Open Access   Article Go Back

Cloud Computing Security Techniques for Enhancing Utilization Efficiency

Jaya 1 , Kiranbir Kaur2

Section:Research Paper, Product Type: Journal Paper
Volume-6 , Issue-4 , Page no. 308-311, Apr-2018

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v6i4.308311

Online published on Apr 30, 2018

Copyright © Jaya, Kiranbir Kaur . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Jaya, Kiranbir Kaur, “Cloud Computing Security Techniques for Enhancing Utilization Efficiency,” International Journal of Computer Sciences and Engineering, Vol.6, Issue.4, pp.308-311, 2018.

MLA Style Citation: Jaya, Kiranbir Kaur "Cloud Computing Security Techniques for Enhancing Utilization Efficiency." International Journal of Computer Sciences and Engineering 6.4 (2018): 308-311.

APA Style Citation: Jaya, Kiranbir Kaur, (2018). Cloud Computing Security Techniques for Enhancing Utilization Efficiency. International Journal of Computer Sciences and Engineering, 6(4), 308-311.

BibTex Style Citation:
@article{Kaur_2018,
author = {Jaya, Kiranbir Kaur},
title = {Cloud Computing Security Techniques for Enhancing Utilization Efficiency},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {4 2018},
volume = {6},
Issue = {4},
month = {4},
year = {2018},
issn = {2347-2693},
pages = {308-311},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=1890},
doi = {https://doi.org/10.26438/ijcse/v6i4.308311}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i4.308311}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=1890
TI - Cloud Computing Security Techniques for Enhancing Utilization Efficiency
T2 - International Journal of Computer Sciences and Engineering
AU - Jaya, Kiranbir Kaur
PY - 2018
DA - 2018/04/30
PB - IJCSE, Indore, INDIA
SP - 308-311
IS - 4
VL - 6
SN - 2347-2693
ER -

VIEWS PDF XML
727 375 downloads 170 downloads
  
  
           

Abstract

Cloud computing provides resources or services both in terms of hardware and software using network (typically internet). Physical machines thus can perform operations beyond their capabilities. Cloud provides services including IaaS, PaaS and SaaS. Everything user needs is physically close to them hence extensive use of cloud is on the prospect. As users increases so does security threats. Cloud resources could be the target through application of attacks. Several techniques being suggested and research over to avoid critical consequence of threats. This paper provides comprehensive study of techniques used to enhance security within cloud computing environment. Comparative study also list best possible techniques which can work upon in the future.

Key-Words / Index Term

Cloud, Services, Attacks, Threats

References

[1] N. Wahidah, B. Ab, K. Jenni, S. Mandala, and E. Supriyanto, “Review On Cloud Computing Application In P2P Video Streaming,” Procedia - Procedia Comput. Sci., vol. 50, pp. 185–190, 2015.
[2] J. Aikat, N. Carolina, J. S. Chase, A. Juels, C. Tech, T. Ristenpart, and C. Tech, “Rethinking Security in the Era of Cloud Computing,” no. June, 2017.
[3] B. Nicolae, “BlobCR : Efficient Checkpoint-Restart for HPC Applications on IaaS Clouds using Virtual Disk Image Snapshots.”
[4] C. Pahl and I. Centre, “Containerization and the PaaS Cloud,” 2015.
[5] R. Buyya, “Introduction to the IEEE Transactions on Cloud Computing,” vol. 1, no. 1, pp. 3–21, 2013.
[6] K. Li, W. Zhang, C. Yang, and N. Yu, “Security Analysis on One-to-Many Order Preserving Encryption Based Cloud data Search,” vol. 6013, no. c, pp. 1–9, 2015.
[7] J. I. A. You, Z. Zhong, G. Wang, B. O. Ai, and S. Member, “Security and Reliability Performance Analysis for Cloud Radio Access Networks With Channel Estimation Errors,” vol. 2, 2014.
[8] X. Wu, R. Jiang, and B. Bhargava, “On the Security of Data Access Control for Multiauthority Cloud Storage Systems,” pp. 1–14, 2015.
[9] B. Feng, X. Ma, C. Guo, H. Shi, Z. Fu, T. Qiu, and S. Member, “An Efficient Protocol with Bidirectional Verification for Storage,” vol. 3536, no. c, pp. 1–13, 2016.
[10] F. Sabahi, “Cloud Computing Security Threats and Responses,” pp. 245–249, 2011.
[11] S. Abdelwahab, B. Hamdaoui, M. Guizani, and T. Znati, “R EPLISOM : Disciplined Tiny Memory Replication for Massive IoT Devices in LTE Edge Cloud,” vol. 4662, no. c, 2015.
[12] A. Sharma and S. Sharma, “Credit Based Scheduling Using Deadline in Cloud Computing Environment,” pp. 1588–1594, 2016.
[13] Y. Zhao and S. S. M. Chow, “Updatable Block-Level Message-Locked Encryption,” pp. 449–460, 2017.
[14] P. You, Y. Peng, W. Liu, and S. Xue, “Security Issues and Solutions in Cloud Computing,” 2012.
[15] Z. Xiao, W. Song, and Q. Chen, “Dynamic Resource Allocation Using Virtual Machines for Cloud Computing Environment,” IEEE Trans. Parallel Distrib. Syst., vol. 24, no. 6, pp. 1107–1117, Jun. 2013.
[16] C.-N. Yang and J.-B. Lai, “Protecting Data Privacy and Security for Cloud Computing Based on Secret Sharing,” in 2013 International Symposium on Biometrics and Security Technologies, 2013, pp. 259–266.
[17] X. Li, J. Li, and F. Huang, “A secure cloud storage system supporting privacy-preserving fuzzy deduplication,” Soft Comput., Jan. 2015.
[18] S. Guilloteau, F. T. Orange, France, and V. Mauree, “Privacy in Cloud Computing,” Media Informatics, no. March, p. 26, 2012.
[19] T. H. Noor, Q. Z. Sheng, L. Yao, S. Dustdar, and A. H. H. Ngu, “CloudArmor: Supporting Reputation-Based Trust Management for Cloud Services,” IEEE Trans. Parallel Distrib. Syst., vol. 27, no. 2, pp. 367–380, Feb. 2016.
[20] C. Wang, N. Cao, J. Li, K. Ren, and W. Lou, “Secure Ranked Keyword Search over Encrypted Cloud Data,” in 2010 IEEE 30th International Conference on Distributed Computing Systems, 2010, pp. 253–262.
[21] O. Harfoushi, B. Alfawwaz, N. a. Ghatasheh, R. Obiedat, M. M. Abu-Faraj, and H. Faris, “Data Security Issues and Challenges in Cloud Computing: A Conceptual Analysis and Review,” Commun. Netw., vol. 06, no. 01, pp. 15–21, 2014.
[22] K. Hwang, X. Bai, Y. Shi, M. Li, W.-G. Chen, and Y. Wu, “Cloud Performance Modeling with Benchmark Evaluation of Elastic Scaling Strategies,” IEEE Trans. Parallel Distrib. Syst., vol. 27, no. 1, pp. 130–143, Jan. 2016.
[23] H. Wang, Z. Kang, and L. Wang, “Performance-Aware Cloud Resource Allocation via Fitness-Enabled Auction,” IEEE Trans. Parallel Distrib. Syst., vol. 27, no. 4, pp. 1160–1173, Apr. 2016.
[24] K. Yang and X. Jia, “An Efficient and Secure Dynamic Auditing Protocol for Data Storage in Cloud Computing,” IEEE Trans. Parallel Distrib. Syst., vol. 24, no. 9, pp. 1717–1726, Sep. 2013.