Open Access   Article Go Back

Security Aspects of Cloud Based Environments

E. Suganthi1 , F. Kurus Malai Selvi2

Section:Research Paper, Product Type: Journal Paper
Volume-07 , Issue-04 , Page no. 239-242, Feb-2019

Online published on Feb 28, 2019

Copyright © E. Suganthi, F. Kurus Malai Selvi . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: E. Suganthi, F. Kurus Malai Selvi, “Security Aspects of Cloud Based Environments,” International Journal of Computer Sciences and Engineering, Vol.07, Issue.04, pp.239-242, 2019.

MLA Style Citation: E. Suganthi, F. Kurus Malai Selvi "Security Aspects of Cloud Based Environments." International Journal of Computer Sciences and Engineering 07.04 (2019): 239-242.

APA Style Citation: E. Suganthi, F. Kurus Malai Selvi, (2019). Security Aspects of Cloud Based Environments. International Journal of Computer Sciences and Engineering, 07(04), 239-242.

BibTex Style Citation:
@article{Suganthi_2019,
author = {E. Suganthi, F. Kurus Malai Selvi},
title = {Security Aspects of Cloud Based Environments},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {2 2019},
volume = {07},
Issue = {04},
month = {2},
year = {2019},
issn = {2347-2693},
pages = {239-242},
url = {https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=762},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=762
TI - Security Aspects of Cloud Based Environments
T2 - International Journal of Computer Sciences and Engineering
AU - E. Suganthi, F. Kurus Malai Selvi
PY - 2019
DA - 2019/02/28
PB - IJCSE, Indore, INDIA
SP - 239-242
IS - 04
VL - 07
SN - 2347-2693
ER -

           

Abstract

Cloud computing is a specialized form of distributed computing. It involves introduction of utilisation models for effective utilisation, remote provisioning, and scalability of measured resources available, ending up in creating useful working environments. Virtualization separates functions from hardware and allows creation of multiple simulated environments or dedicated resources from one physical hardware system to other. It gives specific users, access to packaged resources in on-demand basis, for specific purposes. Virtualisation allows all types of resources to be added to a system, which is managed by a single operating system or Administrator. The concept of virtualization has two serious battles ahead, one is that of data security and the other one is to meet the demand from corporate to store their client data safely. The threat of data breach is generating newer techniques in virtualisation leading to multiple virtual environments being linked,so that it reduces possibility of hardware failure and data security breach. Virtualisation management is also one key element of the virtualisation process and it provides the ability to create, modify, transform and link the virtualised environments in order to effectively manage the environment. With the advent of linking virtual environments, new concept of Multi cloud has come up, wherein multiple cloud services are interconnected or multiple cloud services are accessed by the user for one particular job. This paper proposes to look upon the techniques that shall transform the future of cloud and the security or insecurity that shall come with it.

Key-Words / Index Term

Virtualization, Cloud computing, Multi cloud, Data security, Virtual environments

References

[1]http://www.thesmallbusiness.org/software/benefits-of-cloudcomputing.html
[2]http://www.allthingscrm.com/cloudcoomputing/understanding-cloudcomputing-applications.html
[3] http://en.wikipedia.org/wiki/Cloud_computing
[4] http://www.wikinvest.com/concept/Cloud_Computing
[5]Cloud computing security challenges &solutions a survey https://ieeexplore.ieee.org/document/8301700/ by S Basu- 2018
[6]Cloudcomputing Trends to-prepare-for-in-2018
[7] C. Divya Shaly, R. Anbuselvi, ” Multi-Cloud Data Hosting for Protection Optimizationand Security”-International Journal of Computer Science and MobileComputing. April 2016.
[8] A. Manimaran and K. Somasundaram.”An efficient Data Security Mechanismin Cloud Computing Using Anonymous ID algorithm. 2016.
[9] Mark D. Ryan, “Cloud computing security: The Scientific challenge and aSurvey of solutions”. Elsevier 02013.
[10] AlZain, M.A.; Soh, B.; Pardede, E. (2011). MCDB: Using Multi-clouds to Ensure Security in Cloud Computing. Dependable, Autonomic and SecureComputing (DASC). 2011 IEEE Ninth International Conference on , vol., no.,pp.784,791, 12-14.
[11] Chang, V.; Bacigalupo, D.; Wills, G.; De Roure, D. (2010). A Categorisation of Cloud Computing Business Models. Cluster, Cloud and Grid Computing (CCGrid). 2010 10th IEEE/ACM International Conference on , vol., no.,
pp.509,512, 17-20.
[12] AlZain, M.A.; Pardede, E.; Soh, B.; Thom, J.A. (2012). Cloud Computing Security: From Single to Multi-clouds. System Science (HICSS). 2012 45th Hawaii International Conference on, vol., no., pp.5490, 5499, 4-7.
[13] Barinder Kaur and Sandeep Sharma Parametric Analysis of Various Cloud Computing Security ,ISSN 0974-2239 Volume 4, Number 15 (2014), pp. 1499-1506
[14] Cloud standard security council, Cloud Security Standards: What to Expect & What to Negotiate Version 2.0
[15] Ahmed Albugmi,Madini O. Alassafi ,Robert Walters, Gary WillsConference: 2016 Fifth International Conference on Future Generation Communication Technologies (FGCT), IEEE,, At Luton, UK, Volume: 1
[16] Jeffrey Voas, Jia Zhang,“Cloud Computing: New Wine orJust a New Bottle?”, IT Professional, Vol. 11, No. 2, pp. 15-17, Mar./Apr. 2009.
[17]Luis M. Vaquero, Luis Rodero-Merino, Juan Caceres,Maik Lindner,“A Break in the Clouds: Towards a CloudDefinition”, ACM SIGCOMM Computer CommunicationReview, 39(1), pp. 50-55, 2009
[18] Mao Wen-Bo (2009),"Cloud computing security, [Online] Available: http://blog.pconline.com.cn/article/334526. html,2010.
[19] Nuno Santos Krishna P. Gummadi Rodrigo Rodrigues, "Towards Trusted Cloud Computing, [Online] Available: http://www.mpi-sws.org/~gummadi/papers/trusted_cloud. pdf,2010.
[20] http://www.nist.gov/itl/csd/cloud-102511.cfm
[21] http://thecloudtutorial.com/related.html
[22] http://thecloudtutorial.com/cloudtypes.html
[23] Learning about Cloud http://www.arcitura.com/
[24]VirtualizationVsCloudcomputing http://www.businessnewsdaily.com/5791-virtualization-vs-cloud-computing.html
[25]Sura Khalil Abd, Rawia TahirSalih, S.A. RAl Haddad, FazirulhisyamHashim.“Cloud Computing Security Risks with Authorization Access for Secure Multi-Tenancy Based on AAAS Protocol” IEEE/978–1-4799–8641- 5/15, 2015.
[26]https://www.quickstart.com/blog/post/5-benefits-of-virtualization-in-a-cloud-environment/