Abstract
Cloud computing is known as one of the big next things in information technology world. Unlike other traditional computing system, cloud computing paradigm that provide unlimited infrastructure to store or execute client‟s data/program. Cloud computing is a long dreamed vision of computing as a utility, where data owners can remotely store their data in the cloud to enjoy on- demand highly-quality application and services from a shared pool of configurable computing resources. This paper gives a brief introduction of cloud computing its types and security issue and approaches to secure the data in the cloud environment.
Key-Words / Index Term
Cloud Computing, Security, SAAS, PAAS, IAAS, Public cloud, Private cloud, Hybrid cloud
References
[1] Makhan Kumbhkar at el International Journal of Scientific Research in Computer Science and Engineering , Vol-1, Issue-6 ISSN: 2320-7639 “Performance Improvement of Software as a Service and Platform as a Service in Cloud Computing Solution”
[2] Vishal Jain and Mahesh Kumar “Information Retrieval through Multi-Agent System with Data Mining in Cloud Computing”, ISSN:2229-6093, Vol 3 (1), 62-66.
[3]. Andreas Klein, Christian Mannweiler, Joerg Schneider, and Hans D. Schotten. Access schemes for mobile cloud computing. In Eleventh International Conference on Mobile Data Management (MDM), 2010, pages 387–392, 2010.
[4]. Amlan Jyoti Choudhury, Pardeep Kumar,Mangal Sain, Hyotaek Lim, Hoon Jae-Lee, “A Strong User
Authentication Framework for Cloud Computing” 2011 IEEE Asia -Pacific Services Computing Conference
[4]. Ramgovind S, Eloff MM, Smith E, “The Management of Security in Cloud Computing”2010 IEEE
[6]. Bhagyaraj Gowrigolla, Sathyalakshmi Sivaji, M.Roberts Masillamani, “Design and Auditing of Cloud Computing Security “ 2010
[7]. Elisa Bertino, Federica Paci, Rodolfo Ferrini, Ning Shang, “Privacy-preserving Digital Identity Management for Cloud Computing” Bulletin of the IEEE Computer Society Technical Committee on Data Engineering ,2009
[8]. Richard Chow, Philippe Golle, Markus Jakobsson, Ryusuke Masuoka, Jesus Molina, Elaine Shi, Jessica Staddon Parc, “ Controlling Data in the Cloud:Outsourcing Computation without Outsourcing Control”CCSW’09, November 13, 2009, Chicago, Illinois, USA
[9] Richard Chow Parc, Markus Jakobsson FatSkunk, Ryusuke Masuoka, “Authentication in the Clouds: A Framework and its Application to Mobile Users” CCSW’10, October 8, 2010, Chicago, Illinois, USA
[10]. “Security and Privacy Challenges in Cloud Computing Environments” Copublished by the IEEE computer and reliability societies,November/December 2010
[11]. Hongwei Li, Yuanshun Dai1, Ling Tian, and Haomiao Yang, “Identity-Based Authentication for Cloud Computing” M.G. Jaatun, G. Zhao, and C. Rong (Eds.): CloudCom 2009, LNCS 5931, pp. 157–166, 2009. Springer-Verlag Berlin Heidelberg 2009
[12]. K.Valli Madhavi, R.Tamilkodi, R.BalaDinakar, “ Data Storage Security in Cloud Computing for Ensuring Effective and Flexible Distributed System”, National Conference on Research Trends in Computer Science and Technology – 2012, Volume 3, Issue (1) NCRTCST, ISSN 2249 –071X
[13].Kim,TaeYoug,Lee,shirly,Lee,Hoonjae, “Mutual authentication Scheme for cloud computing” Security comm. Network 2010; Available online http://mc.manuscriptcentral.com/scn