A Review on Security Aspects and Countermeasures for Cloud Computing

Authors

  • Rajat Maheshwari

DOI:

https://doi.org/10.24113/ijoscience.v7i8.402

Keywords:

Cloud Computing, Security Issues, Privacy, Countermeasures.

Abstract

For large-scale companies or people that desire a range of system services at a cheap cost, cloud computing is now the most popular phenomena to use. Personal information is frequently kept in a public cloud that is open to the public. This fundamental raises a number of concerns about cloud providers' flexible services, including confidentiality, persistence, and endurance. The paper aims to better understand cloud components, security concerns, and dangers, as well as developing solutions that might help minimise cloud vulnerabilities. It is a well-known truth that the cloud has been a viable hosting platform since 2008; nevertheless, the view of cloud security is that it requires major changes in order to achieve higher rates of adaptability at the corporate scale. Many of the difficulties affecting cloud computing need to be rectified immediately. The industry has made tremendous progress in combating cloud computing risks, but there is still work to be done to reach the level of maturity that traditional/on-premise hosting has.

Downloads

Download data is not yet available.

Metrics

Metrics Loading ...

Author Biography

Rajat Maheshwari

Department of CSE

India

References

Muijnck-Hughes Jan de (2011) Data Protection in the Cloud, 12 Jan, 2019 [Online], Available: http://www.ru.nl/ds

Venkata S. et.al (2011) Security Techniques for Protecting Data in Cloud Computing, 12 Jan, 2019 [Online] Available: https://www.bth.se/com

Ali Asghary K. (2011) Security Analysis and Framework of Cloud Computing with Parity-Based Partially Distributed File System, 26, Jan, 2019 [Online] Available; https://www.academia.edu/27767213/security_Analysis_and_Framework_of_cloud_computing_with_Parity_Based_Partially_Distributed_File_System

Nabil Giweli (2013) Enhancing Cloud Computing Security and Privacy, 20, Jan, 2019 [Online]Available:https://www.researchdirect.westernsydney.edu.au/islandora/object/uws%3AI7310/.../view

Zhou Miao (2013) Data Security and Integrity in cloud computing, Doctor of Philosophy thesis, School of Computer Science and Software Engineering, University of Wollongong. http://www.ro.uow.edu.au/thesis/3990

Sudhansu R. L. et.al Enhancing Data Security in Cloud Computing Using RSA Encryption and MD5 Algorithm, International Journal of Computer Science Trends and Technology (IJCST) – Volume 2, Issue 3, June 2014

Aastha Mishra (2014) Data Security in Cloud Computing Based on Advanced Secret Sharing Key Management System, 20 Jan, 2019 [Online] Available: https://www.ethesis.nitrkl.ac.in/5845/1/212CS2110.pdf

Nesrine Kaaniche (2014) Cloud Data Security based on Cryptographic Mechanisms, 26 Jan, 2019 [Online] Available: https://www.tel.archives-ouvertes.fr/tel-01146029/document

Afnan U.K. (2014) Data Confidentiality and Risk Management in Cloud Computing 2 Feb, 2019 [Online] Available: https://www.ethesis.whiterose.ac.uk/13677/1/Thesis_Final_Afnan _27072016_ EngD.pdf

Sarojini G. et.al (2016) Trusted and Reputed Services using Enhanced Mutual Trusted and Reputed Access Control Algorithm in Cloud, 2nd International Conference on Intelligent Computing, Communication & Convergence (ICCC-2016). www.sciencedirect.com DOI: https://doi.org/10.1016/j.procs.2016.07.375

Dimitra A. G. (2017) Security Policies for Cloud Computing, 26 Jan, 2019 [Online] Available: https://www.dione.lib.unipi.gr/xmlui/bitstream/handle/unipi/11007/Georgiou_Dimitra.pdf

Ghallab A., Saif M.H., Mohsen A. (2021) Data Integrity and Security in Distributed Cloud Computing—A Review. In: Gunjan V.K., Zurada J.M. (eds) Proceedings of International Conference on Recent Trends in Machine Learning, IoT, Smart Cities and Applications. Advances in Intelligent Systems and Computing, vol 1245. Springer, Singapore. https://doi.org/10.1007/978-981-15-7234-0_73 DOI: https://doi.org/10.1007/978-981-15-7234-0_73

Kanwal I., Shafi H., Memon S., Shah M.H. (2021) Cloud Computing Security Challenges: A Review. In: Jahankhani H., Jamal A., Lawson S. (eds) Cybersecurity, Privacy and Freedom Protection in the Connected World. Advanced Sciences and Technologies for Security Applications. Springer, Cham. https://doi.org/10.1007/978-3-030-68534-8_29 DOI: https://doi.org/10.1007/978-3-030-68534-8_29

Varghese B, Buyya R (2018) Next generation cloud computing: new trends and research directions. Future Gener Comput Syst 79(September):849–861 DOI: https://doi.org/10.1016/j.future.2017.09.020

Birje MN, Challagidad PS, Goudar RH, Tapale MT (2017) Cloud computing review: concepts, technology, challenges and security. Int J Cloud Comput 6(1):32–57 DOI: https://doi.org/10.1504/IJCC.2017.083905

Li J, Zhang Y, Chen X, Xiang Y (2018) Secure attribute-based data sharing for resource-limited users in cloud computing. Comput Secur 72:1–12 DOI: https://doi.org/10.1016/j.cose.2017.08.007

Downloads

Published

08/28/2021

How to Cite

Maheshwari , R. . (2021). A Review on Security Aspects and Countermeasures for Cloud Computing. SMART MOVES JOURNAL IJOSCIENCE, 7(8), 38–43. https://doi.org/10.24113/ijoscience.v7i8.402

Issue

Section

Articles