Security Threats in Cloud Computing

Authors

  • J. VimalRosy Head, Department of Computer Science, Soka Ikeda College of Arts and Science for Women, Tamil Nadu, India
  • S. Britto Ramesh Kumar Assistant Professor, Department of Computer Science, St.Joseph’s College, Tamil Nadu, India

DOI:

https://doi.org/10.51983/ajcst-2019.8.S1.1946

Keywords:

Cloud Computing, Cloud Security

Abstract

Day by day witnesses a wide development of information technology in the use of cloud computing, and its services shape its architecture. It is indeed, that replaces the former attempts to enrich the security strategy in cloud computing. Security is one of the major issues in the cloud computing environment. In this paper we investigate about security threads and possible solution for cloud. The paper is categorized as follows: Section I describes the cloud computing overview. Section II describes the security threats and challenges in cloud computing. Section III describes the Obstacles and vulnerabilities that can be carried out to cloud environments. Section IV describes the possible solution of the issues. Section V concludes the paper with a cloud computing security.

References

Y. Yang and X. Jia, "Data storage auditing service in cloud computing: challenges, methods and opportunities," WorldWideWeb, vol. 15, no. 4, pp. 409–428, 2012. [Online]. Available: DOI: 10.1007/s11280-012-0185-4

Y. Zhang and M. Blanton, "Efficient dynamic provable possession of remote data via balanced update trees," in Proceedings of the 8th ACM SIGSAC Symposium on Information, Computer and Communications Security (ASIACCS), pp. 183–194, ACM, 2013. [Online]. Available: DOI: 10.1145/2484313.2484337

K. Guan, K. Ren, F. Zhang, F. Kerschbaum, and J. Yu, "Symmetric-Key Based Proofs of Retrievability Supporting Public Verification," Springer International Publishing, pp. 203–223, 2015. [Online]. Available: DOI: 10.1007/978-3-319-16963-9_11

V. K. Reddy, L. Said, B. Sengupta, M. Chetlur, J. P. Costantino, A. Gopinath, S. Flynt, P. Balunaini, and S. Vedula, "Personalized learning pathways: Enabling intervention creation and tracking," in IBM Journal of Research and Development, vol. 59, no. 6, November 2015.

M. Sarkar and T. Chatterjee, "International Journal on Network Security," vol. 5, no. 1, Jan 2014.

R. Chaves and L. Sousa, "Improving residue number system multiplication with more balanced moduli sets and enhanced modular arithmetic structures," Computers & Digital Techniques, IET, vol. 1, no. 5, pp. 472-480, Sept.

M. Re, A. Nannarelli, G. C. Cardarilli, and R. Lojacono, "FPGA Realization of RNS to binary signed conversion architecture," in 2001 IEEE International Symposium On Circuits and Systems, Sydney, Australia, pp. 6–9 May 2001.

G. Ateniese, R. D. Pietro, L. V. Mancini, and G. Tsudik, "Scalable and Efficient Provable Data Possession," Proc. of SecureComm’08, pp. 1–10, 2008. [Online]. Available: DOI: 10.1109/SECURECOMM.2008.12

W. Liu, "Research on Cloud Computing Security Problem and Strategy," 978-1-4577-1415-31121, ©2012 IEEE.

NIST, "NIST definition of Cloud. NIST 500-292, NIST Cloud Computing Reference Architecture."

Downloads

Published

15-02-2019

How to Cite

VimalRosy, J., & Britto Ramesh Kumar, S. (2019). Security Threats in Cloud Computing. Asian Journal of Computer Science and Technology, 8(S1), 80–83. https://doi.org/10.51983/ajcst-2019.8.S1.1946

Similar Articles

<< < 1 2 

You may also start an advanced similarity search for this article.