CFP last date
22 April 2024
Reseach Article

Security in Cloud Computing

by Rajarshi Roy Chowdhury
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 96 - Number 15
Year of Publication: 2014
Authors: Rajarshi Roy Chowdhury
10.5120/16870-6767

Rajarshi Roy Chowdhury . Security in Cloud Computing. International Journal of Computer Applications. 96, 15 ( June 2014), 24-30. DOI=10.5120/16870-6767

@article{ 10.5120/16870-6767,
author = { Rajarshi Roy Chowdhury },
title = { Security in Cloud Computing },
journal = { International Journal of Computer Applications },
issue_date = { June 2014 },
volume = { 96 },
number = { 15 },
month = { June },
year = { 2014 },
issn = { 0975-8887 },
pages = { 24-30 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume96/number15/16870-6767/ },
doi = { 10.5120/16870-6767 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:21:49.367620+05:30
%A Rajarshi Roy Chowdhury
%T Security in Cloud Computing
%J International Journal of Computer Applications
%@ 0975-8887
%V 96
%N 15
%P 24-30
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Cloud computing refers to high scalable computing applications, storages and platforms as a service to companies, individuals and governments. Therefore, SMB (Small and Medium Business) organizations are adapting cloud computing services gradually to save cost and to increase efficiency in their business environment. While cloud service benefits and robustness are comprehensible, but now more concern about security in cloud computing "How much secure is cloud computing environment?". Noted that security is one of the main barrier for continuing growth of cloud computing. For some major security risks and issues enterprises and individuals are unwilling to deploy their data and applications in cloud environment. In this paper, the main objective is to identified major security risks and issues those are need to think about during deployment and development of services in cloud and the way how to mitigate those security risks and issues. However, it is significant to know that, cloud computing is not insecure primarily, it just needs to be managed and accessed securely.

References
  1. S. Subashini, V. Kavitha, A survey on security issues in service delivery models of cloud computing, Journal of Network and Computer Applications, vol. 34, Issue 1, pp. 1-11, 2011.
  2. M. Carroll, A. Van der Merwe, P. Kotze, Secure cloud computing: Benefits, risks and controls, Information Security South Africa (ISSA), pp. 1-9, September 2011.
  3. S. Subashini, V. Kavitha, A survey on security issues in service delivery models of cloud computing, Journal of Network and Computer Applications, vol. 34, Issue 1, pp. 1-11, July 2010.
  4. D. Zissis, D. Lekkas, Addressing cloud computing security issues, Future Generation Computer Systems, 2011.
  5. Chonka, Y. Xiang, W. Zhou, A. Bonti, Cloud security defence to protect cloud computing against HTTP-DOS and XML-Dos attacks, Journal o Network and Computer Applications, vol. 34, pp. 1097-1107, 2010.
  6. Grobauer, T. Walloschek, E. Stocker, Understanding Cloud Computing Vulnerabilities, Security & Privacy, IEEE, vol. 9, Issue 2, pp. 50-57, March 2011.
  7. B. ,Thuraisingham, V. , Khadilkar, A. , Gupta, M. , Kantarcioglu, L. , Khan, Secure data storage and retrival in the clod, Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom), 2010 6th International Conference on, pp. 1-8, May 2011.
  8. Z. , Chen, J. , Yoon, IT Auditing to Assure a Secure Cloud Computing, Services (SERVICES-1), 2010 6th World Congress on, pp. 253-259, September 2010.
  9. J. , Wayne, T. , Grance, Guidelines on Security and Privacy in Public Cloud Computing, U. S. Department of Commerce, January 2011. http://csrc. nist. gov/publications/drafts/800-144/Draft-SP-800-144_cloud-computing. pdf [Accessed on: 23 October 2011].
Index Terms

Computer Science
Information Sciences

Keywords

Cloud computing Service models Security risks and issues Risk mitigation and Cloud services.