Cloud Computing Security Techniques for Enhancing Utilization Efficiency

Authors

  • Jaya
  • Kaur K

DOI:

https://doi.org/10.26438/ijcse/v6i4.308311

Keywords:

Cloud, Services, Attacks, Threats

Abstract

Cloud computing provides resources or services both in terms of hardware and software using network (typically internet). Physical machines thus can perform operations beyond their capabilities. Cloud provides services including IaaS, PaaS and SaaS. Everything user needs is physically close to them hence extensive use of cloud is on the prospect. As users increases so does security threats. Cloud resources could be the target through application of attacks. Several techniques being suggested and research over to avoid critical consequence of threats. This paper provides comprehensive study of techniques used to enhance security within cloud computing environment. Comparative study also list best possible techniques which can work upon in the future.

References

N. Wahidah, B. Ab, K. Jenni, S. Mandala, and E. Supriyanto, “Review On Cloud Computing Application In P2P Video Streaming,” Procedia - Procedia Comput. Sci., vol. 50, pp. 185–190, 2015.

J. Aikat, N. Carolina, J. S. Chase, A. Juels, C. Tech, T. Ristenpart, and C. Tech, “Rethinking Security in the Era of Cloud Computing,” no. June, 2017.

B. Nicolae, “BlobCR : Efficient Checkpoint-Restart for HPC Applications on IaaS Clouds using Virtual Disk Image Snapshots.”

C. Pahl and I. Centre, “Containerization and the PaaS Cloud,” 2015.

R. Buyya, “Introduction to the IEEE Transactions on Cloud Computing,” vol. 1, no. 1, pp. 3–21, 2013.

K. Li, W. Zhang, C. Yang, and N. Yu, “Security Analysis on One-to-Many Order Preserving Encryption Based Cloud data Search,” vol. 6013, no. c, pp. 1–9, 2015.

J. I. A. You, Z. Zhong, G. Wang, B. O. Ai, and S. Member, “Security and Reliability Performance Analysis for Cloud Radio Access Networks With Channel Estimation Errors,” vol. 2, 2014.

X. Wu, R. Jiang, and B. Bhargava, “On the Security of Data Access Control for Multiauthority Cloud Storage Systems,” pp. 1–14, 2015.

B. Feng, X. Ma, C. Guo, H. Shi, Z. Fu, T. Qiu, and S. Member, “An Efficient Protocol with Bidirectional Verification for Storage,” vol. 3536, no. c, pp. 1–13, 2016.

F. Sabahi, “Cloud Computing Security Threats and Responses,” pp. 245–249, 2011.

S. Abdelwahab, B. Hamdaoui, M. Guizani, and T. Znati, “R EPLISOM : Disciplined Tiny Memory Replication for Massive IoT Devices in LTE Edge Cloud,” vol. 4662, no. c, 2015.

A. Sharma and S. Sharma, “Credit Based Scheduling Using Deadline in Cloud Computing Environment,” pp. 1588–1594, 2016.

Y. Zhao and S. S. M. Chow, “Updatable Block-Level Message-Locked Encryption,” pp. 449–460, 2017.

P. You, Y. Peng, W. Liu, and S. Xue, “Security Issues and Solutions in Cloud Computing,” 2012.

Z. Xiao, W. Song, and Q. Chen, “Dynamic Resource Allocation Using Virtual Machines for Cloud Computing Environment,” IEEE Trans. Parallel Distrib. Syst., vol. 24, no. 6, pp. 1107–1117, Jun. 2013.

C.-N. Yang and J.-B. Lai, “Protecting Data Privacy and Security for Cloud Computing Based on Secret Sharing,” in 2013 International Symposium on Biometrics and Security Technologies, 2013, pp. 259–266.

X. Li, J. Li, and F. Huang, “A secure cloud storage system supporting privacy-preserving fuzzy deduplication,” Soft Comput., Jan. 2015.

S. Guilloteau, F. T. Orange, France, and V. Mauree, “Privacy in Cloud Computing,” Media Informatics, no. March, p. 26, 2012.

T. H. Noor, Q. Z. Sheng, L. Yao, S. Dustdar, and A. H. H. Ngu, “CloudArmor: Supporting Reputation-Based Trust Management for Cloud Services,” IEEE Trans. Parallel Distrib. Syst., vol. 27, no. 2, pp. 367–380, Feb. 2016.

C. Wang, N. Cao, J. Li, K. Ren, and W. Lou, “Secure Ranked Keyword Search over Encrypted Cloud Data,” in 2010 IEEE 30th International Conference on Distributed Computing Systems, 2010, pp. 253–262.

O. Harfoushi, B. Alfawwaz, N. a. Ghatasheh, R. Obiedat, M. M. Abu-Faraj, and H. Faris, “Data Security Issues and Challenges in Cloud Computing: A Conceptual Analysis and Review,” Commun. Netw., vol. 06, no. 01, pp. 15–21, 2014.

K. Hwang, X. Bai, Y. Shi, M. Li, W.-G. Chen, and Y. Wu, “Cloud Performance Modeling with Benchmark Evaluation of Elastic Scaling Strategies,” IEEE Trans. Parallel Distrib. Syst., vol. 27, no. 1, pp. 130–143, Jan. 2016.

H. Wang, Z. Kang, and L. Wang, “Performance-Aware Cloud Resource Allocation via Fitness-Enabled Auction,” IEEE Trans. Parallel Distrib. Syst., vol. 27, no. 4, pp. 1160–1173, Apr. 2016.

K. Yang and X. Jia, “An Efficient and Secure Dynamic Auditing Protocol for Data Storage in Cloud Computing,” IEEE Trans. Parallel Distrib. Syst., vol. 24, no. 9, pp. 1717–1726, Sep. 2013.

Downloads

Published

2025-11-12
CITATION
DOI: 10.26438/ijcse/v6i4.308311
Published: 2025-11-12

How to Cite

[1]
Jaya and K. Kaur, “Cloud Computing Security Techniques for Enhancing Utilization Efficiency”, Int. J. Comp. Sci. Eng., vol. 6, no. 4, pp. 308–311, Nov. 2025.

Issue

Section

Research Article