Security Threats in Cloud Computing
DOI:
https://doi.org/10.51983/ajcst-2019.8.S1.1946Keywords:
Cloud Computing, Cloud SecurityAbstract
Day by day witnesses a wide development of information technology in the use of cloud computing, and its services shape its architecture. It is indeed, that replaces the former attempts to enrich the security strategy in cloud computing. Security is one of the major issues in the cloud computing environment. In this paper we investigate about security threads and possible solution for cloud. The paper is categorized as follows: Section I describes the cloud computing overview. Section II describes the security threats and challenges in cloud computing. Section III describes the Obstacles and vulnerabilities that can be carried out to cloud environments. Section IV describes the possible solution of the issues. Section V concludes the paper with a cloud computing security.
References
Y. Yang and X. Jia, "Data storage auditing service in cloud computing: challenges, methods and opportunities," WorldWideWeb, vol. 15, no. 4, pp. 409–428, 2012. [Online]. Available: DOI: 10.1007/s11280-012-0185-4
Y. Zhang and M. Blanton, "Efficient dynamic provable possession of remote data via balanced update trees," in Proceedings of the 8th ACM SIGSAC Symposium on Information, Computer and Communications Security (ASIACCS), pp. 183–194, ACM, 2013. [Online]. Available: DOI: 10.1145/2484313.2484337
K. Guan, K. Ren, F. Zhang, F. Kerschbaum, and J. Yu, "Symmetric-Key Based Proofs of Retrievability Supporting Public Verification," Springer International Publishing, pp. 203–223, 2015. [Online]. Available: DOI: 10.1007/978-3-319-16963-9_11
V. K. Reddy, L. Said, B. Sengupta, M. Chetlur, J. P. Costantino, A. Gopinath, S. Flynt, P. Balunaini, and S. Vedula, "Personalized learning pathways: Enabling intervention creation and tracking," in IBM Journal of Research and Development, vol. 59, no. 6, November 2015.
M. Sarkar and T. Chatterjee, "International Journal on Network Security," vol. 5, no. 1, Jan 2014.
R. Chaves and L. Sousa, "Improving residue number system multiplication with more balanced moduli sets and enhanced modular arithmetic structures," Computers & Digital Techniques, IET, vol. 1, no. 5, pp. 472-480, Sept.
M. Re, A. Nannarelli, G. C. Cardarilli, and R. Lojacono, "FPGA Realization of RNS to binary signed conversion architecture," in 2001 IEEE International Symposium On Circuits and Systems, Sydney, Australia, pp. 6–9 May 2001.
G. Ateniese, R. D. Pietro, L. V. Mancini, and G. Tsudik, "Scalable and Efficient Provable Data Possession," Proc. of SecureComm’08, pp. 1–10, 2008. [Online]. Available: DOI: 10.1109/SECURECOMM.2008.12
W. Liu, "Research on Cloud Computing Security Problem and Strategy," 978-1-4577-1415-31121, ©2012 IEEE.
NIST, "NIST definition of Cloud. NIST 500-292, NIST Cloud Computing Reference Architecture."
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2019 The Research Publication
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.