A Review on Security Aspects and Countermeasures for Cloud Computing
Keywords:Cloud Computing, Security Issues, Privacy, Countermeasures.
For large-scale companies or people that desire a range of system services at a cheap cost, cloud computing is now the most popular phenomena to use. Personal information is frequently kept in a public cloud that is open to the public. This fundamental raises a number of concerns about cloud providers' flexible services, including confidentiality, persistence, and endurance. The paper aims to better understand cloud components, security concerns, and dangers, as well as developing solutions that might help minimise cloud vulnerabilities. It is a well-known truth that the cloud has been a viable hosting platform since 2008; nevertheless, the view of cloud security is that it requires major changes in order to achieve higher rates of adaptability at the corporate scale. Many of the difficulties affecting cloud computing need to be rectified immediately. The industry has made tremendous progress in combating cloud computing risks, but there is still work to be done to reach the level of maturity that traditional/on-premise hosting has.
Muijnck-Hughes Jan de (2011) Data Protection in the Cloud, 12 Jan, 2019 [Online], Available: http://www.ru.nl/ds
Venkata S. et.al (2011) Security Techniques for Protecting Data in Cloud Computing, 12 Jan, 2019 [Online] Available: https://www.bth.se/com
Ali Asghary K. (2011) Security Analysis and Framework of Cloud Computing with Parity-Based Partially Distributed File System, 26, Jan, 2019 [Online] Available; https://www.academia.edu/27767213/security_Analysis_and_Framework_of_cloud_computing_with_Parity_Based_Partially_Distributed_File_System
Nabil Giweli (2013) Enhancing Cloud Computing Security and Privacy, 20, Jan, 2019 [Online]Available:https://www.researchdirect.westernsydney.edu.au/islandora/object/uws%3AI7310/.../view
Zhou Miao (2013) Data Security and Integrity in cloud computing, Doctor of Philosophy thesis, School of Computer Science and Software Engineering, University of Wollongong. http://www.ro.uow.edu.au/thesis/3990
Sudhansu R. L. et.al Enhancing Data Security in Cloud Computing Using RSA Encryption and MD5 Algorithm, International Journal of Computer Science Trends and Technology (IJCST) – Volume 2, Issue 3, June 2014
Aastha Mishra (2014) Data Security in Cloud Computing Based on Advanced Secret Sharing Key Management System, 20 Jan, 2019 [Online] Available: https://www.ethesis.nitrkl.ac.in/5845/1/212CS2110.pdf
Nesrine Kaaniche (2014) Cloud Data Security based on Cryptographic Mechanisms, 26 Jan, 2019 [Online] Available: https://www.tel.archives-ouvertes.fr/tel-01146029/document
Afnan U.K. (2014) Data Confidentiality and Risk Management in Cloud Computing 2 Feb, 2019 [Online] Available: https://www.ethesis.whiterose.ac.uk/13677/1/Thesis_Final_Afnan _27072016_ EngD.pdf
Sarojini G. et.al (2016) Trusted and Reputed Services using Enhanced Mutual Trusted and Reputed Access Control Algorithm in Cloud, 2nd International Conference on Intelligent Computing, Communication & Convergence (ICCC-2016). www.sciencedirect.com
Dimitra A. G. (2017) Security Policies for Cloud Computing, 26 Jan, 2019 [Online] Available: https://www.dione.lib.unipi.gr/xmlui/bitstream/handle/unipi/11007/Georgiou_Dimitra.pdf
Ghallab A., Saif M.H., Mohsen A. (2021) Data Integrity and Security in Distributed Cloud Computing—A Review. In: Gunjan V.K., Zurada J.M. (eds) Proceedings of International Conference on Recent Trends in Machine Learning, IoT, Smart Cities and Applications. Advances in Intelligent Systems and Computing, vol 1245. Springer, Singapore. https://doi.org/10.1007/978-981-15-7234-0_73
Kanwal I., Shafi H., Memon S., Shah M.H. (2021) Cloud Computing Security Challenges: A Review. In: Jahankhani H., Jamal A., Lawson S. (eds) Cybersecurity, Privacy and Freedom Protection in the Connected World. Advanced Sciences and Technologies for Security Applications. Springer, Cham. https://doi.org/10.1007/978-3-030-68534-8_29
Varghese B, Buyya R (2018) Next generation cloud computing: new trends and research directions. Future Gener Comput Syst 79(September):849–861
Birje MN, Challagidad PS, Goudar RH, Tapale MT (2017) Cloud computing review: concepts, technology, challenges and security. Int J Cloud Comput 6(1):32–57
Li J, Zhang Y, Chen X, Xiang Y (2018) Secure attribute-based data sharing for resource-limited users in cloud computing. Comput Secur 72:1–12
How to Cite
Copyright (c) 2021 Rajat Maheshwari
This work is licensed under a Creative Commons Attribution 4.0 International License.
IJOSCIENCE follows an Open Journal Access policy. Authors retain the copyright of the original work and grant the rights of publication to the publisher with the work simultaneously licensed under a Creative Commons CC BY License that allows others to distribute, remix, adapt, and build upon your work, even commercially, as long as they credit you for the original creation. Authors are permitted to post their work in institutional repositories, social media or other platforms.
Under the following terms:
- No additional restrictions — You may not apply legal terms or technological measures that legally restrict others from doing anything the license permits.