Open Access   Article Go Back

Issues and Challenges In Reducing Data Breaches in Cloud Architecture

Savrabh Kumar Sharma1 , Rajneesh Singh2

Section:Research Paper, Product Type: Journal Paper
Volume-6 , Issue-6 , Page no. 255-258, Jun-2018

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v6i6.255258

Online published on Jun 30, 2018

Copyright © Savrabh Kumar Sharma, Rajneesh Singh . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Savrabh Kumar Sharma, Rajneesh Singh, “Issues and Challenges In Reducing Data Breaches in Cloud Architecture,” International Journal of Computer Sciences and Engineering, Vol.6, Issue.6, pp.255-258, 2018.

MLA Style Citation: Savrabh Kumar Sharma, Rajneesh Singh "Issues and Challenges In Reducing Data Breaches in Cloud Architecture." International Journal of Computer Sciences and Engineering 6.6 (2018): 255-258.

APA Style Citation: Savrabh Kumar Sharma, Rajneesh Singh, (2018). Issues and Challenges In Reducing Data Breaches in Cloud Architecture. International Journal of Computer Sciences and Engineering, 6(6), 255-258.

BibTex Style Citation:
@article{Sharma_2018,
author = {Savrabh Kumar Sharma, Rajneesh Singh},
title = {Issues and Challenges In Reducing Data Breaches in Cloud Architecture},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {6 2018},
volume = {6},
Issue = {6},
month = {6},
year = {2018},
issn = {2347-2693},
pages = {255-258},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=2172},
doi = {https://doi.org/10.26438/ijcse/v6i6.255258}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i6.255258}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=2172
TI - Issues and Challenges In Reducing Data Breaches in Cloud Architecture
T2 - International Journal of Computer Sciences and Engineering
AU - Savrabh Kumar Sharma, Rajneesh Singh
PY - 2018
DA - 2018/06/30
PB - IJCSE, Indore, INDIA
SP - 255-258
IS - 6
VL - 6
SN - 2347-2693
ER -

VIEWS PDF XML
611 294 downloads 302 downloads
  
  
           

Abstract

Cloud computing has increased awesome consideration from industry yet there are numerous issues that are in their primitive stage which is hampering the development of Cloud. One of these issues is security of information put away in the servers of data centres of Cloud specialist organizations. Numerous plans have been produced till date for guaranteeing security of information in Distributed Systems. Many strategies have been contemplated; dissected and new technique has been proposed which infix the parameters of security like confidentiality of data, recovery of data and uprightness of information to such an extent that it guarantees security of information put away in the servers of Cloud frameworks. This paper examines the imperative research and troubles that presents data breach in Cloud computing and gives best practices to specialist organizations and moreover attempts intend to impact cloud servers to upgrade their fundamental problems in this genuine monetary situation.

Key-Words / Index Term

Cloud Computing, Data Breach, Distributes System, Data Security

References

[1] D Zissis, D Lekkas. Addressing cloud computing security issues. Future Generation computer systems. 583-92, 2012.
[2] M Ali, SU Khan, AV Vasilakos. Security in cloud computing: Opportunities and challenges. Information sciences. vol1, no305, pg,357-83, 2015.
[3] M. E. Smid and D. K. Branstad, “The data encryption standard: Past
and future,” Proc. IEEE, vol. 76, no. 5, pp. 550-559, 1988.
[4] Emily Maltby, “Small companies look to Cloud for savings in 2011,” http://online.wsj.com/article/SB10001424052970203513204576047972349898048.html, December 29, 2010.
[5] J. Feng, Y. Chen, P. Liu, “Bridging the missing link of Cloud data storage security in AWS,” Proc. IEEE 7th Consumer Communications and Networking Conference (CCNC 2010), pp. 1-2, Jan. 2010, doi: 10.1109/CCNC.2010.5421770.
[6] “What is AWS?,” http://aws.amazon.com/what-is-aws/
[7] A. Shamir, “How to share a secret,” Communications of the ACM, vol. 22, no. 11, pp. 612-613, 1979.
[8] M. O. Rabin, “Efficient dispersal of information for security, load balancing and fault tolerance,” Journal of the ACM, vol. 36, no. 2, pp. 335-348,1989
[9] M. O. Rabin, “Fingerprinting by random polynomials,” Report TR-15-81, Center for Research in Computing Technology, Harvard University, 1981.
[10] R. Pletka, C. Cachin, “Cryptographic security for a high-performance distributed file system,” IBM Research, Technical report, Sept. 2006.
[11] E. Gheringer, “Choosing passwords: security and human factors,” Proc. of IEEE 90, pp. 369–373, 2000.
[12] R. Proctor, M. Lien, K. Vu, G. Salvendy, “Improving computer security for authentication of users: influence of proactive password restrictions, Behavior Research Methods,” Instruments and Computers 34, pp.163–169, 200