Research Key Techniques of Data Security in Public Cloud
Author : Sheik SaidhbiVolume 8 No.2 April-June 2019 pp 40-43
Abstract
Internet working security has become one of the biggest uprising points of concern now days. People are getting attached more and more to the internet in order to fulfill their demands. Not only customers but also the IT based companies are also getting themselves relying on up growing technology called as cloud computing. Cloud is a branch of computer science that provides the services on lease. In this paper we will make a comparative analysis of various technical security issues towards cloud computing, cloud deployment based security and model based security issues. A comparative analysis has been made at the end of the paper.
Keywords
Cloud Computing, Security Issues, Cloud Models
References
[1] “Security Guidance for Critical Areas of Focus in Cloud computing”, presented by Cloud Security Alliance (CSA), April 2009.
[2] Arijit Ukil, Debasish Jana and Ajanta De Sarkar, “A Security Framework In Cloud Computing Infrastructure”, International Journal of Network Security & Its Applications (IJNSA), Vol. 5, No. 5, September 2013, DOI:10.5121/ijnsa.2013.5502 11.
[3] Rabi Prasad Padhy, Manas Ranjan Patra and Suresh Chandra Satapathy, “Cloud Computing: Security Issues and Research Challenges”, IRACST – International Journal of Computer Science and Information Technology & Security (IJCSITS) Vol. 1, No. 2, December 2011.
[4] Kashif Munir and Prof Dr. Sellapan Palaniappan, “Framework for Secure Cloud Computing”, International Journal on Cloud Computing: Services and Architecture (IJCCSA), Vol.3, No.2, April 2013.
[5] Navdeep Singh, Abhinav Hans, Ashish Sharma, and Kapil Kumar, “A Review on Security Issues in Cloud Computing,” International Journal of Innovation and Applied Studies, Vol. 8, No. 3, pp. 1090–1093, September 2014.
[6] M. McIntosh and P. Austel, “XML signature element wrapping attacks and counter measures,” in SWS ’05: Proceedings of the 2005 workshop on Secure web services. ACM Press, pp. 20–27, 2005.
[7] S. Stamm, Z. Ramzan, and M. Jakobsson, “Drive-by pharming,” Indiana University Computer Science, Tech. Rep. 641, 2006.
[8] Ayesha Malik, and Muhammad Mohsin Nazir, “Security Framework for Cloud Computing Environment: A Review”, Journal of Emerging Trends in Computing and Information Sciences 2009-2012 CIS Journal, All rights reserved,Vol.3, No. 3, March 2012.
[9] Jinpeng Wei, Xiaolan Zhang, Glenn Ammons, and Vasanth Balaand Peng Ning, “Managing security of virtual machine images in a cloud environment”, Proceedings of the 2009 ACM workshop on Cloud computing security, pp. 91-96, November 2009.
[10] Miranda Mow brayand Siani Pearson, “A Client Based Privacy Manager for Cloud computing”, Proceedings of the Fourth International ICST Conference on communication system software and Middleware, June2009.
[11] Flavio Lombardi and Roberto Di Pietro, “Transparent Security for Cloud”, Proceedings of the 2010 ACM Symposium on Applied Computing, pp. 414-415, March 2010.
[12] Weichao Wang, Zhiwei Li, Rodney Owens and Bharat Bhargava, “Secure and Efficient Access to Outsourced Data”, Proceedings of the ACM workshop on Cloud computing security, pp. 55-65, 2009.
[13] Krešimir Popović, Željko Hocenski, “Cloud computing security issues and challenges”, MIPRO 2010, May 24-28, 2010, Opatija, Croatia.
[14] Takeshi Takahashi, Gregory Blancy, Youki Kadobayashiy, Doudou Fally, Hiroaki Hazeyamay, and Shin’ichiro Matsuo, “Enabling Secure Multi tenancy in Cloud Computing: Challenges and Approaches“.
[15] Nagarjuna, C.C kalyansrinivas, S. Sajida, and Lokesh, “Security techniques for multi tenancy applications in Cloud”, C.C. KalyanSrinivas et al., International Journal of Computer Science and Mobile Computing, Vol. 2, No. 8, pp. 248-251, August 2013.