Open Access   Article Go Back

Security Issues in Cloud Computing

Indu Sharma1 , Mandeep Kaur2

Section:Review Paper, Product Type: Journal Paper
Volume-3 , Issue-2 , Page no. 80-82, Feb-2015

Online published on Feb 28, 2015

Copyright © Indu Sharma , Mandeep Kaur . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Indu Sharma , Mandeep Kaur, “Security Issues in Cloud Computing,” International Journal of Computer Sciences and Engineering, Vol.3, Issue.2, pp.80-82, 2015.

MLA Style Citation: Indu Sharma , Mandeep Kaur "Security Issues in Cloud Computing." International Journal of Computer Sciences and Engineering 3.2 (2015): 80-82.

APA Style Citation: Indu Sharma , Mandeep Kaur, (2015). Security Issues in Cloud Computing. International Journal of Computer Sciences and Engineering, 3(2), 80-82.

BibTex Style Citation:
@article{Sharma_2015,
author = {Indu Sharma , Mandeep Kaur},
title = {Security Issues in Cloud Computing},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {2 2015},
volume = {3},
Issue = {2},
month = {2},
year = {2015},
issn = {2347-2693},
pages = {80-82},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=408},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=408
TI - Security Issues in Cloud Computing
T2 - International Journal of Computer Sciences and Engineering
AU - Indu Sharma , Mandeep Kaur
PY - 2015
DA - 2015/02/28
PB - IJCSE, Indore, INDIA
SP - 80-82
IS - 2
VL - 3
SN - 2347-2693
ER -

VIEWS PDF XML
2542 2330 downloads 2505 downloads
  
  
           

Abstract

Cloud computing trend is increasing rapidly so to make cloud computing more popular the very first step for the organization is to identify exact area where the cloud related threats lie. At an unusual pace, cloud computing has transformed business and government. And this created new security challenges. The development of the cloud service model provide business – supporting technology in a more efficient way than ever before .the shift from server to service based technology brought a drastic change in computing technology. However these developments have created new security vulnerabilities, including security issues whose full impressions are still rising. This paper presents an overview and study of cloud computing, with several security threats, security issues, currently used cloud technologies and security solutions.

Key-Words / Index Term

Data Security, Cloud, Computing, Privacy

References

[1]The Forrester Wave™: Public Cloud Platform Service Providers’ Security, Q4 2014 by Andras Cser and Ed Ferrara, November 17, 2014
[2] R. Latif, H. Abbas, S. Assar, and Q. Ali, “Cloud computing risk assessment: a systematic literature review,” in Future Information Technology, Springer, Berlin, Germany, , pp. 285–295,2014.
[3] A. Aviˇzienis, J. Laprie, B. Randell, and C. Landwehr, “Basic concepts and taxonomy of dependable and secure computing,”IEEE Transactions on Dependable and Secure Computing, vol. 1, no. 1, pp. 11–33, 2004.
[4] Subashini S, Kavitha V (2011) A survey on Security issues in service deliverymodels of Cloud Computing. J Netw Comput Appl 34(1):1–11, 2011
[5] Keiko Hashizume1*, David G Rosado2, Eduardo Fernández-Medina2 and Eduardo B Fernandez1 “An analysis of security issues for cloud computing” Hashizume et al. Journal of Internet Services and Applications, 4:5 , 2013
[6] Mohammed A.AlZain, Eric Pardede, Ben Soh, James A.Thom2012.“Cloud ComputingSecurity:From Single to Multi-Clouds” 2012 5thHawaii International Conference on System Sciences. 2012
[7] Yunchuan Sun, Junsheng Zhang, Yongping Xiong, and Guangyu Zhu Data Security and Privacy in Cloud Computing Data Security and Privacy in Cloud Computing.
[8] D. H. Rakesh, R. R. Bhavsar, and A. S. Thorve, “Data security over cloud,” International Journal of Computer Applications, no.5, pp. 11–14, 2012.