A Comprehensive Study of Security in Cloud Computing

Authors

  • Bhatia MK Dept. of Information technology, Jagan Institute of Management Studies, Sector-5, 3-Institutional area, Rohini, Delhi, India
  • Bhardwaj A Dept. of Information technology, Jagan Institute of Management Studies, Sector-5, 3-Institutional area, Rohini, Delhi, India
  • Singla D Dept. of Information technology, Jagan Institute of Management Studies, Sector-5, 3-Institutional area, Rohini, Delhi, India

DOI:

https://doi.org/10.26438/ijcse/v6i12.394398

Keywords:

Cloud Computing, secure computing, database outsourcing, deployment models, challenges

Abstract

Cloud computing has become a popular model for reducing cost of business, improvise quality of services, and provide good & secure computing. It opens up the Computing World by providing the access to anything and anywhere through Internet. It acts as a spectrum of substantial interest among IT professionals, technocrats & business leaders due to these proven potentials. Numerous emerging computing paradigms database outsourcing serves as future advantages of cloud computing. With the increasing speed of its popularity, many security questions are arising with their respective solutions aiming to give a better understanding of their complex scenario, in this paper we will provide a comprehensive view over security in context of cloud computing and also provide a view of current status of security at present. To start with, we'll take a look at various Cloud computing models, cloud computing deployment models, key issues in security along with challenges in provocation of permissions to various platforms.

References

[1] M. Sadiku, S. Musa, O. Momoh, Cloud computing: opportunities and challenges, IEEE Potentials 33 (1) (2014) 34–36.

[2] D. AB. Fernandes, L. FB. Soares, J.V. Gomes, M.M. Freire, P. RM Inácio, Security issues in cloud environments: a survey, Int. J. Inform. Sec. 13 (2) (2014), 113–170.

[3] Mell, Peter, and Tim Grance. "The NIST definition of cloud computing." 2011.

[4] Ali, Mazhar, Samee U. Khan, and Athanasios V. Vasilakos. "Security in cloud computing: Opportunities and challenges." Information Sciences 305 (2015): 357-383.

[5] L. FB Soares, D. AB Fernandes, J.V. Gomes, M.M. Freire, P. RM Inácio, Cloud security: state of the art, in: Security, Privacy and Trust in Cloud Systems, Springer, Berlin, Heidelberg, 2014, pp. 3–44.

[6] Alessandro Iudica, Understanding the Cloud v1.0, December 2014, IBM Education Understanding The Cloud 1, © 2013 IBM Corporation.

[7] H. Yu, N. Powell, D. Stembridge, X. Yuan, Cloud computing and security challenges, in: Proceedings of the 50th Annual Southeast Regional Conference, ACM, 2012, pp. 298–302.

[8] Vishnu Patidar, Makhan Kumbhkar, "Analysis of Cloud Computing Security Issues in Software as a Service", International Journal of Scientific Research in Computer Science and Engineering, Vol.2, Issue.3, pp.1-5, 2014.

[9] R.Piplode, P. Sharma and U.K. Singh, "Study of Threats, Risk and Challenges in Cloud Computing", International Journal of Scientific Research in Computer Science and Engineering, Vol.1, Issue.1, pp.26-30, 2013.

Downloads

Published

2018-12-31
CITATION
DOI: 10.26438/ijcse/v6i12.394398
Published: 2018-12-31

How to Cite

[1]
M. K. Bhatia, A. Bhardwaj, and D. Singla, “A Comprehensive Study of Security in Cloud Computing”, Int. J. Comp. Sci. Eng., vol. 6, no. 12, pp. 394–398, Dec. 2018.