CFP last date
22 April 2024
Call for Paper
May Edition
IJCA solicits high quality original research papers for the upcoming May edition of the journal. The last date of research paper submission is 22 April 2024

Submit your paper
Know more
Reseach Article

A Security Method for Cloud Computing Threats

Published on May 2015 by Arun Kumar Dewangan, Gurudatta Verma
National Conference Potential Research Avenues and Future Opportunities in Electrical and Instrumentation Engineering
Foundation of Computer Science USA
ACEWRM2015 - Number 1
May 2015
Authors: Arun Kumar Dewangan, Gurudatta Verma
8db0bc54-1561-4507-bdcc-77ff923265e4

Arun Kumar Dewangan, Gurudatta Verma . A Security Method for Cloud Computing Threats. National Conference Potential Research Avenues and Future Opportunities in Electrical and Instrumentation Engineering. ACEWRM2015, 1 (May 2015), 26-28.

@article{
author = { Arun Kumar Dewangan, Gurudatta Verma },
title = { A Security Method for Cloud Computing Threats },
journal = { National Conference Potential Research Avenues and Future Opportunities in Electrical and Instrumentation Engineering },
issue_date = { May 2015 },
volume = { ACEWRM2015 },
number = { 1 },
month = { May },
year = { 2015 },
issn = 0975-8887,
pages = { 26-28 },
numpages = 3,
url = { /proceedings/acewrm2015/number1/20897-6018/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 National Conference Potential Research Avenues and Future Opportunities in Electrical and Instrumentation Engineering
%A Arun Kumar Dewangan
%A Gurudatta Verma
%T A Security Method for Cloud Computing Threats
%J National Conference Potential Research Avenues and Future Opportunities in Electrical and Instrumentation Engineering
%@ 0975-8887
%V ACEWRM2015
%N 1
%P 26-28
%D 2015
%I International Journal of Computer Applications
Abstract

Cloud computing could be a platform for enhancing capabilities and developing potentialities at run time while not adopting new infrastructure, human resources, or software package systems. Also cloud computing originated from an enterprise idea, and developed into a successful IT invention. Despite the plug surrounding cloud computing, customers stay reluctant to deploy their industrial enterprise into the cloud. All the same, lack of security is that the only major concern that hinders increased use of cloud computing. Moreover, the complexness with that cloud computing manages information privacy, and information security makes the market hesitant concerning cloud computing. The design of cloud models threatens the security of existing technologies once deployed in an exceedingly cloud environment. Thus, users of cloud services must understand the dangers of uploading information into the new atmosphere. Therefore, in this paper we are proposing a different type of security technique for cloud computing threats so that all same problematic situations can be overcooked.

References
  1. Heena I. Syed and Naghma A. Baig, "Survey On Cloud Computing", International Journal of Emerging Technology and Advanced Engineering, Volume 3, Issue 4, pages 308-312, April 2013.
  2. Kuyoro S. O. , Ibikunle F. and Awodele O. , "Cloud Computing Security Issues and Challenges", International Journal of Computer Networks, Volume 3, Issue 5, pages 247-255, 2011.
  3. AMIT GOYAL and SARA DADIZADEH, "A Survey on Cloud Computing", University of British Columbia, Technical Report for CS 508, pages 1-14, December 2009.
  4. Shilpashree Srinivasamurthy and David Q. Liu, "Survey on Cloud Computing Security".
  5. S. Sathyavani and T. P. Senthilkumar, "Survey on Cloud Computing", International Journal of Computer Trends and Technology, volume 4, Issue 9, pages 3116-3120, Sep 2013.
  6. Jason Carolan and Steve Gaede, "Introduction to Cloud Computing architecture", Sun Microsystems, Inc, 1st Edition, June 2009.
  7. Wayne Jansen and Timothy Grance, "Guidelines on Security and Privacy in Public Cloud Computing", National Institute of Standards and Technology Draft Special Publication 800-144, January 2011.
  8. S. Bleikertz, S. Bugiel, H. Ideler, S. Nürnberger, and A. -R. Sadeghi, "Client-controlled Cryptography-as-a-Service in the Cloud. "
  9. S. Sanyal, and P. P. Iyer, "Cloud Computing--An Approach with Modern Cryptography," arXiv preprint arXiv:1303. 1048, 2013.
  10. W. Mao, "The role and effectiveness of cryptography in network virtualization: a position paper. " pp. 179-182.
  11. K. Rauber, "CLOUD CRYPTOGRAPHY," International Journal of Pure and Applied Mathematics, vol. 85, no. 1, pp. 1-11, 2013.
  12. NaQi , Wei Wei, Jing Zhang, Wei Wang, Jinwei Zhao, Junhuai Li, Peiyi Shen, Xiaoyan Yin, Xiangrong Xiao and Jie Hu Analysis and Research of the RSA Algorithm SCIENCE ALERT 2013.
Index Terms

Computer Science
Information Sciences

Keywords

Cc Cloud Security Sha Rsa Crypto-chest