Analysis of Different Security Issues in Cloud Computing
DOI:
https://doi.org/10.53555/cse.v2i3.537Keywords:
Reliability,, Integrity, confidentiality,, Trusted Storage., Software as a Service (SAAS),, Platform as a Service (PAAS),, Infrastructure as a Service (IAAS).Abstract
Cloud computing is envisioned as the next generation technology. Cloud computing security or, more simply, cloud security is an evolving sub-domain of computer security, network security, and, more broadly, information security. It refers to a broad set of policies, technologies, and controls deployed to protect data, applications, and the associated infrastructure of cloud computing. In a cloud computing environment, the entire data resides over a set of networked resources, enabling the data to be accessed through virtual machines. Since these data-centers may be located in any part of the world beyond the reach and control of users, there are multifarious security and privacy challenges that need to be understood and addressed. There are a number of algorithms and methodologies available for achieving data security in cloud computing. In this paper we look at the current researches related to data security issues like integrity, Reliability and Confidentiality. in this particulars we will discuss how to secure client’s data on remote cloud Servers.
Downloads
References
.M. Jensen, J. Schwenk, N. Gruschka, And L. Lo Iacono, On Technical Security Issues In Cloud Computing. Ieee, 2009.
. Greg Boss, Padma Malladi, Denis Quan, Linda Legregni, Harold Hall, “Cloud Computing ”, Http://Www.Ibm.Com/Developerswork/Websphere/Zones/Hip Ods/Library.Html, October 2007, Pp. 4-4
G. Frankova, Service Level Agreements: Web Services And Security, Ser. Lecture Notes In Computer Science. Berlin, Heidelberg: Springer Berlin Heidelberg, 2007, Vol. 4607.
. “Service Level Agreement And Master Service Agreement”, Http://Www.Softlayer.Com/Sla.Html, Accessed On April 05, 2009.
. S. Berger, R. Caceres, D. Pendarakis, R. Sailer, E. Valdez, R. Perez, W. Schildhauer, And D. Srinivasan, “Security For The Cloud Infrastrcture: Trusted Virtual Data Center (Tvdc).” [Online]. Available: www.Kiskeya.Net/Ramon/Work/Pubs/Ibmjrd09.Pdf
. Http://Www.Cloudsecurity.Org, Accessed On April 10, 2009.
. “Sampling Issues We Are Addressing”, Http://Cloudsecurityalliance.Org/Issues.Html#15, Accessed On April 09, 2009.
. Mikekavis,”Real Time Transactions In The Cloud”, Http://Www.Kavistechnology.Com/ Blog/?P=789, Accessed On April 12, 2009.
. “Secure Group Addresses Cloud Computing Risks”, Http://Www.Secpoint.Com/Security-GroupAddresses-Cloudcomputing- Risks.Html, April 25, 2009. [10]. “Service Level Agreement Definition And Contents”, Http://Www.Service-Level-Agreement.Net, Accessed On March 10, 2009.
Sun Microsystems, Introduction To Cloud Computing Architecture, 2009
Fellows, W.2008. Partly Cloudy, Blue-Sky Thinking About Cloud Computing. 451 Group.
Varia, J.2009. Cloud Architectures. Amazon Web Services.
Chappell, D.2009. Introducing The Azure Services Platform. David Chappell & Associates.
Rayport, J. F. And Heyward, A.2009. Envisioning The Cloud: The Next Computing Paradigm. Marketspace.
Pastaki Rad, M., Sajedi Badashian, A., Meydanipour, G., Ashurzad Delcheh, M., Alipour, M. And Afzali, H. 2009. A Survey Of Cloud Platforms And Their Future.
Khajeh-Hosseini, A., Sommerville, I. And Sriram, I. "Research Challenges For Enterprise Cloud Computing," (Unpublished).( Submitted To 1st Acm Symposium On Cloud Computing, Indianapolis, Indiana, Usa, June 2010, Under Paper Id 54)
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2016 gnpublication@
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
In consideration of the journal, Green Publication taking action in reviewing and editing our manuscript, the authors undersigned hereby transfer, assign, or otherwise convey all copyright ownership to the Editorial Office of the Green Publication in the event that such work is published in the journal. Such conveyance covers any product that may derive from the published journal, whether print or electronic. Green Publication shall have the right to register copyright to the Article in its name as claimant, whether separately
or as part of the journal issue or other medium in which the Article is included.
By signing this Agreement, the author(s), and in the case of a Work Made For Hire, the employer, jointly and severally represent and warrant that the Article is original with the author(s) and does not infringe any copyright or violate any other right of any third parties, and that the Article has not been published elsewhere, and is not being considered for publication elsewhere in any form, except as provided herein. Each author’s signature should appear below. The signing author(s) (and, in