Cloud Computing Security Issues and Challenges: A Review

Pankaj Gehaloach, Rohit Mahajan

Abstract


With the rapid development of cloud computing, more and more data are being centralized into remote cloud server for sharing, which raises a challenge on how to keep them both private and accessible. The Research in Cloud Computing remains attractive because of crave to obtain high performance, accessibility, low cost and many other luxuries. Hence, growth of internet and virtualization technology, cloud computing gains a lot of attention in the field of computer networks. Due to these reasons to maintain secure and robust data, security in cloud computing is one of most important issue. Cloud computing is an upcoming uprising in computer science and information technology industry because of its performance, security, accessibility, low cost and many other amenities. Cloud security is a multifaceted and highly complex issue. Today security is main issue in cloud. All industry is moving toward cloud computing so security of data on cloud is essential so different security algorithm (like DES, AES, RSA etc.) has been implemented. In this paper, we compared and analyzed different security related issues and models. We also matched the challenges and security related issues of different security related algorithms plus models under different parameters such as confidentiality, integrity, authentication and authorization.

Full Text:

PDF

References


Danan Thilakanatha, Shiping Chen,Surya Nepal, Rafael A. Calvo and Leila Alem, “A platform for secure monitoring and sharing of generic health data in the Cloud”, Elsevier Ltd, 2013.

Pardeep Sharma, Sandeep K. Sood, Sumeet Kaur, “Cloud Implementation Issues and What to Compute on Cloud”, International Journal of Advances in Computer Networks and its Security, vol.1, no. 1, pp. 130-135, 2011.

Jingwei Li, Jin Li, Zheli Liu and Chunfu Jia “Enabling efficient and secure data sharing in cloud computing” Concurrency Computat.:Pract Exper.,John Wiley & Sons, Ltd.,2013.

Jing-Jang Hwang, Hung-Kai Chuang, Yi-Chang Hsu and Chien-Hsing Wu, “A Business Model for Cloud Computing Based on a Separate Encryption and Decryption Service”, National Science Council of Taiwan Government.

Tao Jiang et. al.“Public Integrity Auditing for Shared Dynamic Cloud Data with Group User Revocation” IEEE 2015

Eman M.Mohamed et. Al. “Enhanced Data Security Model for Cloud Computing”, INFOS2012 - 14-16 May

Mazhar Ali et al “SeDaSC: Secure Data Sharing in Clouds”, IEEE SYSTEMS JOURNAL 2015

Dr. L. Arockiam et. al. “Efficient Cloud Storage Confidentiality to Ensure Data Security” ICCCI -2014, Jan. 03 – 05, 2014, Coimbatore, INDIA.

Ayad F. Barsoum et. al.” Provable Multicopy Dynamic Data Possession in Cloud Computing Systems”, IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 10, NO. 3, MARCH 2015

Zhen Chen et al. “Collaborative Network Security in Multi-Tenant Data Center for Cloud Computing”, TSINGHUA SCIENCE AND TECHNOLOGY ISSNl l1007-0214l l09/10l lpp82-94, Volume 19, Number 1, February 2014

Dharmendra S. Raghuwanshi et al. “MS2: Practical Data Privacy and Security Framework for Data at Rest in Cloud”, IEEE 2014

Cindhamani.J et. al. “An enhanced data security and trust management enabled framework for cloud computing systems”, 5th ICCCNT – 2014

Aws Naser Jaber1 et. al. “A Study in Data Security in Cloud Computing”, IC4T 2014.

Sandeep K. Sood, “A Highly Secure Hybrid Security model for Data Security at Cloud ”, Submitted to Security and Communication Networks, John Wiley and Sons (Interscience), Special Issue on Trust and Security in Cloud Computing, 2012.

P.Varalakshmi and Hamsavardhini Deventhiran, “Integrity Checking for Cloud Environment Using Encryption Algorithm”, IEEE, 2012.

Eman M.Mohamed and Sherif EI-Etriby, “Randomness Testing of Modem Encryption Techniques in Cloud Environment”, 8th International Conference on Informatics and Systems, 2012.

Zhiqian Xu and Keith M. Martin, “Dynamic User Revocation and Key Refreshing for Attribute-Based Encryption in Cloud Storage”, International Conference on Trust, Security and Privacy in Computing and Communications, IEEE, 2012.


Refbacks

  • There are currently no refbacks.

Comments on this article

View all comments




© International Journals of Advanced Research in Computer Science and Software Engineering (IJARCSSE)| All Rights Reserved | Powered by Advance Academic Publisher.