Is Cloud Secure?
Keywords:
Cloud security alliance, Data loss, denial of service attack, Server RebootAbstract
Cloud computing is the buzz word, the corporate world pronounces every now and then. All the software companies are looking for a where about to store their data at a low cost and reduce the problem of selecting and updating a suitable infrastructure. The mushroom growth of startups and their prosperity and share in the software trends has also mounted the need of cloud computing. On the other hand, several other problems have taken birth like the believability of the cloud and the security concerns of it [1].The cloud users are stranded in a situation either to believe cloud or to wait for some more time for transiting to cloud .This position paper gives a thorough analysis of the cloud security and the stand the cloud computing has taken currently.
References
R. K. L. Ko, "Cloud computing in plain English," ACM Crossroads, vol. 16 (3), pp. 5-6, 2010.
https://cloudsecurityalliance.org
https://cloudsecurityalliance.org/research/vulnerabilities
https://cloudsecurityalliance.org/topthreats/csathreats.v1.0.pdf
http://www.symantec.com/connect/blogs/avoiding-hidden-costs-cloud-0, Created: 15 Jan 2013, Updated: 15 Jan 2013 ,Tom Powledge.
https://cloudsleuth.net/global-provider-view
Shu-Min Chuang; Kuo-En Chang; Yao-Ting Sung, "The cost effective structure for designing hybrid cloud based enterprise E-learning platform," Cloud Computing and Intelligence Systems (CCIS), 2011 IEEE International Conference on , vol., no., pp.523,525, 15-17 Sept. 2011
http://www.compuware.com/en_us/about/techfail.html
https://cloudsleuth.net/cdn-performance-analyzer
https://csrc.nist.gov/publications/nistpubs/800-144/SP800-144.pdf
Shaheen Ayyub and Devshree Roy, "Cloud Computing Characteristics and Security Issues", International Journal of Computer Sciences and Engineering, Volume-01, Issue-04, Page No (18-22), Dec -2013,
Reddy, Varun K., and Jagadeeshwar E. Rao. "A Survey on Security in Cloud Using Homographic and Disk Encryption Methods." International Journal of Computer Sciences and Engineering 2 (2014).
Putri, N.R., Mganga, M.C. 2011. Enhancing Information Security in Cloud qe Computing Services using SLA Based Metrics. Master’s thesis: Blekinge Institute of Technology.[Online].
Mewada, Shivlal, Umesh Kumar Singh, and Pradeep Sharma. "Security Based Model for Cloud Computing." Int. Journal of Computer Networks and Wireless Communications (IJCNWC) 1.1 (2011): 13-19.
Mewada, Shivlal, Umesh Kumar Singh, and Pradeep Sharma. "Security Enhancement in Cloud Computing (CC)." International Journal of Scientific Research in Computer Science and Engineering 1.01 (2013): 31-37.
K. Erkan, “Evaluating IT Security Performance with Quantifiable Metrics”, Institutionen f¨or Data- och Systemvetenskap, KTH.
E. Chew, M. Swanson, K. Stine et al., "Performance Measurement Guide forInformation Security," NIST Special Publication 800-55 Revision 1, National Institute of Standards and Technology & U.S. Department of Commerce, 2008.
http://www.pcisecuritystandards.org/pdfs/PCI_DSS_v2_Cloud_Guidelines.pdf
Niketan Jivane, Supriya Jivane, S.Rajkumar and K.Marimuthu, “Enhancement of an algorithm to extract text-lines from images for blind and visually impaired persons through parallel approach, International Journal of Computer Sciences and Engineering 4(9), pp. 25-32, 2016.
Xiong Li, Jianwei Niu, Marimuthu Karuppiah, Saru Kumari, Fan Wu(2016), Secure and Efficient Two-factors User Authentication Scheme with User Anonymity for Network Based E-Health Care Applications., Journal of Medical Systems, DOI: 10.1007/s10916-016-0629-8.
Marimuthu Karuppiah, Saru Kumari, Xiong Li, Fan Wu, Muhammad Khurram Khan, R Saravanan, Sayantani Basu,(2016), A Dynamic ID-based Generic Framework for Anonymous Authentication Scheme for Roaming Service in Global Mobility Networks, Wireless Personal Communication, DOI: 10.1007/s11277-016-3672-3.
Saru Kumari, Marimuthu Karuppiah, Xiong Li, Fan Wu, Ashok Kumar Das, Vanga Odelu (2016), A Secure Trust-Extended Authentication Mechanism for VANETs, Security and Communication Networks, DOI: 10.1002/sec.1602.
Marimuthu Karuppiah, Saru Kumari, Ashok Kumar Das, Xiong Li, Fan Wu, Sayantani Basu (2016), A Secure Lightweight Authentication Scheme with User Anonymity for Roaming Service in Ubiquitous Networks, Security and Communication Networks, DOI: 10.1002/sec.1598.
Marimuthu Karuppiah(2016), Remote User Authentication Scheme using Smart card: A Review, International Journal of Internet Protocol Technology, 9(2/3): 107–120.
Fan Wu, Lili Xu, Saru Kumari, Xiong Li, Ashok Kumar Das, Muhammad Khurram Khan, Marimuthu Karuppiah, Renuka Baliyan (2016), A novel and provably secure authentication and key agreement scheme with user anonymity for global mobility networks, Security and Communication Networks, DOI: 10.1002/sec.1558.
Swapnil Rajesh Telrandhe and Deepak Kapgate, "Authentication Model on Cloud Computing", International Journal of Computer Sciences and Engineering, Volume-02, Issue-10, Page No (33-37), Oct -2014,
S. Mewada, P. Sharma and S. S. Gautam, "Exploration of efficient symmetric algorithms," 2016 3rd International Conference on Computing for Sustainable Global Development (INDIACom), New Delhi, India, 2016, pp. 663-666
Karuppiah, Marimuthu, and R. Saravanan. "A secure remote user mutual authentication scheme using smart cards." Journal of information security and applications 19.4 (2014): 282-294.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
