scholarly journals Cloud computing security: a survey

2018 ◽  
Vol 7 (2.21) ◽  
pp. 355
Author(s):  
P Sheela Gowr ◽  
N Kumar

Cloud computing was a hasting expertise which has innovated to a collection of new explores. A sub-ordinate device for Information services, it has an ability towards encourage development by feeding convenient environments for a choice of forms of development is different sequence. Clouds usually consider being eco-friendly, however keep it has open to the diversity of some security issues to can change together the feeder as well as users of these cloud services. In this issue are principally associated to the protection of the information flow throughout also being store in the cloud, with simple problems along with data ease of use, data right to use and data confidentiality. Data encryption and service authentication scheme has been initiated by the industries to deal with them. In this paper analyse and examine different issues on security beside with the different procedure worn by the industries to solve these effects. 

Author(s):  
Baldev Singh

Cloud computing is one of the emerged technologies in the past decade. Tremendous growth is noticed in the usage and implementation of Cloud computing. Although cloud spectrum is widely popular still there are lot of challenges and issues to be addressed for its optimal usage. Vulnerabilities and threats to the cloud services leads to attacks and exploitation of resources as well as data breaches and privacy violations that need to be addressed at the cloud customer satisfaction level. This paper highlights different cloud security issues and their security requirements. The review aspects and findings of the paper can be used as a reference for further appropriate and effective implementation from the suggested practically viable cloud security solution in an independent manner or using as a hybrid technique.


2018 ◽  
Vol 2 (4-2) ◽  
pp. 293 ◽  
Author(s):  
Marry Teo ◽  
Hairulnizam Mahdin ◽  
Lee Jia Hwee ◽  
Haezel Ann Dicken ◽  
Tay Xin Hui ◽  
...  

Cloud computing is a technology that maintain the data and application by using the central remote server with the internet connection. By utilizing cloud computing, user can reduce their costs as they no need to purchase their own hardware and software. However cloud computing still has many issues concerning securities, such as privacy issues, loss of data and stolen of data. Some security issues over cloud services including confidentiality, integrity, availability, privacy and attacks are concerned by the users. This paper reviews some of the issues and its current solutions.


2014 ◽  
Vol 511-512 ◽  
pp. 1196-1200
Author(s):  
Jian Gang Tang

Cloud computing is an open structure which have complexity, on-demand services, virtualization, resource pooling, rapid elasticity and multi-tenant architecture, etc. The security issues have become a bottleneck restricting the development of cloud computing. This paper analyzes the characteristics of cloud computing services, security requirements and security issues, given security strategies and a cloud computing model. It requires the use of cloud computing architecture data centers, virtualization platforms, cloud services, cloud terminal interfaces and cloud terminal to establish a secure cloud computing model. It needs considerations from prevention, surveillance and response to ensure the implementation and management. Cloud computing security is not just technical issues, it also involves many standardization, regulatory approach, laws and regulations and follow the existing security best practices can enhance the security of cloud computing.


2020 ◽  
Vol 13 (3) ◽  
pp. 313-318 ◽  
Author(s):  
Dhanapal Angamuthu ◽  
Nithyanandam Pandian

<P>Background: The cloud computing is the modern trend in high-performance computing. Cloud computing becomes very popular due to its characteristic of available anywhere, elasticity, ease of use, cost-effectiveness, etc. Though the cloud grants various benefits, it has associated issues and challenges to prevent the organizations to adopt the cloud. </P><P> Objective: The objective of this paper is to cover the several perspectives of Cloud Computing. This includes a basic definition of cloud, classification of the cloud based on Delivery and Deployment Model. The broad classification of the issues and challenges faced by the organization to adopt the cloud computing model are explored. Examples for the broad classification are Data Related issues in the cloud, Service availability related issues in cloud, etc. The detailed sub-classifications of each of the issues and challenges discussed. The example sub-classification of the Data Related issues in cloud shall be further classified into Data Security issues, Data Integrity issue, Data location issue, Multitenancy issues, etc. This paper also covers the typical problem of vendor lock-in issue. This article analyzed and described the various possible unique insider attacks in the cloud environment. </P><P> Results: The guideline and recommendations for the different issues and challenges are discussed. The most importantly the potential research areas in the cloud domain are explored. </P><P> Conclusion: This paper discussed the details on cloud computing, classifications and the several issues and challenges faced in adopting the cloud. The guideline and recommendations for issues and challenges are covered. The potential research areas in the cloud domain are captured. This helps the researchers, academicians and industries to focus and address the current challenges faced by the customers.</P>


Open Physics ◽  
2019 ◽  
Vol 17 (1) ◽  
pp. 128-134 ◽  
Author(s):  
Wei Ma ◽  
Huanqin Li ◽  
Deden Witarsyah

Abstract Separation is the primary consideration in cloud computing security. A series of security and safety problems would arise if a separation mechanism is not deployed appropriately, thus affecting the confidence of cloud end-users. In this paper, together with characteristics of cloud computing, the separation issue in cloud computing has been analyzed from the perspective of information flow. The process of information flow in cloud computing systems is formalized to propose corresponding separation rules. These rules have been verified in this paper and it is shown that the rules conform to non-interference security, thus ensuring the security and practicability of the proposed rules.


2021 ◽  
Author(s):  
Olena Ponomaryova ◽  
◽  
Sergy Ponomaryiov ◽  

The current problem of transition to the use of "Cloud Computing" in the process of assessing possible use has been reflected in this study. Assessments of the capabilities of cloud services have been conducted, which are part of a group study of cloud computing as a platform for creating a communication environment in the scientific activities of the Free Economic Zone. The essence of the concept of cloud computing is to provide end users with remote dynamic access to services, computing resources and applications via the Internet. The main possibilities and functions of the information space of scientific communications have been considered. In the process of evaluating the possible use of cloud solutions, the main properties, capabilities and characteristics have also been considered. Web-services based on cloud computing technology in terms of meeting the goals of the scientific community have been analyzed. The most widely used and widely used cloud storage services today that can be used to build a research communication platform are cloud infrastructure providers Google, Amazon and Microsoft. When using the capabilities of these services, favorable conditions are created for the translation of all necessary functions into cyberspace. Today, no more than 37% of domestic organizations actually use cloud technologies to optimize their IT infrastructures, although the COVID-19 pandemic has significantly accelerated this process. Experts claim that Cloud Computing opens access to powerful resources, as well as provides a real opportunity to overcome the technological gap that separates Ukraine from more developed countries. With the successful implementation of such a transition, it is possible to organize a platform of communication environment with new features that meet modern requirements for safety and ease of use in scientific activities. Thus, "cloud computing" is a new approach that reduces the complexity of IT systems, through the use of a wide range of efficient technologies, self-managed and available on demand within the virtual infrastructure, as well as consumed as services.


2021 ◽  
Vol 2021 ◽  
pp. 1-11
Author(s):  
Amr M. Sauber ◽  
Passent M. El-Kafrawy ◽  
Amr F. Shawish ◽  
Mohamed A. Amin ◽  
Ismail M. Hagag

The main goal of any data storage model on the cloud is accessing data in an easy way without risking its security. A security consideration is a major aspect in any cloud data storage model to provide safety and efficiency. In this paper, we propose a secure data protection model over the cloud. The proposed model presents a solution to some security issues of cloud such as data protection from any violations and protection from a fake authorized identity user, which adversely affects the security of the cloud. This paper includes multiple issues and challenges with cloud computing that impairs security and privacy of data. It presents the threats and attacks that affect data residing in the cloud. Our proposed model provides the benefits and effectiveness of security in cloud computing such as enhancement of the encryption of data in the cloud. It provides security and scalability of data sharing for users on the cloud computing. Our model achieves the security functions over cloud computing such as identification and authentication, authorization, and encryption. Also, this model protects the system from any fake data owner who enters malicious information that may destroy the main goal of cloud services. We develop the one-time password (OTP) as a logging technique and uploading technique to protect users and data owners from any fake unauthorized access to the cloud. We implement our model using a simulation of the model called Next Generation Secure Cloud Server (NG-Cloud). These results increase the security protection techniques for end user and data owner from fake user and fake data owner in the cloud.


Author(s):  
Advokat Lars Perhard

Cloud Sweden is a story about how a group of experienced IT-people from different sectors of the industry came together and discussed a relatively new phenomenon called the Cloud; or what is today labelled as Cloud computing. And they realised there was a tremendous momentum and potential prosperity connected to it. They also concluded that in order to support potential users and to promote Sweden as an IT-oriented country in the forefront of the development there was a need for information – organisations considering migrating their IT functions to the Cloud should at least be able to make an informed decision. There are significant advantages with this new technology, but also a number of pitfalls that any user should be aware of. There were for example critical security issues at hand before when the servers were placed within the four walls of the office and there still are critical security issues relating to the Cloud. However, the issues to solve are different. Cloud Sweden was founded and the different branches of the group have produced a number of documents published on its website. Cloud Sweden has apart from a number of members working actively in the steering and competence groups several thousand members from the industry in a Linkedin network. In this article you will find a sample of what the legal group of Cloud Sweden has produced – a primer of legal issues that a migrant shall pay attention to before the leap into the Cloud. 


Author(s):  
Ainul Azila Che Fauzi ◽  
A. Noraziah ◽  
Tutut Herawan ◽  
Noriyani Mohd. Zin

Sign in / Sign up

Export Citation Format

Share Document