CFP last date
20 May 2024
Reseach Article

Cloud Security: Theory and Practice

Published on January 2014 by Vaishali Balhara
International IT Summit Confluence 2013-The Next Generation Information Technology Summit
Foundation of Computer Science USA
CONFLUENCE2013 - Number 3
January 2014
Authors: Vaishali Balhara
17fdc9f4-143e-4441-95f8-b327cf268796

Vaishali Balhara . Cloud Security: Theory and Practice. International IT Summit Confluence 2013-The Next Generation Information Technology Summit. CONFLUENCE2013, 3 (January 2014), 14-17.

@article{
author = { Vaishali Balhara },
title = { Cloud Security: Theory and Practice },
journal = { International IT Summit Confluence 2013-The Next Generation Information Technology Summit },
issue_date = { January 2014 },
volume = { CONFLUENCE2013 },
number = { 3 },
month = { January },
year = { 2014 },
issn = 0975-8887,
pages = { 14-17 },
numpages = 4,
url = { /proceedings/confluence2013/number3/15126-1320/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 International IT Summit Confluence 2013-The Next Generation Information Technology Summit
%A Vaishali Balhara
%T Cloud Security: Theory and Practice
%J International IT Summit Confluence 2013-The Next Generation Information Technology Summit
%@ 0975-8887
%V CONFLUENCE2013
%N 3
%P 14-17
%D 2014
%I International Journal of Computer Applications
Abstract

Cloud computing is an upcoming technology that promises for a very scalable and agile computing. The world is experiencing a major breakthrough in resource pooling at a bigger platform than ever before. Although the adoption of this technology is taking place at considerable rate but we still witness some serious hazards here which are inhibiting the IT sector to take full advantage of such a useful technology. This paper discusses about the biggest hazard in the way of cloud computing which is undoubtedly the security. Security in clouds is a major research area these days. So this paper reviews the security concern with their requirement and best practices in cloud architecture.

References
  1. http://csrc. nist. gov/publications/nistpubs/800-145/SP800-145. pdf, accessed May 2013
  2. W. Vic (J. R. ), Securing the Cloud- Cloud Computer Security Techniques and Tactics, United States of America: Syngress : an imprint of Elsevier, 2011.
  3. M. Tim, K. Subra and L. Shahed, Cloud Security and privacy- An Enterprise Perspective on Risks and Compliance, United States of America: O'Reilly Media, Inc. , 2009.
  4. Innobuzz knowledge solutions, "Certified Cloud Computing Expert", Reference Guide.
  5. http://www. iso27001security. com/html/iso27000. html, accessed May 2013
  6. ENISA, "Cloud Computing : benefits, risks and recommendations for information security", 2009, http://www. enisa. europa. eu/act/rm/files/deliverables/cloud-computing-risk-assessment, accessed May 2013
  7. Ahronovitz M, et al. The Cloud Computing Use Case Discussion Group "Cloud Computing Use Cases White Papers" version 4. 0, http://cloudusecases. org, accessed May 2013 Itani, W. , Kayssi, A. , Chehab, A. : Privacy as a service: privacy- aware data storage and processing in cloud computing architecture. In: 2009 Eighth IEEE International Conference on Dependable Autonomic and Secure Computing, 978-0-7695-3929-4/09 ©, pp. 711–717. IEEE (2009)
  8. Jangra A. , Bala R. : PASA : Privacy-aware Security Algorithm for Cloud Computing, http://link. springer. com/chapter/10. 1007%2F978-3-642-32063-7_52
  9. Mohamed A. , "A history of Cloud Computing", http://www. computerweekly. com/feature/A-history-of-cloud-computing, accessed May 2013
  10. Sanka, S. , Hota, C. , Rajarajan, M. : Secure data access in cloud computing. In: 2010 IEEE 4th International Conference on Internet Multimedia Services Architecture and Application, 978-1-4244-7932-0/10 ©, pp. 1–6. IEEE (2010)
Index Terms

Computer Science
Information Sciences

Keywords

Cloud Computing Cloud Security Risk Risk Management