A Secure Cloud Environment

Authors

  • P Indu School of Computers ,Inspiria Knowledge Campus, Maulana Abul Kalam Azad University of Technology, Siliguri, India
  • S Bhattachryya Department of Computer Science and Engineering, University Institute of Technology, The University of Burdwan, Burdwan, India

DOI:

https://doi.org/10.26438/ijcse/v6i3.303315

Keywords:

Third Party Auditor, One-time password, Homomorphic encryption technique, Access control and Data Recovery mechanism, Cloud Service User (CSU), Cloud Service Provider(CSP)

Abstract

Cloud Computing has been a one-key, cost-effective solution for many small I.T industries from past few decades in terms of storage, computation etc. It provides different kinds of services and infrastructural support. While cloud makes these services more appealing, it also brings some critical security threats to the cloud service users as well as to the cloud service providers. In this paper authors have tried to identify major security threats faced by different models of cloud in current day scenario and providing with some suitable solutions addressing those threats like One-time password, Homomorphic encryption technique, Access control and Data Recovery mechanism in different cloud deployment models.

References

P. Mell, T. Grance, NIST definition of cloud computing.

National Institute of Standards and Technology, October 2009

GTSI Group, “Cloud Computing - Building a Framework for

Successful Transition,” White Paper, GTSI Corporation, 2009.

Grace A. Lewis Research, Technology and Systems Solutions

(RTSS) Program “Architectural Implications of Cloud

Computing”, May 18, 2011

Gens F, 2009,‟ New IDC IT Cloud Services Survey: Top

Benefits and Challenges‟, IDC eXchange, viewed 18 February

, from <http://blogs.idc.com/ie/?p=730>.

ISO. ISO 7498-2:1989. Information processing systems- Open

Systems Interconnection. ISO 7498-2

Dlamini M T, Eloff M M and Eloff J H P, „Internet of People,

Things and Services – The Convergence of Security, Trust and

Privacy‟, 2009[7] Md.TanzimKhorshed,A.B.M.ShawkatAli,SalehA.Wasimi,“As

urveyongaps,threatremediationchallengesandsomethoughtsforp

roactive attack detection in cloud computing”, School of

Information and Communication Technology, CQ University

QLD4702, Australia

Cong Wang, Qian Wang, and Kui Ren Wenjing Lou, “Privacy-

Preserving Public Auditing for Data Storage Security in Cloud

Computing”, IEEE INFOCOM 2010

Xiaojun Yu, Qiaoyan Wen, “A View About Cloud Data

Security From Data Life Cycle”, IEEE ,2010

Uma Somani, Kanika Lakhani, Manish Mundra ,

“Implementing Digital Signature with RSA Encryption

Algorithm to Enhance the Data Security of Cloud in Cloud

Computing” ,2010 1st International Conference on Parallel,

Distributed and Grid Computing (PDGC - 2010),IEEE

P. Syam Kumar, R. Subramanian and D. Thamizh Selvam,

“Ensuring Data Storage Security in Cloud Computing using

Sobol Sequence”, 2010 1st International Conference on

Parallel, Distributed and Grid Computing (PDGC – 2010)

,IEEE.

Xi Cao, Li Xu, Yuexin Zhang and Wei Wu, “Identity-based

Proxy Signature for Cloud Service in SaaS”, Fourth

International Conference on Intelligent Networking and

Collaborative Systems, 2012,IEEE

Junli Zhu, and Qiaoyan Wen, “SaaS Access Control Research

Based on UCON”, Fourth International Conference on Digital

Home, 2012,IEEE

Kiyoshi Nishikawa, Kenji Oki and Akihiko Matsuo, “SaaS

Application Framework using Information Gateway Enabling

Cloud Service with Data Confidentiality”, 19th Asia-Pacific

Software Engineering Conference,IEEE, 2012.

Jinpeng Wei, Xiaolan Zhang, Glenn Ammons, Vasanth

Bala,peng Ning. “Managing Security of virtual machine

images in a cloud environment.” CCSW’09: Proceedings of the

ACM workshop on Cloud computing security, November

, pp 91-96.

Miranda Mowbray, Siani Pearson “A Client –based privacy

Manager for Cloud Computing”. OMSWARE '09:

Proceedings of the Fourth International ICST Conference on

communication system software and middle ware, June 2009

ACM.

Flavio Lombardi, Roberto Di Pietro. “Transparent Security for

Cloud”. SAC '10: Proceedings of the 2010 ACM Symposium on

Applied Computing, March 2010, pp 414-415.

F. A. Alvi, B.S Chaudhary, “review on cloud computing

security issues & challenges”.

Shantanu Pal, Sunirmal Khatua, Nabendu Chaki, Sugata

Sanyal, “A New Trusted and Collaborative Agent Based

Approach for Ensuring Cloud Security”, Annals of FacultyEngineering Hunedoara International Journal of Engineering

(Archived copy), scheduled for publication in vol. 10, issue 1,

January 2012. ISSN: 1584-2665.

"IBM's homomorphic encryption could revolutionize security"

was originally published at InfoWorld.com.

Pabak Indu, Souvik Bhattacharyya and Gautam

Sanyal,“Different Aspects in Cloud Computing: A

Comprehensive Review” Elixir Inform. Tech. 71 (2014)

-24602,June 2014.

Downloads

Published

2025-11-12
CITATION
DOI: 10.26438/ijcse/v6i3.303315
Published: 2025-11-12

How to Cite

[1]
P. Indu and S. Bhattachryya, “A Secure Cloud Environment”, Int. J. Comp. Sci. Eng., vol. 6, no. 3, pp. 303–315, Nov. 2025.

Issue

Section

Research Article