Security Aspects of Cloud Based Environments

Authors

  • Suganthi E Dept. Of Computer Science, Govt. College for Women (A), Kumbakonam, India
  • Selvi FK Dept. Of Computer Science, Govt. College for Women (A), Kumbakonam, India

Keywords:

Virtualization, Cloud computing, Multi cloud, Data security, Virtual environments

Abstract

Cloud computing is a specialized form of distributed computing. It involves introduction of utilisation models for effective utilisation, remote provisioning, and scalability of measured resources available, ending up in creating useful working environments. Virtualization separates functions from hardware and allows creation of multiple simulated environments or dedicated resources from one physical hardware system to other. It gives specific users, access to packaged resources in ondemand basis, for specific purposes. Virtualisation allows all types of resources to be added to a system, which is managed by a single operating system or Administrator. The concept of virtualization has two serious battles ahead, one is that of data security and the other one is to meet the demand from corporate to store their client data safely. The threat of data breach is generating newer techniques in virtualisation leading to multiple virtual environments being linked,so that it reduces possibility of hardware failure and data security breach. Virtualisation management is also one key element of the virtualisation process and it provides the ability to create, modify, transform and link the virtualised environments in order to effectively manage the environment. With the advent of linking virtual environments, new concept of Multi cloud has come up, wherein multiple cloud services are interconnected or multiple cloud services are accessed by the user for one particular job. This paper proposes to look upon the techniques that shall transform the future of cloud and the security or insecurity that shall come with it

References

[1]http://www.thesmallbusiness.org/software/benefits-of-cloudcomputing.html

[2]http://www.allthingscrm.com/cloudcoomputing/understanding-cloudcomputing-applications.html

[3] http://en.wikipedia.org/wiki/Cloud_computing

[4] http://www.wikinvest.com/concept/Cloud_Computing

[5]Cloud computing security challenges &solutions a survey https://ieeexplore.ieee.org/document/8301700/ by S Basu- 2018

[6]Cloudcomputing Trends to-prepare-for-in-2018

[7] C. Divya Shaly, R. Anbuselvi, ” Multi-Cloud Data Hosting for Protection Optimizationand Security”-International Journal of Computer Science and MobileComputing. April 2016.

[8] A. Manimaran and K. Somasundaram.”An efficient Data Security Mechanismin Cloud Computing Using Anonymous ID algorithm. 2016.

[9] Mark D. Ryan, “Cloud computing security: The Scientific challenge and aSurvey of solutions”. Elsevier 02013.

[10] AlZain, M.A.; Soh, B.; Pardede, E. (2011). MCDB: Using Multi-clouds to Ensure Security in Cloud Computing. Dependable, Autonomic and SecureComputing (DASC). 2011 IEEE Ninth International Conference on , vol., no.,pp.784,791, 12-14.

[11] Chang, V.; Bacigalupo, D.; Wills, G.; De Roure, D. (2010). A Categorisation of Cloud Computing Business Models. Cluster, Cloud and Grid Computing (CCGrid). 2010 10th IEEE/ACM International Conference on , vol., no.,pp.509,512, 17-20.

[12] AlZain, M.A.; Pardede, E.; Soh, B.; Thom, J.A. (2012). Cloud Computing Security: From Single to Multi-clouds. System Science (HICSS). 2012 45th Hawaii International Conference on, vol., no., pp.5490, 5499, 4-7.

[13] Barinder Kaur and Sandeep Sharma Parametric Analysis of Various Cloud Computing Security ,ISSN 0974-2239 Volume 4, Number 15 (2014), pp. 1499-1506

[14] Cloud standard security council, Cloud Security Standards: What to Expect & What to Negotiate Version 2.0

[15] Ahmed Albugmi,Madini O. Alassafi ,Robert Walters, Gary WillsConference: 2016 Fifth International Conference on Future Generation Communication Technologies (FGCT), IEEE,, At Luton, UK, Volume: 1

[16] Jeffrey Voas, Jia Zhang,“Cloud Computing: New Wine orJust a New Bottle?”, IT Professional, Vol. 11, No. 2, pp. 15-17, Mar./Apr. 2009.

[17]Luis M. Vaquero, Luis Rodero-Merino, Juan Caceres,Maik Lindner,“A Break in the Clouds: Towards a CloudDefinition”, ACM SIGCOMM Computer CommunicationReview, 39(1), pp. 50-55, 2009

[18] Mao Wen-Bo (2009),"Cloud computing security, [Online] Available: http://blog.pconline.com.cn/article/334526. html,2010.

[19] Nuno Santos Krishna P. Gummadi Rodrigo Rodrigues, "Towards Trusted Cloud Computing, [Online] Available: http://www.mpi-sws.org/~gummadi/papers/trusted_cloud. pdf,2010.

[20] http://www.nist.gov/itl/csd/cloud-102511.cfm

[21] http://thecloudtutorial.com/related.html

[22] http://thecloudtutorial.com/cloudtypes.html

[23] Learning about Cloud http://www.arcitura.com/

[24]VirtualizationVsCloudcomputing http://www.businessnewsdaily.com/5791-virtualization-vs-cloud-computing.html

[25]Sura Khalil Abd, Rawia TahirSalih, S.A. RAl Haddad, FazirulhisyamHashim.“Cloud Computing Security Risks with Authorization Access for Secure Multi-Tenancy Based on AAAS Protocol” IEEE/978–1-4799–8641- 5/15, 2015.

[26]https://www.quickstart.com/blog/post/5-benefits-of-virtualization-in-a-cloud-environment/

Downloads

Published

2025-11-24

How to Cite

[1]
E. Suganthi and F. K. M. Selvi, “Security Aspects of Cloud Based Environments”, Int. J. Comp. Sci. Eng., vol. 7, no. 4, pp. 239–242, Nov. 2025.