Open Access   Article Go Back

Cloud Computing and Data Security : AWS and Google Case Study

Rajinder Singh1

Section:Research Paper, Product Type: Journal Paper
Volume-7 , Issue-2 , Page no. 164-171, Feb-2019

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v7i2.164171

Online published on Feb 28, 2019

Copyright © Rajinder Singh . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Rajinder Singh, “Cloud Computing and Data Security : AWS and Google Case Study,” International Journal of Computer Sciences and Engineering, Vol.7, Issue.2, pp.164-171, 2019.

MLA Style Citation: Rajinder Singh "Cloud Computing and Data Security : AWS and Google Case Study." International Journal of Computer Sciences and Engineering 7.2 (2019): 164-171.

APA Style Citation: Rajinder Singh, (2019). Cloud Computing and Data Security : AWS and Google Case Study. International Journal of Computer Sciences and Engineering, 7(2), 164-171.

BibTex Style Citation:
@article{Singh_2019,
author = {Rajinder Singh},
title = {Cloud Computing and Data Security : AWS and Google Case Study},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {2 2019},
volume = {7},
Issue = {2},
month = {2},
year = {2019},
issn = {2347-2693},
pages = {164-171},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=3638},
doi = {https://doi.org/10.26438/ijcse/v7i2.164171}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v7i2.164171}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=3638
TI - Cloud Computing and Data Security : AWS and Google Case Study
T2 - International Journal of Computer Sciences and Engineering
AU - Rajinder Singh
PY - 2019
DA - 2019/02/28
PB - IJCSE, Indore, INDIA
SP - 164-171
IS - 2
VL - 7
SN - 2347-2693
ER -

VIEWS PDF XML
514 414 downloads 188 downloads
  
  
           

Abstract

Cloud Computing is today’s exciting technology. Cloud computing means delivering various computer resources over the internet. Main examples of cloud services are webmail, social networking sites and business applications. Depending upon the services clouds can be divided into three categories SaaS, PaaS and IaaS. Depending upon the location clouds can be divided into four parts public, private, hybrid and community. Cloud security is very important to organization because data is very important to organizations as well as for the individuals. Depending upon the type of cloud and types of services, security is the two way responsibility. Security is responsibility of both the cloud service providers and users. Three major organizations which provide the cloud service are Azure, Google and AWS. This study discusses various features of Google Cloud and AWS with respect to security. Both these organizations give high priority to the security of user’s data. Both these organizations follow layer wise approach to protect user’s data. These organizations also provide their own build tools for security and privacy of the data.

Key-Words / Index Term

Cloud Security, Iaas, PaaS, SaaS, Data Encryption, DDoS

References

[1] M. Armbrust, A. Fox, R. Griffith, A. D. Joseph, R. Katz, A. Konwinski,G. Lee, D. Patterson, A. Rabkin, I. Stoica et al., “A view of cloud computing,” Communications of the ACM, vol. 53, no. 4, pp. 50–58, 2010.
[2] Z. Xiao and Y. Xiao, “Security and privacy in cloud computing,” IEEE Communications Surveys & Tutorials, vol. 15, no. 2, pp. 843–859, 2013.
[3] https://azure.microsoft.com/en-in/overview/what-is-cloud-computing/
[4] https://en.wikipedia.org/wiki/Cloud_computing
[5] http://en.wikipedia.org/wiki/Cloud_computing_architecture
[6] Hashizume, Keiko, et al. "An analysis of security issues for cloud computing." Journal of internet services and applications 4.1 (2013): 5.
[7] http://searchcloudcomputing.techtarget.com/definition/public-cloud
[8] Padhy, Rabi Prasad, Manas Ranjan Patra, and Suresh Chandra Satapathy. "Cloud computing: security issues and research challenges." International Journal of Computer Science and Information Technology & Security (IJCSITS) 1.2 (2011): 136-146.
[9] https://www.interoute.com/what-hybrid-cloud
[10] http://www.globaldots.com/cloud-computing-types-of-cloud/
[11] http://en.wikipedia.org/wiki/Cloud_computing_security
[12] https://www.linkedin.com/pulse/cloud-computing-security-sandesh-h-n
[13] https://aws.amazon.com/security/
[14] https://cloud.google.com/security/infrastructure/design/
[15] https://cloud.google.com/security/overview/whitepaper
[16] Sun, Yunchuan, et al. "Data security and privacy in cloud computing." International Journal of Distributed Sensor Networks 10.7 (2014): 190903.
[17] https://www.esds.co.in/blog/cloud-computing-security-questions/#sthash.JIZjE8JG.dpbs