Cloud Computing Characteristics and Security Issues
S. Ayyub1 , D. Roy2
Section:Research Paper, Product Type: Journal Paper
Volume-1 ,
Issue-4 , Page no. 18-22, Dec-2013
Online published on Dec 31, 2013
Copyright © S. Ayyub, D. Roy . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
View this paper at Google Scholar | DPI Digital Library
How to Cite this Paper
- IEEE Citation
- MLA Citation
- APA Citation
- BibTex Citation
- RIS Citation
IEEE Style Citation: S. Ayyub, D. Roy, “Cloud Computing Characteristics and Security Issues,” International Journal of Computer Sciences and Engineering, Vol.1, Issue.4, pp.18-22, 2013.
MLA Style Citation: S. Ayyub, D. Roy "Cloud Computing Characteristics and Security Issues." International Journal of Computer Sciences and Engineering 1.4 (2013): 18-22.
APA Style Citation: S. Ayyub, D. Roy, (2013). Cloud Computing Characteristics and Security Issues. International Journal of Computer Sciences and Engineering, 1(4), 18-22.
BibTex Style Citation:
@article{Ayyub_2013,
author = {S. Ayyub, D. Roy},
title = {Cloud Computing Characteristics and Security Issues},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {12 2013},
volume = {1},
Issue = {4},
month = {12},
year = {2013},
issn = {2347-2693},
pages = {18-22},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=27},
publisher = {IJCSE, Indore, INDIA},
}
RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=27
TI - Cloud Computing Characteristics and Security Issues
T2 - International Journal of Computer Sciences and Engineering
AU - S. Ayyub, D. Roy
PY - 2013
DA - 2013/12/31
PB - IJCSE, Indore, INDIA
SP - 18-22
IS - 4
VL - 1
SN - 2347-2693
ER -
VIEWS | XML | |
4827 | 4625 downloads | 4594 downloads |
Abstract
Along with the development and application of Cloud Computing in recent years, Cloud Storage, as the module which provides data storage service in the Cloud Computing architecture, has become the kernel component of Cloud Computing. This is one of the advantages of cloud computing to create and store data at remote servers. But this advantage implicitly contains drawback of data security and privacy vulnerabilities. Many algorithms and methodologies are there by which data security in cloud computing can be achieved but at the same time it possesses many security risks. In this paper we describe several aspect of data security.
Key-Words / Index Term
Cloud Security, Security Challenges, Cloud computing
References
[1]. Peter Mell, and Tim Grance, "The NIST Definition of Cloud Computing, �2009, v15.pdf, Accessed Apri2010.
[2]. Maneesha Sharma, Himani Bansal, Amit KumarSharma ,�CloudComputing: Different Approach & Security Challenge � International Journal of Soft Computing and Engineering (IJSCE) ISSN: 2231-2307, Volume-2, Issue-1, March 2012 421.
[3]. Mohamed Al Morsy, John Grundy and Ingo M�ller. Computer Science & Software Engineering, Faculty of Information & Communication Technologies Swinburne University of Technology, Hawthorn, Victoria, Australia {malmorsy, jgrundy, imueller}@ swin.edu.au � An Analysis of The Cloud Computing Security Problem� In Proceedings of APSEC 2010 Cloud Workshop, Sydney, Australia, 30th Nov 2010.
[4]. Thomas Ristenpart, Eran Tromer, Hovav Shacham, Stefan Savage, "Hey, you, get off of my cloud: exploring information leakage in third-partycompute clouds," presented at the Proceedings of the 16th ACMconference on Computer and communications security, Chicago, Illinois, USA, 2009.
[5]. Microsoft. (2006, October, 2010). Multi-Tenant Data Architecture.