Open Access   Article Go Back

Cloud Computing Characteristics and Security Issues

S. Ayyub1 , D. Roy2

Section:Research Paper, Product Type: Journal Paper
Volume-1 , Issue-4 , Page no. 18-22, Dec-2013

Online published on Dec 31, 2013

Copyright © S. Ayyub, D. Roy . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: S. Ayyub, D. Roy, “Cloud Computing Characteristics and Security Issues,” International Journal of Computer Sciences and Engineering, Vol.1, Issue.4, pp.18-22, 2013.

MLA Style Citation: S. Ayyub, D. Roy "Cloud Computing Characteristics and Security Issues." International Journal of Computer Sciences and Engineering 1.4 (2013): 18-22.

APA Style Citation: S. Ayyub, D. Roy, (2013). Cloud Computing Characteristics and Security Issues. International Journal of Computer Sciences and Engineering, 1(4), 18-22.

BibTex Style Citation:
@article{Ayyub_2013,
author = {S. Ayyub, D. Roy},
title = {Cloud Computing Characteristics and Security Issues},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {12 2013},
volume = {1},
Issue = {4},
month = {12},
year = {2013},
issn = {2347-2693},
pages = {18-22},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=27},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=27
TI - Cloud Computing Characteristics and Security Issues
T2 - International Journal of Computer Sciences and Engineering
AU - S. Ayyub, D. Roy
PY - 2013
DA - 2013/12/31
PB - IJCSE, Indore, INDIA
SP - 18-22
IS - 4
VL - 1
SN - 2347-2693
ER -

VIEWS PDF XML
4827 4625 downloads 4594 downloads
  
  
           

Abstract

Along with the development and application of Cloud Computing in recent years, Cloud Storage, as the module which provides data storage service in the Cloud Computing architecture, has become the kernel component of Cloud Computing. This is one of the advantages of cloud computing to create and store data at remote servers. But this advantage implicitly contains drawback of data security and privacy vulnerabilities. Many algorithms and methodologies are there by which data security in cloud computing can be achieved but at the same time it possesses many security risks. In this paper we describe several aspect of data security.

Key-Words / Index Term

Cloud Security, Security Challenges, Cloud computing

References

[1]. Peter Mell, and Tim Grance, "The NIST Definition of Cloud Computing, �2009, v15.pdf, Accessed Apri2010.
[2]. Maneesha Sharma, Himani Bansal, Amit KumarSharma ,�CloudComputing: Different Approach & Security Challenge � International Journal of Soft Computing and Engineering (IJSCE) ISSN: 2231-2307, Volume-2, Issue-1, March 2012 421.
[3]. Mohamed Al Morsy, John Grundy and Ingo M�ller. Computer Science & Software Engineering, Faculty of Information & Communication Technologies Swinburne University of Technology, Hawthorn, Victoria, Australia {malmorsy, jgrundy, imueller}@ swin.edu.au � An Analysis of The Cloud Computing Security Problem� In Proceedings of APSEC 2010 Cloud Workshop, Sydney, Australia, 30th Nov 2010.
[4]. Thomas Ristenpart, Eran Tromer, Hovav Shacham, Stefan Savage, "Hey, you, get off of my cloud: exploring information leakage in third-partycompute clouds," presented at the Proceedings of the 16th ACMconference on Computer and communications security, Chicago, Illinois, USA, 2009.
[5]. Microsoft. (2006, October, 2010). Multi-Tenant Data Architecture.