A COMPREHENSIVE REVIEW ON CLOUD COMPUTING SECURITY

被引:0
|
作者
Shanmugasundaram, G. [1 ]
Aswini, V. [1 ]
Suganya, G. [1 ]
机构
[1] Sri Manakula Vinayagar Engn Coll, Dept Informat Technol, Pondicherry, India
关键词
Cloud computing; Service provider; Cloning; Infrastructure;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Cloud computing have turn out to be a popular buzzword in IT industry as area of computer technology. For expanding the infrastructure at cheaper cost, globally the organizations are moving toward cloud based system. Cloud computing reduces the client organization having the complete physical infrastructure of software and hardware. However, with all vitality and flexibility provided by cloud there are some concerns regarding security which may turn out to be a strong barrier. Service providers have been geographically dispersed due to enhanced migration of organization from traditional system to the cloud. Hence the data are usually stored in the servers that are remotely located at various places and unauthorized parties may have access to those data which directs to various security issues like data availability, data leakage, resource pooling, diffident interface, cloning, allocation of data and some attacks in the interior. This paper presents a review on the security issues in security standards followed in cloud, infrastructure, access control, third party privacy, confidentiality, reliability and integrity of data. It portrays the techniques employed in addressing cloud security issues and its challenges.
引用
收藏
页数:5
相关论文
共 50 条
  • [1] A Comprehensive Survey on Security in Cloud Computing
    Ramachandra, Gururaj
    Iftikhar, Mohsin
    Khan, Farrukh Aslam
    14TH INTERNATIONAL CONFERENCE ON MOBILE SYSTEMS AND PERVASIVE COMPUTING (MOBISPC 2017) / 12TH INTERNATIONAL CONFERENCE ON FUTURE NETWORKS AND COMMUNICATIONS (FNC 2017) / AFFILIATED WORKSHOPS, 2017, 110 : 465 - 472
  • [2] Information Security Risk Assessment Methods in Cloud Computing: Comprehensive Review
    Ali, Tarek
    Al-Khalidi, Mohammed
    Al-Zaidi, Rabab
    JOURNAL OF COMPUTER INFORMATION SYSTEMS, 2024,
  • [3] Data Security Frameworks for Mobile Cloud Computing: A Comprehensive Review of the Literature
    Ogwara, Noah Oghenefego
    Petrova, Krassie
    Yang, Mee Loong
    2019 29TH INTERNATIONAL TELECOMMUNICATION NETWORKS AND APPLICATIONS CONFERENCE (ITNAC), 2019,
  • [4] Security in the Cloud Computing: A Review
    Nie, Xiao
    Suo, Hui
    PROCEEDINGS OF 2012 2ND INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND NETWORK TECHNOLOGY (ICCSNT 2012), 2012, : 2145 - 2149
  • [5] Review of cloud computing security
    School of Science and Technology, University of Science and Technology of China, Hefei, Anhui 230027, China
    Tien Tzu Hsueh Pao, 2013, 2 (371-381):
  • [6] A Systematic Review of Security in Cloud Computing
    Amoud, Mohamed
    Roudies, Ounsa
    PROCEEDINGS OF THE SECOND INTERNATIONAL AFRO-EUROPEAN CONFERENCE FOR INDUSTRIAL ADVANCEMENT (AECIA 2015), 2016, 427 : 69 - 81
  • [7] A Review of Cloud Computing Security Issues
    Kaur, Manpreet
    Singh, Hardeep
    INTERNATIONAL JOURNAL OF GRID AND DISTRIBUTED COMPUTING, 2015, 8 (05): : 215 - 222
  • [8] Cloud computing simulators: A comprehensive review
    Mansouri, N.
    Ghafari, R.
    Zade, B. Mohammad Hasani
    SIMULATION MODELLING PRACTICE AND THEORY, 2020, 104
  • [9] IDPS based Framework for Security in Green Cloud Computing and Comprehensive Review on Existing Frameworks and Security Issues
    Gill, Komal Singh
    Sharma, Anju
    2015 INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND SECURITY (ICCCS), 2015,
  • [10] A Review on Privacy and Security Assessment of Cloud Computing
    Jain, Khushboo
    Gupta, Manali
    Abraham, Ajith
    JOURNAL OF INFORMATION ASSURANCE AND SECURITY, 2021, 16 (05): : 161 - 168