Open Access   Article Go Back

Data Security and Service Overloading in Cloud Computing –An overview

Ramesh Prasad Vishwakarma1 , Sitendra Tamrakar2 , Rishi Kumar Sharma3

  1. Dept. of IT, AISECT University, Bhopal, India.
  2. Dept. of CS, AISECT University Bhopal, India.
  3. Dept. of CS, AISECT University Bhopal, India.

Correspondence should be addressed to: rameshaisect@gmail.com.

Section:Review Paper, Product Type: Journal Paper
Volume-5 , Issue-8 , Page no. 177-180, Aug-2017

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v5i8.177180

Online published on Aug 30, 2017

Copyright © Ramesh Prasad Vishwakarma, Sitendra Tamrakar, Rishi Kumar Sharma . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Ramesh Prasad Vishwakarma, Sitendra Tamrakar, Rishi Kumar Sharma, “Data Security and Service Overloading in Cloud Computing –An overview,” International Journal of Computer Sciences and Engineering, Vol.5, Issue.8, pp.177-180, 2017.

MLA Style Citation: Ramesh Prasad Vishwakarma, Sitendra Tamrakar, Rishi Kumar Sharma "Data Security and Service Overloading in Cloud Computing –An overview." International Journal of Computer Sciences and Engineering 5.8 (2017): 177-180.

APA Style Citation: Ramesh Prasad Vishwakarma, Sitendra Tamrakar, Rishi Kumar Sharma, (2017). Data Security and Service Overloading in Cloud Computing –An overview. International Journal of Computer Sciences and Engineering, 5(8), 177-180.

BibTex Style Citation:
@article{Vishwakarma_2017,
author = {Ramesh Prasad Vishwakarma, Sitendra Tamrakar, Rishi Kumar Sharma},
title = {Data Security and Service Overloading in Cloud Computing –An overview},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {8 2017},
volume = {5},
Issue = {8},
month = {8},
year = {2017},
issn = {2347-2693},
pages = {177-180},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=1411},
doi = {https://doi.org/10.26438/ijcse/v5i8.177180}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v5i8.177180}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=1411
TI - Data Security and Service Overloading in Cloud Computing –An overview
T2 - International Journal of Computer Sciences and Engineering
AU - Ramesh Prasad Vishwakarma, Sitendra Tamrakar, Rishi Kumar Sharma
PY - 2017
DA - 2017/08/30
PB - IJCSE, Indore, INDIA
SP - 177-180
IS - 8
VL - 5
SN - 2347-2693
ER -

VIEWS PDF XML
985 379 downloads 428 downloads
  
  
           

Abstract

In the modern time of computing, Cloud computing will perform a major technical role in the IT world. Although various cloud service models are there present, Infrastructure as a Service (IAAS) has become the base of the next future Network of Services (NOS). Several advantages of cloud computing attracts the persons and organization to move their data from remote to the cloud. Cloud Providers mostly focus on providing services and provides a lesser focus on data security and privacy which is the main side of cloud computing. Since the single cloud storage does not fulfill the demands of the individuals and organizations, a move towards multi-cloud storage (MCS) has been emerged. In this report presents an overview of motivation of service overloading, attackers, different techniques and its limitations made to protect data security in the cloud storage .In this paper also explains the usual challenges in cloud storage services. This work delivers a superior solution in the service over loading architecture and key thought in the decision making process for the individuals and organizations in the adoption of superior cloud storage service.

Key-Words / Index Term

Service Overloading, Cloud Security, Data Security, Single and Multi-Cloud Storage

References

[1]. Bincy Paul and M. Azath, "Survey on Preserving Data Privacy in Cloud", International Journal of Computer Sciences and Engineering, Vol.2, Issue.12, pp.57-61, 2014.
[2]. B. Michael, "In Cloud Shall We Trust?`" IEEE Security& Privacy, Sept./Oct. 2009, p. 3.
[3]. F. Gens, "IT Cloud Services User Survey, pt.2: Top Benefits & Challenges,`" blog, http://blogs.idc.com /ie/?p=21 0, 2008.
[4].Venkata Josyula, Malcom Orr, Greg Page, “Cloud omputing:Automating the Virtualized Data Center” Cisco Press 2012.
[5].P. F. Oliveira, L. Lima, T. T. V. Vinhoza, 1. Barros, M. M`edard, "Trusted storage over untrusted networks", IEEE GLOBECOM , Miami, FL.USA, 2010
[6].www.hbr.org
[7].Fabian, B., Ermakova, T., & Junghanns, P., “ Collaborative and secure sharing of healthcare data in multi-clouds, Information Systems, 48, 132-150, 2015.
[8]. Thilakanathan, D., Chen, S., Nepal, S., & Calvo, R. A., “ Secure data sharing in the cloud”, In Security, Privacy and Trust in Cloud Systems, Springer Berlin Heidelberg., pp. 45-72 2014.
[9]. Balasaraswathi, V. R., & Manikandan, S., “Enhanced security for multi-cloud storage using cryptographic data splitting with dynamic approach”, In 2014 International Conference on Advanced Communication, Control and Computing Technologies (ICACCCT), pp. 1190- 1194.
[10] P. Ranjima, Sumathi. D , M. Mathew, P. Sivaprakash, "Secure Cloud Storage with Access Control: A Survey", International Journal of Computer Sciences and Engineering, Vol.2, Issue.8, pp.124-126, 2014.
[11]. WANG Liang-Liang, CHEN Ke-Fei, MAO Xian-ping, WANG Yong- Tao, “Efficient and Provably-Secure Certificateless Proxy Re-encryption Scheme for Secure Cloud Data Sharing” Journal of Shanghai Jiaotong University, Vol.19, Issue.4, pp.398-405, 2014.
[12]. Peng Xul, Xiaqi LiU, Zhenguo Sheng, Xuan Shan`, Kai Shuang “SSDS- MC: Slice-based Secure Data Storage in MultiCloud Environment”, 11th EAI International Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness (QSHINE 2015) pp.304-309.
[13]. Yuuki Kajiura, Shohei Ueno, Atsushi Kanai, Shigeaki Tanimoto, Hiroyuki Sato, “An Approach to Selecting Cloud Services for Data Storage in Heterogeneous-Multicloud Environment with High Availability and Confidentiality”, Autonomous Decentralized Systems (ISADS) IEEE Twelfth International Symposium, pp.205-210, 2015.
[14].Hendrik Graupner, Kennedy Torkura, Philipp Berger, Christoph Meinel “Secure Access Control For Multi-Cloud Resources Local” Computer Networks Conference Workshops (LCN Workshops), 2015 pp 722-729.
[15].Hazila Hasan, Sultan Abdul Halim Muadzam Shah Secured Data Partitioning in Multi Cloud Environment Information And Communication Technologies (]WICT), 2014 pp146-151.
[16]. Xu, L., Wu, X., & Zhang, X., “CL-PRE: A certificate less proxy re-encryption scheme for secure data sharing with public cloud. In Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security, pp. 87-88, 2012.
[17]. Michael O. Rabin, “Efficient Dispersal of Information Security, Load Balancing, and Fault Tolerance”, Journal of Association for Computing Machinery, pp.335-348, 1989.
[18] P. Thakkar, H.K. Mishra, Z. Shaikh, D. Sharma, "Image Encryption and Decryption System Using AES for Secure Transmission", International Journal of Computer Sciences and Engineering, Vol.5, Issue.5, pp.109-114, 2017.
[19]. V.P.Muthukumar and R.Saranya, "A Survey on Security Threats and Attacks in Cloud Computing", International Journal of Computer Sciences and Engineering, Vol.2, Issue.11, pp.120-125, 2014.
[20]. J.-M. Bohli, N. Gruschka, M. Jensen, L. L. Iacono, and N. Marnau, “Security and Privacy-Enhancing Multicloud Architectures,” IEEE Transactions on Dependable and Secure Computing, vol. 10, no. 4, pp. 212–224, Jul. 2013.
[21]. Nitesh Jain, Pradeep Sharma, "A Security Key Management Model for Cloud Environment", International Journal of Scientific Research in Computer Science and Engineering, Vol.5, Issue.1, pp.45-48, 2017.
[22]. N. Deshai, P. Penchala Swamy, G.P. Saradhi Varma, "Enhanced Query Processing Technique Using RASP Effective Services in Cloud", International Journal of Scientific Research in Computer Science and Engineering, Vol.5, Issue.4, pp.75-77, 2017.
[23]. B.Rex Cyril, Dr.S.Britto Ramesh Kumar, “Cloud Computing Data Security Issues, Challenges, Architectures and Methods-A Survey”, International Journal of Engineering and Technology, Vol.2, Issue.4, 2015.