Open Access   Article Go Back

Cloud Computing: Study of Security Problems and Analysis Challenges

M. Angelin Rosy1 , V. Shanthakumar2 , M. Felix Xavier Muthu3

Section:Research Paper, Product Type: Journal Paper
Volume-07 , Issue-17 , Page no. 79-84, May-2019

Online published on May 22, 2019

Copyright © M. Angelin Rosy, V. Shanthakumar, M. Felix Xavier Muthu . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: M. Angelin Rosy, V. Shanthakumar, M. Felix Xavier Muthu, “Cloud Computing: Study of Security Problems and Analysis Challenges,” International Journal of Computer Sciences and Engineering, Vol.07, Issue.17, pp.79-84, 2019.

MLA Style Citation: M. Angelin Rosy, V. Shanthakumar, M. Felix Xavier Muthu "Cloud Computing: Study of Security Problems and Analysis Challenges." International Journal of Computer Sciences and Engineering 07.17 (2019): 79-84.

APA Style Citation: M. Angelin Rosy, V. Shanthakumar, M. Felix Xavier Muthu, (2019). Cloud Computing: Study of Security Problems and Analysis Challenges. International Journal of Computer Sciences and Engineering, 07(17), 79-84.

BibTex Style Citation:
@article{Rosy_2019,
author = {M. Angelin Rosy, V. Shanthakumar, M. Felix Xavier Muthu},
title = {Cloud Computing: Study of Security Problems and Analysis Challenges},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {5 2019},
volume = {07},
Issue = {17},
month = {5},
year = {2019},
issn = {2347-2693},
pages = {79-84},
url = {https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=1317},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=1317
TI - Cloud Computing: Study of Security Problems and Analysis Challenges
T2 - International Journal of Computer Sciences and Engineering
AU - M. Angelin Rosy, V. Shanthakumar, M. Felix Xavier Muthu
PY - 2019
DA - 2019/05/22
PB - IJCSE, Indore, INDIA
SP - 79-84
IS - 17
VL - 07
SN - 2347-2693
ER -

           

Abstract

Cloud computing is that the apply of employing a network of remote servers hosted on web to store, manage and method information on demand and pay as per use. It provides access to a pool of shared resources rather than native servers or personal computers. As it doesn’t acquire the items physically, it saves managing value and time for organizations. Cloud computing could be a utterly web dependent technology wherever consumer knowledge is hold on and maintain within the knowledge center of a cloud supplier like Google, Amazon, Microsoft etc .Cloud computing is an rising domain and is acclaimed throughout the globe. There are some security problems locomotion in whereas mistreatment services over the cloud. This analysis paper presents a review on the cloud computing ideas moreover as security problems inherent inside the context of cloud computing and cloud infrastructure. This paper additionally analyzes the key analysis and challenges that presents in cloud computing and offers best practices to service suppliers moreover as enterprises hoping to leverage cloud service to enhance their bottom line during this severe economic climate and intensify its usage. The main stress of our study supported existing literature and to know the idea of multi-tenancy security issue.

Key-Words / Index Term

Cloud computing, Multitenancy, Data, management

References

[1] Abbadi, I.M. and Martin, A. (2011). “Trust in the Cloud”. Information Security Technical Report, 16, 108-114. doi:10.1016/j.istr.2011.08.006
[2] Agarwal, A. and Agarwal, A. (2011). “The Security Risks Associated with Cloud Computing”. International Journal of Computer Applications in Engineering Sciences, 1 (Special Issue on CNS), 257-259.
[3] Arshad, J, Townsend, P. and Xu, J. (2013).”A novel intrusion severity analysis approach for Clouds. Future Generation Computer Systems”, 29, 416–428. doi:10.1016/j.future.2011.08.009.
[4] Atayero, A.A. and Feyisetan, O. (2011). “Security Issues in Cloud Computing: The Potentials of Homomorphic Encryption”. Journal of Emerging Trends in Computing and Information Sciences, 2(10), 546-552.
[5] Bisong, A. and Rahman, S.S.M. (2011). “An Overview of the Security Concerns in Enterprise Cloud Computing. International Journal of Network Security & Its Applications”, 3(1), 30-45. doi:10.5121/ijnsa.2011.3103
[6] Buyya, R., Yeo, C.S., Venugopal, S., Broberg, J. and Brandic, I. (2009). “Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the 5th utility. Future Generation Computer Systems”, 25, 599–616.
[7] Casola, V., Cuomo, A., Rak, M. and Villano, U. (2013). “The CloudGrid approach: Security analysis and performance evaluation. Future Generation Computer Systems”, 29, 387–401. doi:10.1016/j.future.2011.08.008
[8] Celesti, A., Fazio, M., Villari, M. and Puliafito, A. (2012). “Virtual machine provisioning through satellite communications in federated Cloud environments. Future Generation Computer Systems”, 28, 85–93. doi:10.1016/j.future.2011.05.021