A Review on Cloud Computing Security: Issues and Solutions
Abstract
Full Text:
PDFReferences
The NIST Definition of Cloud Computing, version 15, by Peter Mell and Tim Grance, October 7, 2009, National Institute of Standards and Technology (NIST), Information Technology Laboratory (www.csrc.nist.gov)
Santosh Kumar and R. H. Goudar “Cloud Computing – Research Issues, Challenges, Architecture, Platforms and Applications: A Survey” in International Journal of Future Computer and Communication, Vol. 1, No. 4, December 2012.
Prince Jain “Security Issues and their Solution in Cloud Computing” in International Journal of Computing & Business Research.
Ali Gholami and Erwin Laure “SECURITY AND PRIVACY OF SENSITIVE DATA IN CLOUD COMPUTING: A SURVEY OF RECENT DEVELOPMENTS ” in Computer Science & Information Technology (CS & IT).
N. Santos, K. P. Gummadi, and R. Rodrigues, “Towards trusted cloud computing,” in Proceedings of the 2009 Conference on Hot Topics in Cloud Computing, HotCloud’09, (Berkeley, CA, USA), USENIX Association, 2009.
T. Garfinkel, B. Pfaff, J. Chow, M. Rosenblum, and D. Boneh, “Terra: A virtual machine-based platform for trusted computing,” in Proceedings of the Nineteenth ACM Symposium on Operating Systems Principles, SOSP ’03, (New York, NY, USA), pp. 193–206, ACM, 2003.
R. Velumadhava Rao and K. Selvamanib “Data Security Challenges and Its Solutions in Cloud Computing” in International Conference on Intelligent Computing, Communication & Convergence (ICCC-2014).
Manpreet Kaur and Hardeep Singh “ A REVIEW OF CLOUD COMPUTING SECURITY ISSUES” in International Journal of Advances in Engineering & Technology, June, 2015.
S. Venkata Krishna Kumar and S.Padmapriya “A Survey on Cloud Computing Security
ThreatsandVulnerabilities”in
INTERNATIONAL JOURNAL OF INNOVATIVE RESEARCH IN ELECTRICAL, ELECTRONICS, INSTRUMENTATION AND CONTROL ENGINEERING Vol. 2, Issue 1, January 2014.
Muhammad Kazim and Shao Ying Zhu “A survey on top security threats in cloud computing” in (IJACSA) International Journalof Advanced Computer Science and
Applications,Vol. 6, No. 3, 2015.
P. R. Jaiswal and A. W. Rohankar
“Infrastructure as a Service: Security Issues in Cloud Computing” in IJCSMC, Vol. 3, Issue. 3, March 2014, pg.707 – 711.
R. Chow, P. Golle, M. Jakobsson, E. Shi, J. Staddon, R. Masuoka, and J. Molina, “Controlling data in the cloud: outsourcing computation without outsourcing control,” in Proceedings of the 2009 ACM workshop on Cloud computing security. ACM, 2009, pp. 85–90.
T. Takebayashi, H. Tsuda, T. Hasebe, and R. Masuoka, “Data loss prevention technologies,” Fujitsu Scientific and Technical Journal, vol. 46, no. 1, pp. 47–55, 2010.
S. Roschke, F. Cheng, and C. Meinel, “Intrusion detection in the cloud,” in Dependable, Autonomic and Secure Computing, 2009. DASC’09. Eighth IEEE International Conference on. IEEE, 2009, pp. 729–734.
“Cloud controls matrix (ccm), cloud security alliance,” https://cloudsecurityalliance.org/research/ccm/, last Accessed: 2014-12-02.
S.O. Kuyoro, F. Ibikunle, and O. Awodele, “Cloud Computing Security Issues and Challenges,” in International Journal of Computer Networks, vol. 3, issue 5, pp. 247-255, 2011.
E. Nurmi, R. Wolski, C. Grzegorczyk, G. Obertelli, S. Soman, L. Youseff, and D. Zagorodnov, “The Eucalyptus Open-Source Cloud- Computing System,” Cluster Computing and the Grid, IEEE International Symposium on, vol. 0, pp. 124–131, 2009.
N. Mimura Gonzalez, M. Torrez Rojas, M. Maciel da Silva, F. Redigolo, T. Melo de Brito Carvalho, C. Miers, M. Naslund, and A. Ahmed, “A framework for authentication and authorization credentials in cloud computing,” in Trust, Security and Privacy in Computing and Communications (TrustCom), 2013 12th IEEE International Conference on, pp. 509–516, July 2013.
B. Tang, R. Sandhu, and Q. Li, “Multi-tenancy authorization models for collaborative cloud services,” in Collaboration Technologies and Systems (CTS), 2013 International Conference on, pp. 132–138, May 2013.
Manas M, Nagalakshmi and Shobha, “Cloud Computing Security Issues And Methods to Overcome,” in International Journal of Advanced Research in Computer and
Communication Engineering Vol. 3, Issue 4, April 2014.
N. Padia and M. Parekh, “Cloud Computing Security Issues, in Enterprise Architecture and Its Solutions,” International Journal of Computer Application, vol.2, issue 1, pp. 149-155, December 2011.
Cachin,C.Keidar,I. and Shraer,A. 2009.Trusting the cloud.SIGACT News 40,2,81-86.
Papamanthou, C., Tamassia, R., and Triandopoulos, N. 2008. Authenticated hash tables. In CCS ’08: Proceedings of the 15th ACM conference on Computer and communications security. ACM, New York,
NY, USA, 437–448. http://www.levelcloud.net/why-levelcloud/cloud -education-center/advantages-and-disadvantages -of-cloud-computing/
https://www.skyhighnetworks.com/cloud-securi ty-blog/11-advantages-of-cloud-computing-and-how-your-business-can-benefit-from-them/
https://www.lifewire.com/cloud-computing-exp lained-2373125
Refbacks
- There are currently no refbacks.
Copyright © IJETT, International Journal on Emerging Trends in Technology