Comparative Analysis on Security Mechanisms in Cloud

被引:0
|
作者
Fakhar, Faiza [1 ]
Shibli, Muhammad Awais [1 ]
机构
[1] Natl Univ Sci & Technol, Sch Elect Engn & Comp Sci, Islamabad, Pakistan
关键词
Public Key Infrastructure (PKI); Trust Management; Key Management; Privacy Management; Access Control;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Cloud computing confers benefits to its customers but regardless of all the advantages, information security is one of the major concerns on cloud paradigm. Information security challenge rises from the fact that consumer of public cloud services has no access to physical servers while utilizing different cloud services. Several security mechanisms such as access control, privacy management and trust management are used to enhance security at cloud epitome. This research discuses several techniques proposed by different researchers related to different security mechanisms for cloud platform. A brief comparison of all identified techniques is presented based on the criteria identified by National Institute of standards and technology for good practices and quality assessment of security mechanisms.
引用
收藏
页码:45 / 50
页数:6
相关论文
共 50 条
  • [1] A Comparative Analysis on Cloud Data Security
    Varghese, Saira
    Vigila, S. Maria Celestin
    2015 GLOBAL CONFERENCE ON COMMUNICATION TECHNOLOGIES (GCCT), 2015, : 495 - 498
  • [2] Analysis of Overhead Caused by Security Mechanisms in IaaS Cloud
    Singh, Gurjot Balraj
    Jaafar, Fehmi
    Butakov, Sergey
    2018 5TH INTERNATIONAL CONFERENCE ON CONTROL, DECISION AND INFORMATION TECHNOLOGIES (CODIT), 2018, : 952 - 958
  • [3] Requirements Capture and Comparative Analysis of Cloud Security Techniques
    Medhioub, Manel
    Hamdi, Mohamed
    Kim, Tai-Hoon
    INTERNATIONAL JOURNAL OF GRID AND DISTRIBUTED COMPUTING, 2015, 8 (02): : 285 - 307
  • [4] Performance Analysis of Implicit Security Mechanisms for Cloud Storage System
    Singh, Makhan
    Singh, Sarbjeet
    2015 2ND INTERNATIONAL CONFERENCE ON RECENT ADVANCES IN ENGINEERING & COMPUTATIONAL SCIENCES (RAECS), 2015,
  • [5] Comparative Analysis of Cloud Computing Security Frameworks for Financial Sector
    Mohanan, Sudhish
    Sridhar, Nandagopal
    Bhatia, Sajal
    PROCEEDINGS OF SIXTH INTERNATIONAL CONGRESS ON INFORMATION AND COMMUNICATION TECHNOLOGY (ICICT 2021), VOL 2, 2022, 236 : 1015 - 1025
  • [6] Comparative Analysis of Security Threats in Mobile Cloud Computing Environment
    Vishal
    Kaur, Bikrampal
    Jangra, Surender
    2018 7TH INTERNATIONAL CONFERENCE ON RELIABILITY, INFOCOM TECHNOLOGIES AND OPTIMIZATION (TRENDS AND FUTURE DIRECTIONS) (ICRITO) (ICRITO), 2018, : 385 - 390
  • [7] Comparative Analysis on the Performance of Selected Security Algorithms in Cloud Computing
    Cordova, Ronald S.
    Maata, Rolou Lyn R.
    Halibas, Alrence S.
    Al-Azawi, Rula
    2017 INTERNATIONAL CONFERENCE ON ELECTRICAL AND COMPUTING TECHNOLOGIES AND APPLICATIONS (ICECTA), 2017, : 274 - 277
  • [8] Comparative Analysis of Localization Techniques and Security Mechanisms in WSN
    Avareddy, Sudhakar
    Biradar, Rajashree, V
    2021 IEEE INTERNATIONAL CONFERENCE ON MOBILE NETWORKS AND WIRELESS COMMUNICATIONS (ICMNWC), 2021,
  • [9] Comparative Analysis of PAVD Security System with Security Mechanism of Different Cloud Storage Services
    Pawar, Yogita
    Rewagad, Prashant
    Lodha, Nisha
    2014 FOURTH INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS AND NETWORK TECHNOLOGIES (CSNT), 2014, : 611 - 614
  • [10] Security Issues and Control Mechanisms in Cloud
    Surianarayanan, Suba
    Santhanam, T.
    2012 INTERNATIONAL CONFERENCE ON CLOUD COMPUTING TECHNOLOGIES, APPLICATIONS AND MANAGEMENT (ICCCTAM), 2012, : 74 - 76