Open Access   Article Go Back

Cloud Security Issues, Techniques and Concerns – An Overview

V. Negi1

Section:Review Paper, Product Type: Journal Paper
Volume-7 , Issue-1 , Page no. 610-614, Jan-2019

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v7i1.610614

Online published on Jan 31, 2019

Copyright © V. Negi . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: V. Negi, “Cloud Security Issues, Techniques and Concerns – An Overview,” International Journal of Computer Sciences and Engineering, Vol.7, Issue.1, pp.610-614, 2019.

MLA Style Citation: V. Negi "Cloud Security Issues, Techniques and Concerns – An Overview." International Journal of Computer Sciences and Engineering 7.1 (2019): 610-614.

APA Style Citation: V. Negi, (2019). Cloud Security Issues, Techniques and Concerns – An Overview. International Journal of Computer Sciences and Engineering, 7(1), 610-614.

BibTex Style Citation:
@article{Negi_2019,
author = {V. Negi},
title = {Cloud Security Issues, Techniques and Concerns – An Overview},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {1 2019},
volume = {7},
Issue = {1},
month = {1},
year = {2019},
issn = {2347-2693},
pages = {610-614},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=3553},
doi = {https://doi.org/10.26438/ijcse/v7i1.610614}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v7i1.610614}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=3553
TI - Cloud Security Issues, Techniques and Concerns – An Overview
T2 - International Journal of Computer Sciences and Engineering
AU - V. Negi
PY - 2019
DA - 2019/01/31
PB - IJCSE, Indore, INDIA
SP - 610-614
IS - 1
VL - 7
SN - 2347-2693
ER -

VIEWS PDF XML
270 220 downloads 119 downloads
  
  
           

Abstract

Among cloud computing resources like networks, servers, storage, applications and services, Storage is one of the major resource that is being used at large by the cloud users. Small to mid-sized business houses use Storage-as-a-Service to enhance business availability and reliability, managing backups and to extenuate risks involved in disaster recovery. Security, therefore, becomes the most critical aspect due to the confidential and intimate information being stored on the public cloud. In public cloud, since the services are being provided by the third party service providers, which are geographically dispersed and involve resources outside the user’s premises, the three service models (IaaS, PaaS, SaaS) face serious security threats. Public cloud can fall prey to threats like Data breaches, insufficient identity, insecure APIs, system vulnerabilities, account hijacking, malicious insiders, data loss, insufficient due diligence, DoS and abuse of cloud services. This paper presents a review on the most pressing security issues within cloud computing, the techniques that can be employed in addressing such cloud security issues and the challenges.

Key-Words / Index Term

Cloud Computing, Security Issues, Cloud Security, Cloud Data Storage Security

References

[1] G. Vandana T. et al, “Improve Security of Data Access in Cloud Computing using Location”, International Journal of Computer Science and Mobile Computing, Vol.4 Issue.2, February-2015.
[2] P. Xul, et al, “SSDS-MC: Slice-based Secure Data Storage in MultiCloud Environment”, In the Proceedings of the 11th EAI International Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness (QSHINE 2015) pp. 304-309, 2015.
[3] N. Jose, C. Kanmani A, “Data Security Mode Enhancement in Cloud Environment”, Journal of Computer Engineering Vol. 10, Issue 2, 2013.
[4] V. R. Balasaraswathi, S. Manikandan, “Enhanced security for multi-cloud storage using cryptographic data splitting with dynamic approach”, In the Proceedings of the 2014 IEEE Advanced Communication, Control and Computing Technologies (ICACCCT 2014), pp. 1190-1194, 2014.
[5] S. Ajoudanian, M. R. Ahmadi, “A Novel Data Security Model for Cloud Computing”, International Journal of Engineering and Technology, Vol.4, No.3, June 2012.
[6] B. Fabian et al, “Collaborative and secure sharing of healthcare data in multi-clouds”, Information Systems, Vol. 48, pp. 132-150, 2015.
[7] D. Manivannan, R. Sujarani, “Light Weight and Secure Database Encryption using Tsfs Algorithm”, In the Proceedings of the Second International Conference on Computing Communication and Networking Technologies, Karur, pp. 1-7, 2010.
[8] Mazhar Ali, et al, “SeDaSC: Secure Data Sharing in Clouds”, Systems Journal, IEEE pp 1-10, 2014.
[9] V. Negi, M. Kalra, “Optimizing Battery Utilization and Reducing Time Consumption in Smartphones Exploiting the Power of Cloud Computing”, In the Proceedings of the Second International Conference on Soft Computing for Problem Solving (SocProS 2012), New Delhi, India, pp. 865-872, 2012.
[10] V. Negi, M. Kalra, “Framework for energy saving in the Android smartphone”, 2013 2nd International Conference on Information Management in the Knowledge Economy, India, pp. 161-165, 2013.
[11] J. Gantz, P. Miller, “The Salesforce Economy: Enabling 1.9 Million New Jobs and $389 Billion in New Revenue Over the Next Five Years”, IDC Whitepaper, IDC #US41691316, September 2016.
[12] L. Goasduff, C. Pettey, “Worldwide Public Cloud Services Market to Grow 18 Percent in 2017”, Gartner Press Releases, Stamford, February 22, 2017.
[13] J. M. Brook, et al, “The Treacherous 12 - Top Threats to Cloud Computing and Industry Insights”, Cloud Security Alliance, 2017.
[14] R. V. Dharmadhikari, et al, “Cloud Computing: Data Storage Protocols and Security Techniques”, International Journal of Scientific Research in Computer Science and Engineering, Vol.6, Issue.2, pp.113-118, 2018.
[15] Yogita G. Patil, Pooja S. Deshmukh, "A Review: Mobile Cloud Computing: Its Challenges and Security", International Journal of Scientific Research in Network Security and Communication, Vol.06, Issue.01, pp.11-13, 2018.