A Survey Paper on Characteristics and Technique Used for Enhancement of Cloud Computıng and Their Security Issues

Author(s):  
Mahesh Bhandari ◽  
Vitthal S. Gutte ◽  
Pramod Mundhe
Author(s):  
Doaa M. Bamasoud ◽  
Atheer Salem Al-Dossary ◽  
Nouf Mubarak Al-Harthy ◽  
Rudaina Abdullah Al-Shomrany ◽  
Ghaida Saeed Alghamdi ◽  
...  

2016 ◽  
Vol 1 (2) ◽  
pp. 19-23
Author(s):  
Krutika K. Shah ◽  
Vahida U. Vadiya ◽  
Rutvij H. Jhaveri

Cloud Computing uses a network of remote servers hosted on the internet to store, manage and process data, rather than a local server or a personal computer. Cloud computing provides services on demand. In the recent time, Cloud Computing is highly demanded service because of the advantages like high computing power, less cost of services, high performance, scalability, reliability, accessibility as well as availability. To understand cloud security, there are referred high level publisher’s papers. For this review total 122 research paper of security issues in cloud computing till May 2016. For this paper included studied graphical and systematic review of various research work carried out on cloud computing. These findings show that the research in Cloud Computing received more attention over the past few years. There are referred high level publisher’s paper for better understanding about the security issues in cloud computing. This analysis would provide insights for researches, students, publishers, experts to study current research trend in cloud computing, helps to peoples for any issues about cloud computing.


2020 ◽  
pp. 12-20
Author(s):  
Ahthasham Qureshi ◽  
Wahab Dashti ◽  
Asma Jahangeer ◽  
Afia Zafar

Cloud computing becomes very popular and growing rapidly since the last few years, various information technology giants such as Amazon, Google, Microsoft and others speed up their growth in development of cloud computing systems and enhance services for consumers all over the world. Cloud computing provides virtual storage for the clients to avail storage, application, platform and services from their deployed servers over the internet. Various security issues such as; data insecure, data leakage, data availability, attacks; etc. could arise due to poor security policies. This paper discussed in detail security issues in terms of the CIA (Confidentiality, Integrity, and Availability) triangle from a service provider perspective over the services they provide to the end users. By these measurements high security can be achieve in cloud computing. Additionally, to protect confidential data from users on cloud the privacy actions are not updated accordingly. Severally, data backups on cloud cause high security risks. This survey paper analyzes the main security issues which are currently present in the cloud computing and offers best practices to service providers and enterprises hoping to control cloud service.  


2020 ◽  
Vol 13 (3) ◽  
pp. 313-318 ◽  
Author(s):  
Dhanapal Angamuthu ◽  
Nithyanandam Pandian

<P>Background: The cloud computing is the modern trend in high-performance computing. Cloud computing becomes very popular due to its characteristic of available anywhere, elasticity, ease of use, cost-effectiveness, etc. Though the cloud grants various benefits, it has associated issues and challenges to prevent the organizations to adopt the cloud. </P><P> Objective: The objective of this paper is to cover the several perspectives of Cloud Computing. This includes a basic definition of cloud, classification of the cloud based on Delivery and Deployment Model. The broad classification of the issues and challenges faced by the organization to adopt the cloud computing model are explored. Examples for the broad classification are Data Related issues in the cloud, Service availability related issues in cloud, etc. The detailed sub-classifications of each of the issues and challenges discussed. The example sub-classification of the Data Related issues in cloud shall be further classified into Data Security issues, Data Integrity issue, Data location issue, Multitenancy issues, etc. This paper also covers the typical problem of vendor lock-in issue. This article analyzed and described the various possible unique insider attacks in the cloud environment. </P><P> Results: The guideline and recommendations for the different issues and challenges are discussed. The most importantly the potential research areas in the cloud domain are explored. </P><P> Conclusion: This paper discussed the details on cloud computing, classifications and the several issues and challenges faced in adopting the cloud. The guideline and recommendations for issues and challenges are covered. The potential research areas in the cloud domain are captured. This helps the researchers, academicians and industries to focus and address the current challenges faced by the customers.</P>


Author(s):  
Ahmad Salah AlAhmad ◽  
Hasan Kahtan ◽  
Yehia Ibrahim Alzoubi ◽  
Omar Ali ◽  
Ashraf Jaradat

2018 ◽  
Vol 7 (2.21) ◽  
pp. 355
Author(s):  
P Sheela Gowr ◽  
N Kumar

Cloud computing was a hasting expertise which has innovated to a collection of new explores. A sub-ordinate device for Information services, it has an ability towards encourage development by feeding convenient environments for a choice of forms of development is different sequence. Clouds usually consider being eco-friendly, however keep it has open to the diversity of some security issues to can change together the feeder as well as users of these cloud services. In this issue are principally associated to the protection of the information flow throughout also being store in the cloud, with simple problems along with data ease of use, data right to use and data confidentiality. Data encryption and service authentication scheme has been initiated by the industries to deal with them. In this paper analyse and examine different issues on security beside with the different procedure worn by the industries to solve these effects. 


2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Ramaraj Palanisamy ◽  
Yang Wu

Purpose This study/ paper aims to empirically examine the user attitude on perceived security of enterprise systems (ES) mobility. Organizations are adopting mobile technologies for various business applications including ES to increase the flexibility and to gain sustainable competitive advantage. At the same time, end-users are exposed to security issues when using mobile technologies. The ES have seen breaches and malicious intrusions thereby more sophisticated recreational and commercial cybercrimes have been witnessed. ES have seen data breaches and malicious intrusions leading to more sophisticated cybercrimes. Considering the significance of security in ES mobility, the research questions in this study are: What are the security issues of ES mobility? What are the influences of users’ attitude towards those security issues? What is the impact of users’ attitude towards security issues on perceived security of ES mobility? Design/methodology/approach These questions are addressed by empirically testing a security model of mobile ES by collecting data from users of ES mobile systems. Hypotheses were evolved and tested by data collected through a survey questionnaire. The questionnaire survey was administered to 331 users from Chinese small and medium-sized enterprises (SME). The data was statistically analysed by tools such as correlation, factor analysis, regression and the study built a structural equation model (SEM) to examine the interactions between the variables. Findings The study results have identified the following security issues: users’ attitude towards mobile device security issues; users’ attitude towards wireless network security issues; users’ attitude towards cloud computing security issues; users’ attitude towards application-level security issues; users’ attitude towards data (access) level security issues; and users’ attitude towards enterprise-level security issues. Research limitations/implications The study results are based on a sample of users from Chinese SMEs. The findings may lack generalizability. Therefore, researchers are encouraged to examine the model in a different context. The issues requiring further investigation are the role of gender and type of device on perceived security of ES mobile systems. Practical implications The results show that the key security issues are related to a mobile device, wireless network, cloud computing, applications, data and enterprise. By understanding these issues and the best practices, organizations can maintain a high level of security of their mobile ES. Social implications Apart from understanding the best practices and the key issues, the authors suggest management and end-users to work collaboratively to achieve a high level of security of the mobile ES. Originality/value This is an empirical study conducted from the users’ perspective for validating the set of research hypotheses related to key security issues on the perceived security of mobile ES.


2018 ◽  
Vol 2018 ◽  
pp. 1-7 ◽  
Author(s):  
Run Xie ◽  
Chanlian He ◽  
Dongqing Xie ◽  
Chongzhi Gao ◽  
Xiaojun Zhang

With the advent of cloud computing, data privacy has become one of critical security issues and attracted much attention as more and more mobile devices are relying on the services in cloud. To protect data privacy, users usually encrypt their sensitive data before uploading to cloud servers, which renders the data utilization to be difficult. The ciphertext retrieval is able to realize utilization over encrypted data and searchable public key encryption is an effective way in the construction of encrypted data retrieval. However, the previous related works have not paid much attention to the design of ciphertext retrieval schemes that are secure against inside keyword-guessing attacks (KGAs). In this paper, we first construct a new architecture to resist inside KGAs. Moreover we present an efficient ciphertext retrieval instance with a designated tester (dCRKS) based on the architecture. This instance is secure under the inside KGAs. Finally, security analysis and efficiency comparison show that the proposal is effective for the retrieval of encrypted data in cloud computing.


Sign in / Sign up

Export Citation Format

Share Document