A Comprehensive Study of Security in Cloud Computing
DOI:
https://doi.org/10.26438/ijcse/v6i12.394398Keywords:
Cloud Computing, secure computing, database outsourcing, deployment models, challengesAbstract
Cloud computing has become a popular model for reducing cost of business, improvise quality of services, and provide good & secure computing. It opens up the Computing World by providing the access to anything and anywhere through Internet. It acts as a spectrum of substantial interest among IT professionals, technocrats & business leaders due to these proven potentials. Numerous emerging computing paradigms database outsourcing serves as future advantages of cloud computing. With the increasing speed of its popularity, many security questions are arising with their respective solutions aiming to give a better understanding of their complex scenario, in this paper we will provide a comprehensive view over security in context of cloud computing and also provide a view of current status of security at present. To start with, we'll take a look at various Cloud computing models, cloud computing deployment models, key issues in security along with challenges in provocation of permissions to various platforms.
References
[1] M. Sadiku, S. Musa, O. Momoh, Cloud computing: opportunities and challenges, IEEE Potentials 33 (1) (2014) 34–36.
[2] D. AB. Fernandes, L. FB. Soares, J.V. Gomes, M.M. Freire, P. RM Inácio, Security issues in cloud environments: a survey, Int. J. Inform. Sec. 13 (2) (2014), 113–170.
[3] Mell, Peter, and Tim Grance. "The NIST definition of cloud computing." 2011.
[4] Ali, Mazhar, Samee U. Khan, and Athanasios V. Vasilakos. "Security in cloud computing: Opportunities and challenges." Information Sciences 305 (2015): 357-383.
[5] L. FB Soares, D. AB Fernandes, J.V. Gomes, M.M. Freire, P. RM Inácio, Cloud security: state of the art, in: Security, Privacy and Trust in Cloud Systems, Springer, Berlin, Heidelberg, 2014, pp. 3–44.
[6] Alessandro Iudica, Understanding the Cloud v1.0, December 2014, IBM Education Understanding The Cloud 1, © 2013 IBM Corporation.
[7] H. Yu, N. Powell, D. Stembridge, X. Yuan, Cloud computing and security challenges, in: Proceedings of the 50th Annual Southeast Regional Conference, ACM, 2012, pp. 298–302.
[8] Vishnu Patidar, Makhan Kumbhkar, "Analysis of Cloud Computing Security Issues in Software as a Service", International Journal of Scientific Research in Computer Science and Engineering, Vol.2, Issue.3, pp.1-5, 2014.
[9] R.Piplode, P. Sharma and U.K. Singh, "Study of Threats, Risk and Challenges in Cloud Computing", International Journal of Scientific Research in Computer Science and Engineering, Vol.1, Issue.1, pp.26-30, 2013.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
