CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

Security issues in Cloud Computing

Published on March 2012 by Kalyani D. Kadam, Sonia K. Gajre, R. L. Paikrao
2nd National Conference on Innovative Paradigms in Engineering and Technology (NCIPET 2013)
Foundation of Computer Science USA
NCIPET - Number 11
March 2012
Authors: Kalyani D. Kadam, Sonia K. Gajre, R. L. Paikrao
9c424f6e-be9a-4c99-a6b6-536af3cc6bc9

Kalyani D. Kadam, Sonia K. Gajre, R. L. Paikrao . Security issues in Cloud Computing. 2nd National Conference on Innovative Paradigms in Engineering and Technology (NCIPET 2013). NCIPET, 11 (March 2012), 22-26.

@article{
author = { Kalyani D. Kadam, Sonia K. Gajre, R. L. Paikrao },
title = { Security issues in Cloud Computing },
journal = { 2nd National Conference on Innovative Paradigms in Engineering and Technology (NCIPET 2013) },
issue_date = { March 2012 },
volume = { NCIPET },
number = { 11 },
month = { March },
year = { 2012 },
issn = 0975-8887,
pages = { 22-26 },
numpages = 5,
url = { /proceedings/ncipet/number11/5273-1085/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 2nd National Conference on Innovative Paradigms in Engineering and Technology (NCIPET 2013)
%A Kalyani D. Kadam
%A Sonia K. Gajre
%A R. L. Paikrao
%T Security issues in Cloud Computing
%J 2nd National Conference on Innovative Paradigms in Engineering and Technology (NCIPET 2013)
%@ 0975-8887
%V NCIPET
%N 11
%P 22-26
%D 2012
%I International Journal of Computer Applications
Abstract

It is very important to take security and privacy into account when designing and using cloud services. In this paper security in cloud computing was elaborated in a way that covers security issues/concerns and challenges , security standards and security management models and Digital Signature with RSA encryption algorithm to enhance Data Security in Cloud . –Security issues/concerns indicate potential problems which might arise. –Security standards offer some kind of security templates which cloud service providers (CSP) could obey. The most promising standard for the future would be OVF format which promises creation of new business models that will allow companies to sell a single product on premises, on demand, or in a hybrid deployment model. –Security management models offer recommendations based on security Standards best practices –Digital signature with RSA algorithm, to encrypting the data while we are transferring it over the network. .A digital signature or digital signature scheme is a mathematical scheme for demonstrating the authenticity of a digital message or document.

References
  1. Uma Somani, Kanika Lakhani and Manish Mundra “Implementing Digital Signature with RSA Encryption Algorithm to Enhance the Data Security of Cloud in Cloud Computing”, 2010 1st International Conference on Parallel, Distributed and Grid Computing (PDGC - 2010).
  2. Kresimir Popovic and Zeljko Hocenski “Cloud computing security issues and challenges”, MIPRO 2010, May 24-28, 2010, Opatija, Croatia.
  3. Richard Chow, Philippe Golle, Markus Jakobsson, Ryusuke Masuoka, Jesus Molina Elaine Shi, Jessica Staddon, Ryusuke Masuoka, and Jesus Molina “Controlling Data in the Cloud: Outsourcing Computation without Outsourcing Control”, CCSW?09, November 13, 2009, Chicago, Illinois, USA
  4. Cloud Security Alliance “Top Threats to Cloud Computing”
  5. (U.S.) Nicholas. Carr, fresh Yan Yu, "IT is no longer important: the Internet great change of the high ground - cloud computing," The Big Switch: Rewining the World, from Edison to Google, CITIC Publishing House, October 2008 1-1
  6. S. Pearson, “Taking Account of Privacy when Designing Cloud Computing Services”, CLOUD?09, May 23, 2009, Vancouver, Canada
  7. M. Casassa-Mont, S. Pearson and P. Bramhall, “Towards Accountable Management of Identity and Privacy: Sticky Policies and Enforceable Tracing Services”, Proc. DEXA 2003, IEEE Computer Society, 2003, pp. 377-382
  8. Cloud Security Alliance, Security Guidance for Critical Areas of Focus in Cloud Computing V2.1, http://www.cloudsecurityalliance.org/, December 2009
  9. http://csrc.nist.gov/groups/SNS/cloud-computing/cloud-def- v15.doc
Index Terms

Computer Science
Information Sciences

Keywords

Cloud Computing Risk management RSA algorithm