturi and Atann Rakshit "cloud security issues" in proceedings of the 2009 IEEE international conference on services computing, 2009,pp 517-520. Forman, G. 2003. An extensive empirical study of feature selection metrics for text classification. J. Mach. Learn. Res. 3 (Mar. 2003), 1289-1305.
  • S. Subhashint and V. Kavitna" A survey on security issues in services delivery models of cloud computing," J. Network and Computer applications,vol. 34 jan 2011,pp1-11.
  • Sarvesh kumar, Nilesh Kumar dubey," cloud computing ( A survey on cloud computing security issues and attacks in private clouds)," International journal of Emerging trends in Engg. And Development " issue 3,vol. 1,jan 2013.
  • Zhifang Xiao and Yang Xiao," Security and Privacy in cloud computing", IEEE communication surveys & Tutorial, march 2012.
  • RAND Europe / time lex /University of Warwick.
  • Z. Xiao, N. Kathiresshan, and Y. Xiao," PeerReview Re-evalution for Accountability in Distributed systems or networks," International J. Security and Networks(IJSN),2010,vol. 7 No. 1 in press.
  • Z. Xiao, N. Kathiresshan, and y. Xiao," A survey of Accountability in computer networks and distributed systems," (wiley journal of) Security and communication networks ,accepted.
  • E. Keller, J. Szefer, J. Rexford and R. B. Lee," Nohype:virtualized cloud infrastructure without the virtualization," in proc. 37annual international symposium on computer architecture, New York, NY, USA, 2010,pp 350-361.
  • Q. Chai and G. Gong,"On the(in) security of two joint encryption and error Correction schemes," International j. Security and networks,vol. 6 No. 4,2011 pp. 181-190.
  • Z. Wang and R. B. Lee," A novel cache design architecture with enhanced performance and security," IN 41st IEEE/ACM international symposium on microarchitecture, pages 494-505, june 2007.
  • R. Maggiani;(2009)," cloud computing is changing how we communicate," 2009 IEEE international Professional communication conference, IPCC 2009,Waikiki, HI, United states, PP1,19-22 july.
  • Geng L,David F,Jinzy Z; Glenn (2009) ," cloud computing IT as a service," IEEE computer society IT professional ", Vol. 11,pp 10-13, March-April 2009
  • cloud security alliance(CSA). " Top Threats of cloud Computing V 1. 0," released March 2010.
  • K. D. Bowers, A. Juels and A. Opera,"HAIL: a high Availability and integrity layer for cloud storage," Proc. 16th ACM conference on computer and communication security, 2009, pp. 213-222.