Full Paper View Go Back

Security Enhancement in Cloud Computing (CC)

S.L.Mewada 1 , U.K. Singh2 , P. Sharma3

Section:Research Paper, Product Type: Isroset-Journal
Vol.1 , Issue.1 , pp.31-37, Jan-2013


Online published on Dec 12, 2013


Copyright © S.L.Mewada, U.K. Singh, P. Sharma . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
 

View this paper at   Google Scholar | DPI Digital Library


XML View     PDF Download

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: S.L.Mewada, U.K. Singh, P. Sharma, “Security Enhancement in Cloud Computing (CC),” International Journal of Scientific Research in Computer Science and Engineering, Vol.1, Issue.1, pp.31-37, 2013.

MLA Style Citation: S.L.Mewada, U.K. Singh, P. Sharma "Security Enhancement in Cloud Computing (CC)." International Journal of Scientific Research in Computer Science and Engineering 1.1 (2013): 31-37.

APA Style Citation: S.L.Mewada, U.K. Singh, P. Sharma, (2013). Security Enhancement in Cloud Computing (CC). International Journal of Scientific Research in Computer Science and Engineering, 1(1), 31-37.

BibTex Style Citation:
@article{Singh_2013,
author = {S.L.Mewada, U.K. Singh, P. Sharma},
title = {Security Enhancement in Cloud Computing (CC)},
journal = {International Journal of Scientific Research in Computer Science and Engineering},
issue_date = {1 2013},
volume = {1},
Issue = {1},
month = {1},
year = {2013},
issn = {2347-2693},
pages = {31-37},
url = {https://www.isroset.org/journal/IJSRCSE/full_paper_view.php?paper_id=39},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.isroset.org/journal/IJSRCSE/full_paper_view.php?paper_id=39
TI - Security Enhancement in Cloud Computing (CC)
T2 - International Journal of Scientific Research in Computer Science and Engineering
AU - S.L.Mewada, U.K. Singh, P. Sharma
PY - 2013
DA - 2012/12/12
PB - IJCSE, Indore, INDIA
SP - 31-37
IS - 1
VL - 1
SN - 2347-2693
ER -

4795 Views    4502 Downloads    4248 Downloads
  
  

Abstract :
Cloud computing (CC) is set of resources and services offered through the Internet. Cloud services are delivered from data centers located throughout the world. Cloud computing facilitates its consumers by providing virtual resources via internet. CC is becoming one of the most important areas in the Information Technology world. Several issues and challenges are being raised from the adoption of this computational paradigm including security, privacy and authentication and association. In this paper aims to introduce new security ideas in cloud computing. In this paper, we describe the specifics of cloud computing, we address the principal security issues for cloud computing and we discuss primary cloud operations that need to be secured and we discuss the data security based model for cloud computing. We identify the new challenges and opportunities posed by this new cloud computing environment and explore approaches to secure its communication.

Key-Words / Index Term :
Cloud Computing; Security Model; Privacy; Authentication

References :
REFERENCE
[1] Ricardo vilaca, Rui oliveira, “Clouder : A Flexible Large Scale Decentralized Object Store. Architecture Overview”, Proceeding of WDDDM, 2009.
[2] Michael Miller, “Cloud Computing-Web Based Application that change the way you collaborate online”, Publishing of QUE, 2nd print 2009.
[3] Shivlal Mewada, Umesh Kumar Singh and Pradeep Kumar Sharma, “Security Based Model for Cloud Computing”, IRACST-International Journal of Computer Networks and Wireless Communications (IJCNWC), Vol. 1, No. 1, 2011.
[4] Wayne Jansen, Timothy Grance, Guidelines on Security and Privacy in Public Cloud Computing, NIST, Draft Special Publication 800-144, January 2011 http://csrc.nist.gov/publications/drafts/800-144/Draft-SP-800 144_cloudcomputing.pdf
[5] ENISA, Cloud Computing: Benefits, Risks and Recommendations for information Security, November 2009 http://www.enisa.europa.eu/act/rm/files/deliverables/cloud-computingrisk-assessment/at_download/fullReport
[6] The NIST Definition of Cloud Computing, version 15, by Peter Mell and Tim Grance, October 7, 2009, National Institute of Standards and Technology (NIST), Information Technology Laboratory (www.csrc.nist.gov )
[7] S. Subashini, and V. Kavitha. (2010) “Asurvey on security issues in service delivery models of cloud computing.” J Network Computer Application doi:10.1016/j.jnca.2010.07.006. Jul., 2010.
[8] M. Klems, A. Lenk, J. Nimis, T. Sandholm and S. Tai. “What’s Inside the Cloud? An Architectural Map of the Cloud Landscape.” IEEE Xplore, pp 23-31, Jun. 2009.
[9] R. Woolley and D. Fletcher “The Hybrid Cloud: Bringing Cloud-Based IT Services to State Government October 4, 2009” Department of Technology Services.
[10] T. kraska “Building Database Applications in the Cloud” Swiss federal institute of technology Zurich 2010
[11] Global Netoptex Incorporated , 2009, Demystifying the cloud. Important opportunities, crucial choices, http://www.gni.com , pp 4-14, viewed 13 December 2009.
[12] Security Guidance for Critical Areas of Focus in Cloud Computing, April 2009. DOI = http://www.cloudsecurityalliance.org/topthreats/csat reats.v1.0.pdf
[13] ISO. ISO 7498-2:1989. Information processing systems- Open Systems Interconnection. ISO 7498-2
[14] Dlamini M T, Eloff M M and Eloff J H P, ‘Internet of People, Things and Services – The Convergence of Security, Trust and Privacy’, 2009.
[15] Siani Pearson. Taking Account of Privacy when Designing Cloud Computing Services. CLOUD 09: Proceedings of the 2009 ICSE Workshop on Software Engineering Challenges of Cloud Computing, pages 44-52. May 2009.
[16] Discovering Identity: Cloud Computing: Identity and Access Management DOI = http://blogs.sun.com/identity/entry/cloud_computing_identity_and_access
[17] Worldwide Infrastructure Security Report, Arbor networks, 2010 http://www.arbornetworks.com/dmdocuments/ISR2010_EN.pdf
[18] Dai Yuefa, Wu Bo, Gu Yaqiang, Zhang Quan, Tang Chaojing, “Data Security Model for Cloud Computing” Proceedings of the 2009 International Workshop on Information Security and Application (IWISA 2009) Qingdao, China, November 21-22, 2009 (ACADEMY PUBLISHER AP-PROC-CS-09CN004)

Authorization Required

 

You do not have rights to view the full text article.
Please contact administration for subscription to Journal or individual article.
Mail us at  support@isroset.org or view contact page for more details.

Go to Navigation