Open Access   Article Go Back

A Comprehensive Study of Security in Cloud Computing

Manjot Kaur Bhatia1 , Akash Bhardwaj2 , Diksha Singla3

Section:Review Paper, Product Type: Journal Paper
Volume-6 , Issue-12 , Page no. 394-398, Dec-2018

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v6i12.394398

Online published on Dec 31, 2018

Copyright © Manjot Kaur Bhatia, Akash Bhardwaj, Diksha Singla . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Manjot Kaur Bhatia, Akash Bhardwaj, Diksha Singla, “A Comprehensive Study of Security in Cloud Computing,” International Journal of Computer Sciences and Engineering, Vol.6, Issue.12, pp.394-398, 2018.

MLA Style Citation: Manjot Kaur Bhatia, Akash Bhardwaj, Diksha Singla "A Comprehensive Study of Security in Cloud Computing." International Journal of Computer Sciences and Engineering 6.12 (2018): 394-398.

APA Style Citation: Manjot Kaur Bhatia, Akash Bhardwaj, Diksha Singla, (2018). A Comprehensive Study of Security in Cloud Computing. International Journal of Computer Sciences and Engineering, 6(12), 394-398.

BibTex Style Citation:
@article{Bhatia_2018,
author = {Manjot Kaur Bhatia, Akash Bhardwaj, Diksha Singla},
title = {A Comprehensive Study of Security in Cloud Computing},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {12 2018},
volume = {6},
Issue = {12},
month = {12},
year = {2018},
issn = {2347-2693},
pages = {394-398},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=3350},
doi = {https://doi.org/10.26438/ijcse/v6i12.394398}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i12.394398}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=3350
TI - A Comprehensive Study of Security in Cloud Computing
T2 - International Journal of Computer Sciences and Engineering
AU - Manjot Kaur Bhatia, Akash Bhardwaj, Diksha Singla
PY - 2018
DA - 2018/12/31
PB - IJCSE, Indore, INDIA
SP - 394-398
IS - 12
VL - 6
SN - 2347-2693
ER -

VIEWS PDF XML
378 331 downloads 187 downloads
  
  
           

Abstract

Cloud computing has become a popular model for reducing cost of business, improvise quality of services, and provide good & secure computing. It opens up the Computing World by providing the access to anything and anywhere through Internet. It acts as a spectrum of substantial interest among IT professionals, technocrats & business leaders due to these proven potentials. Numerous emerging computing paradigms database outsourcing serves as future advantages of cloud computing. With the increasing speed of its popularity, many security questions are arising with their respective solutions aiming to give a better understanding of their complex scenario, in this paper we will provide a comprehensive view over security in context of cloud computing and also provide a view of current status of security at present. To start with, we`ll take a look at various Cloud computing models, cloud computing deployment models, key issues in security along with challenges in provocation of permissions to various platforms.

Key-Words / Index Term

Cloud Computing, secure computing, database outsourcing, deployment models, challenges

References

[1] M. Sadiku, S. Musa, O. Momoh, Cloud computing: opportunities and challenges, IEEE Potentials 33 (1) (2014) 34–36.
[2] D. AB. Fernandes, L. FB. Soares, J.V. Gomes, M.M. Freire, P. RM Inácio, Security issues in cloud environments: a survey, Int. J. Inform. Sec. 13 (2) (2014), 113–170.
[3] Mell, Peter, and Tim Grance. "The NIST definition of cloud computing." 2011.
[4] Ali, Mazhar, Samee U. Khan, and Athanasios V. Vasilakos. "Security in cloud computing: Opportunities and challenges." Information Sciences 305 (2015): 357-383.
[5] L. FB Soares, D. AB Fernandes, J.V. Gomes, M.M. Freire, P. RM Inácio, Cloud security: state of the art, in: Security, Privacy and Trust in Cloud Systems, Springer, Berlin, Heidelberg, 2014, pp. 3–44.
[6] Alessandro Iudica, Understanding the Cloud v1.0, December 2014, IBM Education Understanding The Cloud 1, © 2013 IBM Corporation.
[7] H. Yu, N. Powell, D. Stembridge, X. Yuan, Cloud computing and security challenges, in: Proceedings of the 50th Annual Southeast Regional Conference, ACM, 2012, pp. 298–302.
[8] Vishnu Patidar, Makhan Kumbhkar, "Analysis of Cloud Computing Security Issues in Software as a Service", International Journal of Scientific Research in Computer Science and Engineering, Vol.2, Issue.3, pp.1-5, 2014.
[9] R.Piplode, P. Sharma and U.K. Singh, "Study of Threats, Risk and Challenges in Cloud Computing", International Journal of Scientific Research in Computer Science and Engineering, Vol.1, Issue.1, pp.26-30, 2013.