Open Access   Article Go Back

A Secure Cloud Environment

P. Indu1 , S. Bhattachryya2

  1. School of Computers ,Inspiria Knowledge Campus, Maulana Abul Kalam Azad University of Technology, Siliguri, India.
  2. Department of Computer Science and Engineering, University Institute of Technology, The University of Burdwan, Burdwan, India.

Section:Research Paper, Product Type: Journal Paper
Volume-6 , Issue-3 , Page no. 303-315, Mar-2018

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v6i3.303315

Online published on Mar 30, 2018

Copyright © P. Indu, S. Bhattachryya . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: P. Indu, S. Bhattachryya, “A Secure Cloud Environment,” International Journal of Computer Sciences and Engineering, Vol.6, Issue.3, pp.303-315, 2018.

MLA Style Citation: P. Indu, S. Bhattachryya "A Secure Cloud Environment." International Journal of Computer Sciences and Engineering 6.3 (2018): 303-315.

APA Style Citation: P. Indu, S. Bhattachryya, (2018). A Secure Cloud Environment. International Journal of Computer Sciences and Engineering, 6(3), 303-315.

BibTex Style Citation:
@article{Indu_2018,
author = {P. Indu, S. Bhattachryya},
title = {A Secure Cloud Environment},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {3 2018},
volume = {6},
Issue = {3},
month = {3},
year = {2018},
issn = {2347-2693},
pages = {303-315},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=1800},
doi = {https://doi.org/10.26438/ijcse/v6i3.303315}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i3.303315}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=1800
TI - A Secure Cloud Environment
T2 - International Journal of Computer Sciences and Engineering
AU - P. Indu, S. Bhattachryya
PY - 2018
DA - 2018/03/30
PB - IJCSE, Indore, INDIA
SP - 303-315
IS - 3
VL - 6
SN - 2347-2693
ER -

VIEWS PDF XML
558 297 downloads 257 downloads
  
  
           

Abstract

Cloud Computing has been a one-key, cost-effective solution for many small I.T industries from past few decades in terms of storage, computation etc. It provides different kinds of services and infrastructural support. While cloud makes these services more appealing, it also brings some critical security threats to the cloud service users as well as to the cloud service providers. In this paper authors have tried to identify major security threats faced by different models of cloud in current day scenario and providing with some suitable solutions addressing those threats like One-time password, Homomorphic encryption technique, Access control and Data Recovery mechanism in different cloud deployment models.

Key-Words / Index Term

Third Party Auditor, One-time password, Homomorphic encryption technique, Access control and Data Recovery mechanism, Cloud Service User (CSU), Cloud Service Provider(CSP).

References

[1] P. Mell, T. Grance, NIST definition of cloud computing. National Institute of Standards and Technology, October 2009
[2] GTSI Group, “Cloud Computing - Building a Framework for Successful Transition,” White Paper, GTSI Corporation, 2009.
[3] Grace A. Lewis Research, Technology and Systems Solutions (RTSS) Program “Architectural Implications of Cloud Computing”, May 18, 2011
[4] Gens F, 2009,’ New IDC IT Cloud Services Survey: Top Benefits and Challenges’, IDC eXchange, viewed 18 February 2010, from .
[5] ISO. ISO 7498-2:1989. Information processing systems- Open Systems Interconnection. ISO 7498-2
[6] Dlamini M T, Eloff M M and Eloff J H P, ‘Internet of People, Things and Services – The Convergence of Security, Trust and Privacy’, 2009
[7] Md.TanzimKhorshed,A.B.M.ShawkatAli,SalehA.Wasimi,“Asurveyongaps,threatremediationchallengesandsomethoughtsforproactive attack detection in cloud computing”, School of Information and Communication Technology, CQ University QLD4702, Australia
[8] Cong Wang, Qian Wang, and Kui Ren Wenjing Lou, “Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing”, IEEE INFOCOM 2010
[9] Xiaojun Yu, Qiaoyan Wen, “A View About Cloud Data Security From Data Life Cycle”, IEEE ,2010
[10] Uma Somani, Kanika Lakhani, Manish Mundra , “Implementing Digital Signature with RSA Encryption Algorithm to Enhance the Data Security of Cloud in Cloud Computing” ,2010 1st International Conference on Parallel, Distributed and Grid Computing (PDGC - 2010),IEEE
[11] P. Syam Kumar, R. Subramanian and D. Thamizh Selvam, “Ensuring Data Storage Security in Cloud Computing using Sobol Sequence”, 2010 1st International Conference on Parallel, Distributed and Grid Computing (PDGC – 2010) ,IEEE.
[12] Xi Cao, Li Xu, Yuexin Zhang and Wei Wu, “Identity-based Proxy Signature for Cloud Service in SaaS”, Fourth International Conference on Intelligent Networking and Collaborative Systems, 2012,IEEE
[13] Junli Zhu, and Qiaoyan Wen, “SaaS Access Control Research Based on UCON”, Fourth International Conference on Digital Home, 2012,IEEE
[14] Kiyoshi Nishikawa, Kenji Oki and Akihiko Matsuo, “SaaS Application Framework using Information Gateway Enabling Cloud Service with Data Confidentiality”, 19th Asia-Pacific Software Engineering Conference,IEEE, 2012.
[15] Jinpeng Wei, Xiaolan Zhang, Glenn Ammons, Vasanth Bala,peng Ning. “Managing Security of virtual machine images in a cloud environment.” CCSW’09: Proceedings of the 2009 ACM workshop on Cloud computing security, November 2009, pp 91-96.
[16] Miranda Mowbray, Siani Pearson “A Client –based privacy Manager for Cloud Computing”. OMSWARE `09: Proceedings of the Fourth International ICST Conference on communication system software and middle ware, June 2009 ACM.
[17] Flavio Lombardi, Roberto Di Pietro. “Transparent Security for Cloud”. SAC `10: Proceedings of the 2010 ACM Symposium on Applied Computing, March 2010, pp 414-415.
[18] S.L.Mewada, U.K. Singh, P. Sharma, "Security Enhancement in Cloud Computing (CC)", International Journal of Scientific Research in Computer Science and Engineering, Vol.1, Issue.1, pp.31-37, 2013
[19] Shantanu Pal, Sunirmal Khatua, Nabendu Chaki, Sugata Sanyal, “A New Trusted and Collaborative Agent Based Approach for Ensuring Cloud Security”, Annals of Faculty Engineering Hunedoara International Journal of Engineering (Archived copy), scheduled for publication in vol. 10, issue 1, January 2012. ISSN: 1584-2665.
[20] "IBM`s homomorphic encryption could revolutionize security" was originally published at InfoWorld.com.
[21] Pabak Indu, Souvik Bhattacharyya and Gautam Sanyal,“Different Aspects in Cloud Computing: A Comprehensive Review” Elixir Inform. Tech. 71 (2014) 24594-24602,June 2014.