CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

Analysis on Cloud Computing Security Issues, Threats and Solutions

Published on March 2015 by K.b. Priya Iyer, Padma Priya, R. Anusha
International Conference on Communication, Computing and Information Technology
Foundation of Computer Science USA
ICCCMIT2014 - Number 2
March 2015
Authors: K.b. Priya Iyer, Padma Priya, R. Anusha
5362dcb9-733a-4038-afd8-27ea2a5b41c8

K.b. Priya Iyer, Padma Priya, R. Anusha . Analysis on Cloud Computing Security Issues, Threats and Solutions. International Conference on Communication, Computing and Information Technology. ICCCMIT2014, 2 (March 2015), 21-25.

@article{
author = { K.b. Priya Iyer, Padma Priya, R. Anusha },
title = { Analysis on Cloud Computing Security Issues, Threats and Solutions },
journal = { International Conference on Communication, Computing and Information Technology },
issue_date = { March 2015 },
volume = { ICCCMIT2014 },
number = { 2 },
month = { March },
year = { 2015 },
issn = 0975-8887,
pages = { 21-25 },
numpages = 5,
url = { /proceedings/icccmit2014/number2/19774-7018/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 International Conference on Communication, Computing and Information Technology
%A K.b. Priya Iyer
%A Padma Priya
%A R. Anusha
%T Analysis on Cloud Computing Security Issues, Threats and Solutions
%J International Conference on Communication, Computing and Information Technology
%@ 0975-8887
%V ICCCMIT2014
%N 2
%P 21-25
%D 2015
%I International Journal of Computer Applications
Abstract

Cloud computing is becoming very popular computing standard for network application. It is the result of existing technologies and paradigms. It is a set of resources and services offered to customers through network or internet. It provides resources that are provided as on request services to end user. It mainly aims at reduced cost, less complexity, flexibility, scalability and efficiency. Cloud computing extends various techniques such as grid computing, distributed computing and utility computing [1]. Cloud computing is used in both industrial and academic field. The data storage as a service (DAAS) in cloud provides the user a facility to store their data in remote servers which may be accessible by the user anywhere he is through the internet facility [3]. The data stored in cloud can also be accessed by other users. There is also a possibility where a hacker can pierce the cloud by stealing a genuine user's data. He is also capable of infecting the cloud which in turn affects the entire user's who are sharing the infected cloud. Here comes the problem of providing security to the cloud. Likewise both customer and service provider face few security threats [2]. Data communication through any network is at risk now, there are many encryption techniques used to protect the data. This paper discusses about security issues faced by client and server and also have analyzed about threats involved in different service models such as infrastructure as a service (IAAS), software as a service (SAAS) and platform as a service (PAAS). We have also tried to provide few countermeasures for those security issues

References
  1. VahidAshktorab, Syed Reza Taghizadeh(2012)," Security Threats and Countermeasures in Cloud Computing", International Journal of Application or Innovation in Engineering & Management (IJAIEM), Volume 1, Issue 2, October 2012.
  2. KangchanLee(2012)," Security Threats in Cloud Computing Environments", International Journal of Security and Its Applications Vol. 6, No. 4, October, 2012.
  3. PradnyeshBhisikar, Prof. AmitSahu," Security in Data Storage and Transmission in Cloud Computing", International Journal of Advanced Research in Computer Science and Software Engineering,Volume 3, Issue 3, March 2013.
  4. Prince Jain," Security Issues and their Solution in Cloud Computing", International Journal of Computing & Business Research.
  5. Anjanachaudry, Ravinderthakur, manishmann,"A Review: Data Security Approach in Cloud computing by using RSA Algorithm ",International Journal of Advance Research in Computer Science and Management Studies ,Volume 1, Issue 7, December 2013 .
  6. DimitriosZissis&Lekkas," Addressing cloud computing security issues,Future Generation Computer Systems.
  7. Navdeep Singh, Abhinav Hans, Ashish Sharma, and Kapil Kumar," A Review on Security Issues in Cloud Computing", International Journal of Innovation and Applied Studies, Vol. 8 No. 3 Sep. 2014.
  8. HarshalMahajan, Dr. NupurGiri," Threats to Cloud Computing Security", International Technological Conference-2014 (I-TechCON), Jan. 03 – 04, 2014.
  9. K. S. Suresh,Prof K. V. Prasad," Security Issues and Security Algorithms in Cloud Computing", International Journal of Advanced Research in Computer Science and Software Engineering,Volume 2, Issue 10, October 2012.
  10. Frederick R. Carlson," Security Analysis of Cloud Computing"
  11. Garima Gupta, P. R. Laxmi and Shubhanjali Sharma," A Survey on Cloud Security Issues and Techniques",
Index Terms

Computer Science
Information Sciences

Keywords

Cloud Computing Encryption Data Security Security Issues Threats.