Most Read Research Articles


Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79
Call for Paper - May 2015 Edition
IJCA solicits original research papers for the May 2015 Edition. Last date of manuscript submission is April 20, 2015. Read More

Risk Involved in Cloud Data Storage and its Safety Measures

Print
PDF
International Journal of Computer Applications
© 2014 by IJCA Journal
Volume 104 - Number 2
Year of Publication: 2014
Authors:
K. Mythili
S. Rajalakshmi
10.5120/18176-9067

K Mythili and S Rajalakshmi. Article: Risk Involved in Cloud Data Storage and its Safety Measures. International Journal of Computer Applications 104(2):25-27, October 2014. Full text available. BibTeX

@article{key:article,
	author = {K. Mythili and S. Rajalakshmi},
	title = {Article: Risk Involved in Cloud Data Storage and its Safety Measures},
	journal = {International Journal of Computer Applications},
	year = {2014},
	volume = {104},
	number = {2},
	pages = {25-27},
	month = {October},
	note = {Full text available}
}

Abstract

Cloud computing is a technology which will facilitate companies or organisation to host their services without worrying about IT infrastructure and other supporting services. Usually cloud computing services are delivered by a third party – Cloud Service Provider(CSP) provider who owns the infrastructure. Cloud computing offers an innovative business model for organizations to adopt IT services without upfront investment. Despite the potential gains achieved from the cloud computing, the organizations are slow in accepting it due to security issues and challenges associated with it. In this paper we focus on risks involved in data storage in cloud computing and solutions to minimize the risks.

References

  • Cong Wang, Qian Wang, Kui Ren, Ning Cao, and Wenjing Lou, "Toward Secure and Dependable Storage Services in Cloud Computing" IEEE Transactions on services computation vol. 5, no. 2, April-June 2012.
  • C. Wang, Q. Wang, K. Ren, and W. Lou, "Ensuring Data Storage Security in Cloud Computing," Proc. 17th Int'l Workshop Quality of Service (IWQoS '09), pp. 1-9, July 2009.
  • A. Juels and B. S. Kaliski Jr. , "PORs: Proofs of Retrievability for Large Files," Proc. 14th ACM Conf. Computer and Comm. Security (CCS '07), pp. 584-597, Oct. 2007.
  • Sun Microsystems, Inc. , "Building Customer Trust in Cloud Computing with Transparent Security," https://www. sun. com/offers/details/sun_transparency. xml, Nov. 2009.
  • K. Ren, C. Wang, and Q. Wang, "Security Challenges for the Public Cloud," IEEE Internet Computing, vol. 16, no. 1, pp. 69-73, 2012.
  • M. A. Shah, M. Baker, J. C. Mogul, and R. Swaminathan, "Auditing to Keep Online Storage Services Honest," Proc. 11th USENIX Workshop Hot Topics in Operating Systems (HotOS '07), pp. 1-6, 2007.
  • Q. Wang, C. Wang, J. Li, K. Ren, and W. Lou, "Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing," Proc. 14th European Conf. Research in Computer Security (ESORICS '09), pp. 355-370, 2009.
  • Q. Wang, C. Wang, K. Ren, W. Lou, and J. Li, "Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing," IEEE Trans. Parallel and Distributed Systems, vol. 22, no. 5, pp. 847-859, 2011.
  • Cloud_Security_Alliance (2009, April). "Security Guidance forCritical Areas of Focus in Cloud Computing. " Retrieved Nov 25, 2009, from http://www. cloudsecurityalliance. org/guidance/csaguide. pdf
  • Addressing Cloud Computing Security Issues, Future generation computer systems (2011) www. elsevier. com/locate/fgcs.