Open Access   Article Go Back

Security in Cloud Computing: A Survey

Abhishek Gaur1 , Sohini Bhar2 , Gopal Krishna Shyam3

Section:Survey Paper, Product Type: Journal Paper
Volume-07 , Issue-14 , Page no. 76-82, May-2019

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v7si14.7682

Online published on May 15, 2019

Copyright © Abhishek Gaur, Sohini Bhar, Gopal Krishna Shyam . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Abhishek Gaur, Sohini Bhar, Gopal Krishna Shyam, “Security in Cloud Computing: A Survey,” International Journal of Computer Sciences and Engineering, Vol.07, Issue.14, pp.76-82, 2019.

MLA Style Citation: Abhishek Gaur, Sohini Bhar, Gopal Krishna Shyam "Security in Cloud Computing: A Survey." International Journal of Computer Sciences and Engineering 07.14 (2019): 76-82.

APA Style Citation: Abhishek Gaur, Sohini Bhar, Gopal Krishna Shyam, (2019). Security in Cloud Computing: A Survey. International Journal of Computer Sciences and Engineering, 07(14), 76-82.

BibTex Style Citation:
@article{Gaur_2019,
author = {Abhishek Gaur, Sohini Bhar, Gopal Krishna Shyam},
title = {Security in Cloud Computing: A Survey},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {5 2019},
volume = {07},
Issue = {14},
month = {5},
year = {2019},
issn = {2347-2693},
pages = {76-82},
url = {https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=1094},
doi = {https://doi.org/10.26438/ijcse/v7i14.7682}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v7i14.7682}
UR - https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=1094
TI - Security in Cloud Computing: A Survey
T2 - International Journal of Computer Sciences and Engineering
AU - Abhishek Gaur, Sohini Bhar, Gopal Krishna Shyam
PY - 2019
DA - 2019/05/15
PB - IJCSE, Indore, INDIA
SP - 76-82
IS - 14
VL - 07
SN - 2347-2693
ER -

           

Abstract

As per a Forbes` report distributed in 2015, cloud-based security spending is required to increment by 42 percent. As per another examination, the IT security use had expanded to 79.1 percent by 2015, demonstrating an expansion of something beyond than 10 percent every year. Worldwide Data Corporation (IDC) in 2011 demonstrated that 74.6 percent of big business clients positioned security as a noteworthy test. It is a normally acknowledged actuality that since 2008, cloud is a reasonable facilitating stage; be that as it may, the recognition regarding security in the cloud is that it needs critical upgrades to acknowledge higher rates of adaption in the venture scale. As recognized by another examination, a large number of the issues standing up to the distributed computing should be settled direly. The industry has made huge advances in combatting dangers to distributed computing, yet there is something else entirely to be done to accomplish a dimension of development that at present exists with conventional/on-start facilitating. This paper outlines various companion looked into articles on security dangers in cloud figuring and the preventive techniques. The goal of my examination is to comprehend the cloud parts, security issues, and dangers, alongside developing arrangements that may possibly alleviate the vulnerabilities in the cloud.

Key-Words / Index Term

Security Issues, Distributed Computing

References

[1] Qi Jiang, Jianfeng Ma, Fushan Wei, “On the Security of a Privacy-Aware Authentication Scheme for Distributed Mobile Cloud Computing Services”, 2018,
[2] Gururaj Ramachandra, Mohsin Iftikhar, Farrukh Aslam Khan, “A Comprehensive Survey on Security in Cloud Computing”, 2017.
[3] State of the Cloud Report, 2017.
[4] State of Cloud Adoption And Security, 2017.
[5] Coppolino L, D’Antonio S, Mazzeo G, Romano L, “Cloud security: Emerging threats and current solutions Computers and Electrical Engineering”, 2016.
[6] Sharma. R. and Trivedi. R. K, “Literature review: Cloud Computing –Security Issues, Solution and Technologies”, International Journal of Engineering Research, Vol. 3, Issue 4, pp. 221-225, 2014.
[7] Chirag Modi, Dhiren Patel, Bhavesh Borisaniya, Avi Patel, Muttukrishnan Rajarajan, “A survey on security issues and solutions at different layers of Cloud computing”, 2012.
[8] Amlan Jyoti Choudhury, Pardeep Kumar, Mangal Sain, Hyotaek Lim, Hoon Jae-Lee, “A Strong User Authentication Framework for Cloud Computing”, 2011.
[9] S. Subashini N, V.Kavitha, “A survey on security issues in service delivery models of cloud computing”, 2010.
[10] Meiko Jensen, Jorg Schwenk, Nils Gruschka, Luigi Lo Iacono., “On Technical Security Issues in Cloud Computing”, 2009.