Open Access Open Access  Restricted Access Subscription or Fee Access

Cloud Computing and its Security – An Overview

N. Kanmani, M. Akila, A. Gowtham Raj

Abstract


In the current trends of computing, cloud computing plays a vital role and it is emerging at the level of maximum. The reason behind this is people started moving their data to cloud with the expectation of hundred percentage availability on their demand, i.e., anytime anywhere computing. Though the cloud services are provided by the third party, security becomes a very big question mark.  The main objective of this paper is to provide an overview of cloud computing and its security, which help the young researchers to get clear idea.

Keywords


Computing, Cloud, Grid, Public, Private, Hybrid, IaaS, PaaS, SaaS, Security.

Full Text:

PDF

References


B. Feng, X. Ma, C. Guo, H. Shi, Z. Fu and T. Qiu, "An Efficient Protocol With Bidirectional Verification for Storage Security in Cloud Computing," in IEEE Access, vol. 4, no. , pp. 7899-7911, 2016.

Borko Furht, Armando Escalante, "Handbook of Cloud Computing", Springer, 2010.

Murali and R. S. Prasad, "CloudQKDP: Quantum key distribution protocol for cloud computing," 2016 International Conference on Information Communication and Embedded Systems (ICICES), Chennai, 2016, pp. 1-6.

S. Park, Y. D. Lee and J. Jeong, "Improved Identity Management Protocol for Secure Mobile Cloud Computing," 2013 46th Hawaii International Conference on System Sciences, Wailea, HI, USA, 2013, pp. 4958-4965.

Gandhi, P. Gandhi, "Cloud computing security issues: An analysis," 2016 3rd International Conference on Computing for Sustainable Global Development (INDIACom), New Delhi, 2016, pp. 3858-3861. H. Zhu, "Towards a Theory of Cloud Computing in the Protocol-Composition Framework," 2010 Third International Symposium on Intelligent Information Technology and Security Informatics, Jinggangshan, 2010, pp. 758-762.

N. Naik and P. Jenkins, "An Analysis of Open Standard Identity Protocols in Cloud Computing Security Paradigm," 2016 IEEE 14th Intl Conf on Dependable, Autonomic and Secure Computing, 14th Intl Conf on Pervasive Intelligence and Computing, 2nd Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress (DASC/PiCom/DataCom/CyberSciTech), Auckland, 2016, pp. 428-431.

Patil Madhubala R., "Survey on security concerns in Cloud computing," 2015 International Conference on Green Computing and Internet of Things (ICGCIoT), Noida, 2015, pp. 1458-1462.

R. Rajagopal and M. Chitra, "Trust based interoperability security protocol for grid and Cloud computing," Computing Communication & Networking Technologies (ICCCNT), 2012 Third International Conference on, Coimbatore, 2012, pp. 1-5.

U. A. Kashif, Z. A. Memon, A. R. Balouch and J. A. Chandio, "Distributed trust protocol for IaaS Cloud Computing," 2015 12th International Bhurban Conference on Applied Sciences and Technology (IBCAST), Islamabad, 2015, pp. 275-279.

Voas.J, Zhang.J, "Cloud computing: New wine or just a new bottle?", IEEE ITPro, April 2009. Pp.15–17.

Xiao Liu, Rui Jiang and Huafeng Kong, "SSOP: Secure storage outsourcing protocols in mobile cloud computing," 2012 IEEE 14th International Conference on Communication Technology, Chengdu, 2012, pp. 678-683.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.