Full Paper View Go Back
Vishal Kadam1 , Makhan Kumbhkar2
Section:Technical Paper, Product Type: Isroset-Journal
Vol.2 ,
Issue.3 , pp.6-10, May-2014
Online published on Jul 01, 2014
Copyright © Vishal Kadam, Makhan Kumbhkar . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
View this paper at Google Scholar | DPI Digital Library
How to Cite this Paper
- IEEE Citation
- MLA Citation
- APA Citation
- BibTex Citation
- RIS Citation
IEEE Style Citation: Vishal Kadam, Makhan Kumbhkar , “Security in Cloud Environment,” International Journal of Scientific Research in Computer Science and Engineering, Vol.2, Issue.3, pp.6-10, 2014.
MLA Style Citation: Vishal Kadam, Makhan Kumbhkar "Security in Cloud Environment." International Journal of Scientific Research in Computer Science and Engineering 2.3 (2014): 6-10.
APA Style Citation: Vishal Kadam, Makhan Kumbhkar , (2014). Security in Cloud Environment. International Journal of Scientific Research in Computer Science and Engineering, 2(3), 6-10.
BibTex Style Citation:
@article{Kadam_2014,
author = {Vishal Kadam, Makhan Kumbhkar },
title = {Security in Cloud Environment},
journal = {International Journal of Scientific Research in Computer Science and Engineering},
issue_date = {5 2014},
volume = {2},
Issue = {3},
month = {5},
year = {2014},
issn = {2347-2693},
pages = {6-10},
url = {https://www.isroset.org/journal/IJSRCSE/full_paper_view.php?paper_id=137},
publisher = {IJCSE, Indore, INDIA},
}
RIS Style Citation:
TY - JOUR
UR - https://www.isroset.org/journal/IJSRCSE/full_paper_view.php?paper_id=137
TI - Security in Cloud Environment
T2 - International Journal of Scientific Research in Computer Science and Engineering
AU - Vishal Kadam, Makhan Kumbhkar
PY - 2014
DA - 2014/07/01
PB - IJCSE, Indore, INDIA
SP - 6-10
IS - 3
VL - 2
SN - 2347-2693
ER -
Abstract :
Cloud computing is known as one of the big next things in information technology world. Unlike other traditional computing system, cloud computing paradigm that provide unlimited infrastructure to store or execute client‟s data/program. Cloud computing is a long dreamed vision of computing as a utility, where data owners can remotely store their data in the cloud to enjoy on- demand highly-quality application and services from a shared pool of configurable computing resources. This paper gives a brief introduction of cloud computing its types and security issue and approaches to secure the data in the cloud environment.
Key-Words / Index Term :
Cloud Computing, Security, SAAS, PAAS, IAAS, Public cloud, Private cloud, Hybrid cloud
References :
[1] Makhan Kumbhkar at el International Journal of Scientific Research in Computer Science and Engineering , Vol-1, Issue-6 ISSN: 2320-7639 “Performance Improvement of Software as a Service and Platform as a Service in Cloud Computing Solution”
[2] Vishal Jain and Mahesh Kumar “Information Retrieval through Multi-Agent System with Data Mining in Cloud Computing”, ISSN:2229-6093, Vol 3 (1), 62-66.
[3]. Andreas Klein, Christian Mannweiler, Joerg Schneider, and Hans D. Schotten. Access schemes for mobile cloud computing. In Eleventh International Conference on Mobile Data Management (MDM), 2010, pages 387–392, 2010.
[4]. Amlan Jyoti Choudhury, Pardeep Kumar,Mangal Sain, Hyotaek Lim, Hoon Jae-Lee, “A Strong User
Authentication Framework for Cloud Computing” 2011 IEEE Asia -Pacific Services Computing Conference
[4]. Ramgovind S, Eloff MM, Smith E, “The Management of Security in Cloud Computing”2010 IEEE
[6]. Bhagyaraj Gowrigolla, Sathyalakshmi Sivaji, M.Roberts Masillamani, “Design and Auditing of Cloud Computing Security “ 2010
[7]. Elisa Bertino, Federica Paci, Rodolfo Ferrini, Ning Shang, “Privacy-preserving Digital Identity Management for Cloud Computing” Bulletin of the IEEE Computer Society Technical Committee on Data Engineering ,2009
[8]. Richard Chow, Philippe Golle, Markus Jakobsson, Ryusuke Masuoka, Jesus Molina, Elaine Shi, Jessica Staddon Parc, “ Controlling Data in the Cloud:Outsourcing Computation without Outsourcing Control”CCSW’09, November 13, 2009, Chicago, Illinois, USA
[9] Richard Chow Parc, Markus Jakobsson FatSkunk, Ryusuke Masuoka, “Authentication in the Clouds: A Framework and its Application to Mobile Users” CCSW’10, October 8, 2010, Chicago, Illinois, USA
[10]. “Security and Privacy Challenges in Cloud Computing Environments” Copublished by the IEEE computer and reliability societies,November/December 2010
[11]. Hongwei Li, Yuanshun Dai1, Ling Tian, and Haomiao Yang, “Identity-Based Authentication for Cloud Computing” M.G. Jaatun, G. Zhao, and C. Rong (Eds.): CloudCom 2009, LNCS 5931, pp. 157–166, 2009. Springer-Verlag Berlin Heidelberg 2009
[12]. K.Valli Madhavi, R.Tamilkodi, R.BalaDinakar, “ Data Storage Security in Cloud Computing for Ensuring Effective and Flexible Distributed System”, National Conference on Research Trends in Computer Science and Technology – 2012, Volume 3, Issue (1) NCRTCST, ISSN 2249 –071X
[13].Kim,TaeYoug,Lee,shirly,Lee,Hoonjae, “Mutual authentication Scheme for cloud computing” Security comm. Network 2010; Available online http://mc.manuscriptcentral.com/scn
You do not have rights to view the full text article.
Please contact administration for subscription to Journal or individual article.
Mail us at support@isroset.org or view contact page for more details.