Data Security In Cloud Computing: A Review

  • Gurjeet Singh Research Scholar, Department of Computer Engineering, NWIET, Moga
  • Dr. Mohita Garg Associate Professor, Department of Computer Science and Engineering, NWIET, Moga
Keywords: Cloud computing, Virtual machine, Host, Datacenter, Datacenter Broker, Security

Abstract

Cloud computing is Internet ("cloud") based development and use of computer technology ("computing"). It is a style of computing in which dynamically scalable and often virtualized resources are provided as a service over the Internet. Cloud computing uses the internet and the central remote servers to support different data and applications. It is an internet based technology. It permits the users to approach their personal files at any computer with internet access. The cloud computing flexibility is a function of the allocation of resources on authority’s request. Cloud computing provides the act of uniting. Scientific computing in the 21st century has evolved from fixed to distributed work environment. The current trend of CloudComputing (CC) allows accessing business applications from anywhere just by connecting to the Internet. Evidence shows that, switching to CC organizations' annual expenditure and maintenance are being reduced to a greater extent. However, there are several challenges that come along with various benefits of cloud computing. Among these include securityaspects. Our aim is to identify security challenges for adapting cloud computing and their solutions from real world for the challenge that do not have any proper mitigation strategies identified. This non-existence of global standards and guidelines could be help academics to know the state of practice and formulatebetter methods/standards to provide secure interoperability. The identified cloud computing security challenges and solutions can be referred by practitioners to understand which areas of security need to be concentrated while adapting/migrating to a cloud computing environment.

References

D. Devkota, P. Ghimire, D. J. Burris and D. I. Alkadi, "Comparison of Security Algorithms in Cloud Computing," IEEE, pp. 1-7, 2015.

N. Kajal , N. Ikram and P. , "SECURITY THREATS IN CLOUD COMPUTING," IEEE, pp. 691-694, 2015.

M. EZZARII, H. E. GHAZI, H. ELGHAZI and T. SADIKI, "Performance Analysis of a Two Stage Security Approach in Cloud Computing," IEEE, 2015.

P. Ora and D. Pal, "Data Security and Integrity in Cloud Computing Based On RSA Partial Homomorphic and MD5 Cryptography," IEEE International Conference on Computer, Communication and Control (IC4-2015), 2015.

N. Shimbre and P. P. Deshpande, "Enhancing Distributed Data Storage Security for Cloud Computing Using TPA and AES algorithm," IEEE, pp. 35-39, 2015.

V. k. pant, J. Prakash and A. Asthana, "Three Step Data Security Model for Cloud Computing based on RSA and Steganography Techniques," IEEE, pp. 490-494, 2015.

Y. Zhu and J. Zuo, "Research on Data Security Access Model of Cloud Computing Platform," IEEE, pp. 424-428, 2015.

Tejinder Sharma, Vijay Kumar Banga. Efficient and Enhanced Algorithm in Cloud Computing, International Journal of Soft Computing and Engineering (IJSCE) ISSN: 2231-2307, Volume-3, Issue-1, March 2013

Sonal Guleria1, Dr. Sonia Vatta2, to enhance multimedia security in cloud computing environment using crossbreed algorithm, Web Site: www.ijaiem.org Email: editor@ijaiem.org, editorijaiem@gmail.com, Volume 2, Issue 6, June 2013

M. Brantner, D. Florescu, D. A. Graf, D. Kossmann, and T. Kraska. “Building a database on s3. In J. T.-L. Wang”, editor, ACM, pages 251–264, 2008.

S. H. Brown. “Multiple linear regression analysis: A matrix approach with matlab”. Alabama Journal of Mathematics, 2009.

Alawode A. olaide, “On Modeling Confidentiality Archetype and Data Mining in Cloud Computing”, IEEE, African Journal of Computing and ICT, March 2013.

Himeldev, Tanmoysen, “An Approach to Protect the Privacy of Cloud Datafrom Data Mining Based Attacks”, IEEE.

Vishal Jain, “Information Retrieval through Multi-Agent System with Data Mining in Cloud Computing”, IJCTA, January 2012.

Neha Tirthani: “Hellman and elliptical curve cryptography, Proceedings of TCC”, volume 3378 of LNCS, pages 325-341. Springer-Verlag (2005)

Amar Gondaliya : “Security in Cloud Computing”, Technical Paper Contest 2011.

Anthony Bisong, “An Overview of the Security Concerns in enterprise Cloud computing”, International Journal of the Security Concerns in Enterprise Cloud Computing, 2011.

R. Kalaichelvi Chandrahasan, “Research Challenges and Security Issues in Cloud Computing”, International Journal of Computational Intelligence and Information Security, March 2012 Vol. 3, No. 3.

Vahid Ashktorab, “Security Threats and Countermeasures in Cloud Computing”, International Journal of Application or Innovation in Engineering and Management, Vol 1, Issue 2, October 2012.

Mandeep Kaur, “Using encryption algorithms to enhance the data security in Cloud computing”, International journal of communication and computer technologies, Vol 1, No 12, 2013.

Mr. Tejas P. Bhatt, “Security in Cloud Computing using File Encryption”, International Journal of Engineering Research and Technology, Vol. 1 Issue 9, November 2012.

Eng. Anwar J. Alzaid and Eng. Jassim M. Albazzaz, ”Cloud Computing Challenges and related Security Issues”, 2009 A sur vey Paperhttp://www.cse.wustl.edu/~jain/cse571- 09/ftp/cloud/index.html

A. Raja Rajeswari and R.Sakkaravarthi , “Top Threats to Cloud Computing V1.0” , March 2010

T.V. Mahendra, “Data Mining for High Performance Data Cloud using Association Rule Mining”, International Journal of Advanced Research in Computer Science and Software Engineering, January 2012.

. Bhagyashree Ambulkar, “Data Mining in Cloud Computing”, MPGI National Multi Conference 2012.

Eng. Anwar J. Alzaid, “Cloud Computing: An Overview”, International Journal of Advanced Research in Computer and Communication Engineering, September 2013.

Published
2018-07-06
How to Cite
Singh, G., & Garg, D. M. (2018). Data Security In Cloud Computing: A Review. INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY, 17(2), 7206-7214. https://doi.org/10.24297/ijct.v17i2.7551