A Secure Cloud Environment
DOI:
https://doi.org/10.26438/ijcse/v6i3.303315Keywords:
Third Party Auditor, One-time password, Homomorphic encryption technique, Access control and Data Recovery mechanism, Cloud Service User (CSU), Cloud Service Provider(CSP)Abstract
Cloud Computing has been a one-key, cost-effective solution for many small I.T industries from past few decades in terms of storage, computation etc. It provides different kinds of services and infrastructural support. While cloud makes these services more appealing, it also brings some critical security threats to the cloud service users as well as to the cloud service providers. In this paper authors have tried to identify major security threats faced by different models of cloud in current day scenario and providing with some suitable solutions addressing those threats like One-time password, Homomorphic encryption technique, Access control and Data Recovery mechanism in different cloud deployment models.
References
P. Mell, T. Grance, NIST definition of cloud computing.
National Institute of Standards and Technology, October 2009
GTSI Group, “Cloud Computing - Building a Framework for
Successful Transition,” White Paper, GTSI Corporation, 2009.
Grace A. Lewis Research, Technology and Systems Solutions
(RTSS) Program “Architectural Implications of Cloud
Computing”, May 18, 2011
Gens F, 2009,‟ New IDC IT Cloud Services Survey: Top
Benefits and Challenges‟, IDC eXchange, viewed 18 February
, from <http://blogs.idc.com/ie/?p=730>.
ISO. ISO 7498-2:1989. Information processing systems- Open
Systems Interconnection. ISO 7498-2
Dlamini M T, Eloff M M and Eloff J H P, „Internet of People,
Things and Services – The Convergence of Security, Trust and
Privacy‟, 2009[7] Md.TanzimKhorshed,A.B.M.ShawkatAli,SalehA.Wasimi,“As
urveyongaps,threatremediationchallengesandsomethoughtsforp
roactive attack detection in cloud computing”, School of
Information and Communication Technology, CQ University
QLD4702, Australia
Cong Wang, Qian Wang, and Kui Ren Wenjing Lou, “Privacy-
Preserving Public Auditing for Data Storage Security in Cloud
Computing”, IEEE INFOCOM 2010
Xiaojun Yu, Qiaoyan Wen, “A View About Cloud Data
Security From Data Life Cycle”, IEEE ,2010
Uma Somani, Kanika Lakhani, Manish Mundra ,
“Implementing Digital Signature with RSA Encryption
Algorithm to Enhance the Data Security of Cloud in Cloud
Computing” ,2010 1st International Conference on Parallel,
Distributed and Grid Computing (PDGC - 2010),IEEE
P. Syam Kumar, R. Subramanian and D. Thamizh Selvam,
“Ensuring Data Storage Security in Cloud Computing using
Sobol Sequence”, 2010 1st International Conference on
Parallel, Distributed and Grid Computing (PDGC – 2010)
,IEEE.
Xi Cao, Li Xu, Yuexin Zhang and Wei Wu, “Identity-based
Proxy Signature for Cloud Service in SaaS”, Fourth
International Conference on Intelligent Networking and
Collaborative Systems, 2012,IEEE
Junli Zhu, and Qiaoyan Wen, “SaaS Access Control Research
Based on UCON”, Fourth International Conference on Digital
Home, 2012,IEEE
Kiyoshi Nishikawa, Kenji Oki and Akihiko Matsuo, “SaaS
Application Framework using Information Gateway Enabling
Cloud Service with Data Confidentiality”, 19th Asia-Pacific
Software Engineering Conference,IEEE, 2012.
Jinpeng Wei, Xiaolan Zhang, Glenn Ammons, Vasanth
Bala,peng Ning. “Managing Security of virtual machine
images in a cloud environment.” CCSW’09: Proceedings of the
ACM workshop on Cloud computing security, November
, pp 91-96.
Miranda Mowbray, Siani Pearson “A Client –based privacy
Manager for Cloud Computing”. OMSWARE '09:
Proceedings of the Fourth International ICST Conference on
communication system software and middle ware, June 2009
ACM.
Flavio Lombardi, Roberto Di Pietro. “Transparent Security for
Cloud”. SAC '10: Proceedings of the 2010 ACM Symposium on
Applied Computing, March 2010, pp 414-415.
F. A. Alvi, B.S Chaudhary, “review on cloud computing
security issues & challenges”.
Shantanu Pal, Sunirmal Khatua, Nabendu Chaki, Sugata
Sanyal, “A New Trusted and Collaborative Agent Based
Approach for Ensuring Cloud Security”, Annals of FacultyEngineering Hunedoara International Journal of Engineering
(Archived copy), scheduled for publication in vol. 10, issue 1,
January 2012. ISSN: 1584-2665.
"IBM's homomorphic encryption could revolutionize security"
was originally published at InfoWorld.com.
Pabak Indu, Souvik Bhattacharyya and Gautam
Sanyal,“Different Aspects in Cloud Computing: A
Comprehensive Review” Elixir Inform. Tech. 71 (2014)
-24602,June 2014.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
