Full Paper View Go Back
Security Enhancement in Cloud Computing (CC)
S.L.Mewada 1 , U.K. Singh2 , P. Sharma3
Section:Research Paper, Product Type: Isroset-Journal
Vol.1 ,
Issue.1 , pp.31-37, Jan-2013
Online published on Dec 12, 2013
Copyright © S.L.Mewada, U.K. Singh, P. Sharma . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
View this paper at Google Scholar | DPI Digital Library
How to Cite this Paper
- IEEE Citation
- MLA Citation
- APA Citation
- BibTex Citation
- RIS Citation
IEEE Style Citation: S.L.Mewada, U.K. Singh, P. Sharma, âSecurity Enhancement in Cloud Computing (CC),â International Journal of Scientific Research in Computer Science and Engineering, Vol.1, Issue.1, pp.31-37, 2013.
MLA Style Citation: S.L.Mewada, U.K. Singh, P. Sharma "Security Enhancement in Cloud Computing (CC)." International Journal of Scientific Research in Computer Science and Engineering 1.1 (2013): 31-37.
APA Style Citation: S.L.Mewada, U.K. Singh, P. Sharma, (2013). Security Enhancement in Cloud Computing (CC). International Journal of Scientific Research in Computer Science and Engineering, 1(1), 31-37.
BibTex Style Citation:
@article{Singh_2013,
author = {S.L.Mewada, U.K. Singh, P. Sharma},
title = {Security Enhancement in Cloud Computing (CC)},
journal = {International Journal of Scientific Research in Computer Science and Engineering},
issue_date = {1 2013},
volume = {1},
Issue = {1},
month = {1},
year = {2013},
issn = {2347-2693},
pages = {31-37},
url = {https://www.isroset.org/journal/IJSRCSE/full_paper_view.php?paper_id=39},
publisher = {IJCSE, Indore, INDIA},
}
RIS Style Citation:
TY - JOUR
UR - https://www.isroset.org/journal/IJSRCSE/full_paper_view.php?paper_id=39
TI - Security Enhancement in Cloud Computing (CC)
T2 - International Journal of Scientific Research in Computer Science and Engineering
AU - S.L.Mewada, U.K. Singh, P. Sharma
PY - 2013
DA - 2012/12/12
PB - IJCSE, Indore, INDIA
SP - 31-37
IS - 1
VL - 1
SN - 2347-2693
ER -
Abstract :
Cloud computing (CC) is set of resources and services offered through the Internet. Cloud services are delivered from data centers located throughout the world. Cloud computing facilitates its consumers by providing virtual resources via internet. CC is becoming one of the most important areas in the Information Technology world. Several issues and challenges are being raised from the adoption of this computational paradigm including security, privacy and authentication and association. In this paper aims to introduce new security ideas in cloud computing. In this paper, we describe the specifics of cloud computing, we address the principal security issues for cloud computing and we discuss primary cloud operations that need to be secured and we discuss the data security based model for cloud computing. We identify the new challenges and opportunities posed by this new cloud computing environment and explore approaches to secure its communication.
Key-Words / Index Term :
Cloud Computing; Security Model; Privacy; Authentication
References :
REFERENCE
[1] Ricardo vilaca, Rui oliveira, âClouder : A Flexible Large Scale Decentralized Object Store. Architecture Overviewâ, Proceeding of WDDDM, 2009.
[2] Michael Miller, âCloud Computing-Web Based Application that change the way you collaborate onlineâ, Publishing of QUE, 2nd print 2009.
[3] Shivlal Mewada, Umesh Kumar Singh and Pradeep Kumar Sharma, âSecurity Based Model for Cloud Computingâ, IRACST-International Journal of Computer Networks and Wireless Communications (IJCNWC), Vol. 1, No. 1, 2011.
[4] Wayne Jansen, Timothy Grance, Guidelines on Security and Privacy in Public Cloud Computing, NIST, Draft Special Publication 800-144, January 2011 http://csrc.nist.gov/publications/drafts/800-144/Draft-SP-800 144_cloudcomputing.pdf
[5] ENISA, Cloud Computing: Benefits, Risks and Recommendations for information Security, November 2009 http://www.enisa.europa.eu/act/rm/files/deliverables/cloud-computingrisk-assessment/at_download/fullReport
[6] The NIST Definition of Cloud Computing, version 15, by Peter Mell and Tim Grance, October 7, 2009, National Institute of Standards and Technology (NIST), Information Technology Laboratory (www.csrc.nist.gov )
[7] S. Subashini, and V. Kavitha. (2010) âAsurvey on security issues in service delivery models of cloud computing.â J Network Computer Application doi:10.1016/j.jnca.2010.07.006. Jul., 2010.
[8] M. Klems, A. Lenk, J. Nimis, T. Sandholm and S. Tai. âWhatâs Inside the Cloud? An Architectural Map of the Cloud Landscape.â IEEE Xplore, pp 23-31, Jun. 2009.
[9] R. Woolley and D. Fletcher âThe Hybrid Cloud: Bringing Cloud-Based IT Services to State Government October 4, 2009â Department of Technology Services.
[10] T. kraska âBuilding Database Applications in the Cloudâ Swiss federal institute of technology Zurich 2010
[11] Global Netoptex Incorporated , 2009, Demystifying the cloud. Important opportunities, crucial choices, http://www.gni.com , pp 4-14, viewed 13 December 2009.
[12] Security Guidance for Critical Areas of Focus in Cloud Computing, April 2009. DOI = http://www.cloudsecurityalliance.org/topthreats/csat reats.v1.0.pdf
[13] ISO. ISO 7498-2:1989. Information processing systems- Open Systems Interconnection. ISO 7498-2
[14] Dlamini M T, Eloff M M and Eloff J H P, âInternet of People, Things and Services â The Convergence of Security, Trust and Privacyâ, 2009.
[15] Siani Pearson. Taking Account of Privacy when Designing Cloud Computing Services. CLOUD 09: Proceedings of the 2009 ICSE Workshop on Software Engineering Challenges of Cloud Computing, pages 44-52. May 2009.
[16] Discovering Identity: Cloud Computing: Identity and Access Management DOI = http://blogs.sun.com/identity/entry/cloud_computing_identity_and_access
[17] Worldwide Infrastructure Security Report, Arbor networks, 2010 http://www.arbornetworks.com/dmdocuments/ISR2010_EN.pdf
[18] Dai Yuefa, Wu Bo, Gu Yaqiang, Zhang Quan, Tang Chaojing, âData Security Model for Cloud Computingâ Proceedings of the 2009 International Workshop on Information Security and Application (IWISA 2009) Qingdao, China, November 21-22, 2009 (ACADEMY PUBLISHER AP-PROC-CS-09CN004)
You do not have rights to view the full text article.
Please contact administration for subscription to Journal or individual article.
Mail us at support@isroset.org or view contact page for more details.