Comparative Analysis on Security Mechanisms in Cloud

被引:0
|
作者
Fakhar, Faiza [1 ]
Shibli, Muhammad Awais [1 ]
机构
[1] Natl Univ Sci & Technol, Sch Elect Engn & Comp Sci, Islamabad, Pakistan
关键词
Public Key Infrastructure (PKI); Trust Management; Key Management; Privacy Management; Access Control;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Cloud computing confers benefits to its customers but regardless of all the advantages, information security is one of the major concerns on cloud paradigm. Information security challenge rises from the fact that consumer of public cloud services has no access to physical servers while utilizing different cloud services. Several security mechanisms such as access control, privacy management and trust management are used to enhance security at cloud epitome. This research discuses several techniques proposed by different researchers related to different security mechanisms for cloud platform. A brief comparison of all identified techniques is presented based on the criteria identified by National Institute of standards and technology for good practices and quality assessment of security mechanisms.
引用
收藏
页码:45 / 50
页数:6
相关论文
共 50 条
  • [31] Analysis on the Security of Cloud Computing
    He Zhonglin
    He Yuhua
    PIAGENG 2010: PHOTONICS AND IMAGING FOR AGRICULTURAL ENGINEERING, 2010, 7752
  • [32] Security Analysis in Cloud Environment
    Akshay, M. S.
    Kakkar, Ashina
    Jayasree, K.
    Prudhvi, P.
    Metgal, Prathibha Shridhara
    ARTIFICIAL INTELLIGENCE AND EVOLUTIONARY ALGORITHMS IN ENGINEERING SYSTEMS, VOL 1, 2015, 324 : 221 - 228
  • [33] Comparative Analysis of Threat Modeling Methods for Cloud Computing towards Healthcare Security Practice
    Yeng, Prosper K.
    Wulthusen, Stephen D.
    Yang, Bian
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2020, 11 (11) : 772 - 784
  • [34] Comparative study of cryptography for cloud computing for data security
    Mathur P.
    Gupta A.K.
    Vashishtha P.
    Recent Advances in Computer Science and Communications, 2021, 14 (05) : 1508 - 1513
  • [35] A Comparative Study of National Cloud Security Strategy and Governance
    Choi, Ga-Yeong
    Seo, Jeongeun
    Kwon, Hun-Yeong
    PROCEEDINGS OF THE 25TH ANNUAL INTERNATIONAL CONFERENCE ON DIGITAL GOVERNMENT RESEARCH, DGO 2024, 2024, : 241 - 250
  • [36] Security, Privacy and Trust in Cloud Computing: A Comparative Study
    Alouane, Meryeme
    El Bakkali, Hanan
    2015 INTERNATIONAL CONFERENCE ON CLOUD TECHNOLOGIES AND APPLICATIONS (CLOUDTECH 15), 2015, : 23 - 30
  • [37] Analysis of Cloud Security and Internet of Things
    Qian, Peng
    Ding, Yaowei
    PROCEEDINGS OF THE 2016 2ND INTERNATIONAL CONFERENCE ON MATERIALS ENGINEERING AND INFORMATION TECHNOLOGY APPLICATIONS (MEITA 2016), 2017, 107 : 513 - 516
  • [38] Energy Analysis of Security for Cloud Application
    Chauhan, Nitin Singh
    Saxena, Ashutosh
    2011 ANNUAL IEEE INDIA CONFERENCE (INDICON-2011): ENGINEERING SUSTAINABLE SOLUTIONS, 2011,
  • [39] Analysis on Cloud Computing and its Security
    Liu Xiao-hui
    Song Xin-fang
    PROCEEDINGS OF THE 2013 8TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE & EDUCATION (ICCSE 2013), 2013, : 839 - 842
  • [40] Overhead Analysis of Security Primitives in Cloud
    Somani, Gaurav
    Agarwal, Akash
    Ladha, Shrutika
    2012 INTERNATIONAL SYMPOSIUM ON CLOUD AND SERVICES COMPUTING (ISCOS 2012), 2012, : 129 - 135