Asian Journal of Computer Science and Technology (AJCST)
Security Threats in Cloud ComputingAuthor : J. VimalRosy and S. Britto Ramesh Kumar
Volume 8 No.1 Special Issue:February 2019 pp 80-83
Day by day witnesses a wide development of information technology in the use of cloud computing, and its services shape its architecture. It is indeed, that replaces the former attempts to enrich the security strategy in cloud computing. Security is one of the major issues in the cloud computing environment. In this paper we investigate about security threads and possible solution for cloud. The paper is categorized as follows: Section I describes the cloud computing overview. Section II describes the security threats and challenges in cloud computing. Section III describes the Obstacles and vulnerabilities that can be carried out to cloud environments. Section IV describes the possible solution of the issues. Section V concludes the paper with a cloud computing security.
Cloud Computing, Cloud Security
 Yang and X. Jia, “Data storage auditing service in cloud computing: challenges, methods and opportunities,”WorldWideWeb,Vol.15,No.4,pp.409–428, 2012.
 Y. Zhang and M. Blanton, “Efficient dynamic provable possession of remote data via balanced update trees”,in Proceedings of the 8th ACMSIGSAC Symposium on Information, Computer and Communications Security, ASIACCS, pp. 183–194, ACM, 2013.
 Guan, K. Ren, F. Zhang, F. Kerschbaum, and J. Yu, “Symmetric- Key Based Proofs of Retrievability Supporting Public Verification”, Springer International Publishing,pp.203–223,2015.
 V.K.Reddy, L. Said, B. Sengupta, M. Chetlur, J.P.Costantino, A. Gopinath, S. Flynt, P. Balunaini, and S. Vedula, “Personalized learning pathways: Enabling intervention creation and tracking”, In IBM Journal of Researchand Development, Vol. 59, No. 6, November 2015.
 M. Sarkar, and T. Chatterjee, International Journal on Network Security, Vol. 5, No. 1, Jan 2014.
 R. Chaves and L. Sousa. “Improving residue number system multiplication with more balanced moduli sets and enhanced modular arithmetic structures”,Computers &Digital Techniques,IET, Vol.1, No.5, pp. 472-480,Sept.
 M.Re, A. Nannarelli, G. C. Cardarilli, and R.Lojacono,“FPGARealization of RNS to binary signed conversion architecture”,In 2001 IEEE International Symposium On Circuitsand Systems, Sydney, Australia, pp. 6–9 May 2001.
 G. Ateniese, R. D. Pietro, L. V. Mancini, and G. Tsudik, “Scalable and Efficient Provable Data Possession,” Proc. ofSecureComm’08, pp. 1–10, 2008.
 Wentao Liu, Research on Cloud Computing Security Problem and Strategy, 978-1-4577-1415-31121 ©2012 IEEE
 NIST defmition of Cloud. NIST 500-292, NIST Cloud Computing Reference Architecture.