Open Access   Article Go Back

Is Cloud Secure?

B. Balamurugan1 , K. Marimuthu2 , S. Rajkumar3 , M. Alenezi4 , R. Niranchana5

Section:Review Paper, Product Type: Journal Paper
Volume-4 , Issue-10 , Page no. 126-129, Oct-2016

Online published on Oct 28, 2016

Copyright © B. Balamurugan, K. Marimuthu, S. Rajkumar, M. Alenezi, R. Niranchana . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: B. Balamurugan, K. Marimuthu, S. Rajkumar, M. Alenezi, R. Niranchana, “Is Cloud Secure?,” International Journal of Computer Sciences and Engineering, Vol.4, Issue.10, pp.126-129, 2016.

MLA Style Citation: B. Balamurugan, K. Marimuthu, S. Rajkumar, M. Alenezi, R. Niranchana "Is Cloud Secure?." International Journal of Computer Sciences and Engineering 4.10 (2016): 126-129.

APA Style Citation: B. Balamurugan, K. Marimuthu, S. Rajkumar, M. Alenezi, R. Niranchana, (2016). Is Cloud Secure?. International Journal of Computer Sciences and Engineering, 4(10), 126-129.

BibTex Style Citation:
@article{Balamurugan_2016,
author = {B. Balamurugan, K. Marimuthu, S. Rajkumar, M. Alenezi, R. Niranchana},
title = {Is Cloud Secure?},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {10 2016},
volume = {4},
Issue = {10},
month = {10},
year = {2016},
issn = {2347-2693},
pages = {126-129},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=1089},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=1089
TI - Is Cloud Secure?
T2 - International Journal of Computer Sciences and Engineering
AU - B. Balamurugan, K. Marimuthu, S. Rajkumar, M. Alenezi, R. Niranchana
PY - 2016
DA - 2016/10/28
PB - IJCSE, Indore, INDIA
SP - 126-129
IS - 10
VL - 4
SN - 2347-2693
ER -

VIEWS PDF XML
1501 1328 downloads 1327 downloads
  
  
           

Abstract

Cloud computing is the buzz word, the corporate world pronounces every now and then. All the software companies are looking for a where about to store their data at a low cost and reduce the problem of selecting and updating a suitable infrastructure. The mushroom growth of startups and their prosperity and share in the software trends has also mounted the need of cloud computing. On the other hand, several other problems have taken birth like the believability of the cloud and the security concerns of it [1].The cloud users are stranded in a situation either to believe cloud or to wait for some more time for transiting to cloud .This position paper gives a thorough analysis of the cloud security and the stand the cloud computing has taken currently.

Key-Words / Index Term

Cloud security alliance; Data loss; denial of service attack; Server Reboot

References

[1] R. K. L. Ko, "Cloud computing in plain English," ACM Crossroads, vol. 16 (3), pp. 5-6, 2010.
[2] https://cloudsecurityalliance.org
[3] https://cloudsecurityalliance.org/research/vulnerabilities
[4] https://cloudsecurityalliance.org/download/cloud-computing-vulnerability-incidents-a-statistical-overview
[5] https://cloudsecurityalliance.org/topthreats/csathreats.v1.0.pdf‎
[6] http://www.symantec.com/connect/blogs/avoiding-hidden-costs-cloud-0, Created: 15 Jan 2013, Updated: 15 Jan 2013 ,Tom Powledge.
[7] https://cloudsleuth.net/global-provider-view
[8] Shu-Min Chuang; Kuo-En Chang; Yao-Ting Sung, "The cost effective structure for designing hybrid cloud based enterprise E-learning platform," Cloud Computing and Intelligence Systems (CCIS), 2011 IEEE International Conference on , vol., no., pp.523,525, 15-17 Sept. 2011
[9] http://www.compuware.com
[10] http://www.compuware.com/en_us/about/techfail.html
[11] https://cloudsleuth.net/cdn-performance-analyzer
[12] https://csrc.nist.gov/publications/nistpubs/800-144/SP800-144.pdf‎
[13] Shaheen Ayyub and Devshree Roy, "Cloud Computing Characteristics and Security Issues", International Journal of Computer Sciences and Engineering, Volume-01, Issue-04, Page No (18-22), Dec -2013,
[14] Reddy, Varun K., and Jagadeeshwar E. Rao. "A Survey on Security in Cloud Using Homographic and Disk Encryption Methods." International Journal of Computer Sciences and Engineering 2 (2014).
[15] Putri, N.R., Mganga, M.C. 2011. Enhancing Information Security in Cloud qe Computing Services using SLA Based Metrics. Master�s thesis: Blekinge Institute of Technology.[Online].
[16] Mewada, Shivlal, Umesh Kumar Singh, and Pradeep Sharma. "Security Based Model for Cloud Computing." Int. Journal of Computer Networks and Wireless Communications (IJCNWC) 1.1 (2011): 13-19.
[17] Mewada, Shivlal, Umesh Kumar Singh, and Pradeep Sharma. "Security Enhancement in Cloud Computing (CC)." International Journal of Scientific Research in Computer Science and Engineering 1.01 (2013): 31-37.
[18] K. Erkan, �Evaluating IT Security Performance with Quantifiable Metrics�, Institutionen f�or Data- och Systemvetenskap, KTH.
[19] E. Chew, M. Swanson, K. Stine et al., "Performance Measurement Guide forInformation Security," NIST Special Publication 800-55 Revision 1, National Institute of Standards and Technology & U.S. Department of Commerce, 2008.
[20] http://www.pcisecuritystandards.org/pdfs/PCI_DSS_v2_Cloud_Guidelines.pdf
[21] Niketan Jivane, Supriya Jivane, S.Rajkumar and K.Marimuthu, �Enhancement of an algorithm to extract text-lines from images for blind and visually impaired persons through parallel approach, International Journal of Computer Sciences and Engineering 4(9), pp. 25-32, 2016.
[22] Xiong Li, Jianwei Niu, Marimuthu Karuppiah, Saru Kumari, Fan Wu(2016), Secure and Efficient Two-factors User Authentication Scheme with User Anonymity for Network Based E-Health Care Applications., Journal of Medical Systems, DOI: 10.1007/s10916-016-0629-8.
[23] Marimuthu Karuppiah, Saru Kumari, Xiong Li, Fan Wu, Muhammad Khurram Khan, R Saravanan, Sayantani Basu,(2016), A Dynamic ID-based Generic Framework for Anonymous Authentication Scheme for Roaming Service in Global Mobility Networks, Wireless Personal Communication, DOI: 10.1007/s11277-016-3672-3.
[24] Saru Kumari, Marimuthu Karuppiah, Xiong Li, Fan Wu, Ashok Kumar Das, Vanga Odelu (2016), A Secure Trust-Extended Authentication Mechanism for VANETs, Security and Communication Networks, DOI: 10.1002/sec.1602.
[25] Marimuthu Karuppiah, Saru Kumari, Ashok Kumar Das, Xiong Li, Fan Wu, Sayantani Basu (2016), A Secure Lightweight Authentication Scheme with User Anonymity for Roaming Service in Ubiquitous Networks, Security and Communication Networks, DOI: 10.1002/sec.1598.
[26] Marimuthu Karuppiah(2016), Remote User Authentication Scheme using Smart card: A Review, International Journal of Internet Protocol Technology, 9(2/3): 107�120.
[27] Fan Wu, Lili Xu, Saru Kumari, Xiong Li, Ashok Kumar Das, Muhammad Khurram Khan, Marimuthu Karuppiah, Renuka Baliyan (2016), A novel and provably secure authentication and key agreement scheme with user anonymity for global mobility networks, Security and Communication Networks, DOI: 10.1002/sec.1558.
[28] Swapnil Rajesh Telrandhe and Deepak Kapgate, "Authentication Model on Cloud Computing", International Journal of Computer Sciences and Engineering, Volume-02, Issue-10, Page No (33-37), Oct -2014,
[29] S. Mewada, P. Sharma and S. S. Gautam, "Exploration of efficient symmetric algorithms," 2016 3rd International Conference on Computing for Sustainable Global Development (INDIACom), New Delhi, India, 2016, pp. 663-666
[30] Karuppiah, Marimuthu, and R. Saravanan. "A secure remote user mutual authentication scheme using smart cards." Journal of information security and applications 19.4 (2014): 282-294.