Most Read Research Articles


Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79
Call for Paper - May 2015 Edition
IJCA solicits original research papers for the May 2015 Edition. Last date of manuscript submission is April 20, 2015. Read More

Security Mechanisms at different Levels in Cloud Infrastructure

Print
PDF
International Journal of Computer Applications
© 2014 by IJCA Journal
Volume 108 - Number 2
Year of Publication: 2014
Authors:
Harpreet Saini
Amandeep Saini
10.5120/18880-0153

Harpreet Saini and Amandeep Saini. Article: Security Mechanisms at different Levels in Cloud Infrastructure. International Journal of Computer Applications 108(2):1-6, December 2014. Full text available. BibTeX

@article{key:article,
	author = {Harpreet Saini and Amandeep Saini},
	title = {Article: Security Mechanisms at different Levels in Cloud Infrastructure},
	journal = {International Journal of Computer Applications},
	year = {2014},
	volume = {108},
	number = {2},
	pages = {1-6},
	month = {December},
	note = {Full text available}
}

Abstract

Cloud computing refers to a set of services and resources offered to its consumers through internet. The user data and applications software shift to highly optimal data i. e. cloud. Either it may be a small or medium business infrastructure must focus on resource and information sharing among various users due to minimization of infrastructure cost. Cloud computing provides a lot of benefit, instead of its security is key inhibitor to cloud adoption. So, Cloud computing has brought various security threats which leads to lack of wide adoption of Cloud computing. This study aims to identify major security threats and security mechanisms and how to assess these security threats or vulnerabilities.

References

  • Deepak Panth, Dhananjay Mehta, Rituparna Shelgaonkar, "A Survey on Security Mechanisms of Leading Cloud Service Providers", International Journal of Computer Applications, vol. 98-No. 1, July 2014.
  • Rajarshi Roy Chowdhury, "Security in Cloud Computing", International Journal of Computer Applications, vol. 96-No. 15, June 2014.
  • Rabi Prasad Padhy, Manas Ranjan Patra, Suresh Chandra Satapathy, " Cloud Computing: Security Issues and Research Challenges", IRACST - International Journal of Computer Science and Information Technology & Security (IJCSITS), Vol. 1, No. 2, December 2011.
  • Parminder Singh, Sarpreet Singh, "A New Advance Efficient RBAC to Enhance the Security in Cloud Computing", International Journal of Advanced Research in Computer Science and Software Engineering, Volume 3, Issue 6, June 2013.
  • Samy Gerges, Sherif Khattab, Hesham Hassan, Fatma A Omara, "Scalable Multi-Tenant Authorization in Highly-Collaborative Cloud Applications", Vol. 2, No. 2, April 2013, pp 106~115.
  • Te-Shun Chou, "Security Threats on Cloud Computing Vulnerabilities", International Journal of Computer Science & Information Technology (IJCSIT) Vol 5, No 3, June 2013.
  • Rajani Sharma, Rajender Kumar Trivedi, "Literature review: Cloud Computing –Security Issues, Solution and Technologies", International Journal of Engineering Research ISSN:2319-6890)(online),2347-5013(print) Volume No. 3, Issue No. 4, pp : 221-225 01 April 2014.
  • Subashini, V. Kavitha "A survey on security issues in service delivery models of cloud computing. " Journal of Network and Computer Applications 34(1): 1-11.
  • Qian, Ling, et al. "Cloud computing: An overview. " Cloud Computing. Springer Berlin Heidelberg, 2009. 626-631.
  • Piplode,k. singh. ?An Overview and Study of Security Issues & Challenges in Cloud Computing ?. Volume 2, Issue 9, September 2012, ISSN: 2277 128X.
  • Kangchan Lee, "Security Threats in Cloud Computing Environments", International Journal of Security and Its Applications Vol. 6, No. 4, October, 2012
  • W. Li and L. Ping, "Trust Model to Enhance Security and Interoperability of Cloud Environment", Cloud Computing, Proceedings on First International Conference, CloudCom 2009, Beijing, China, December 1-4, 2009, Lecture Notes in Computer Science, vol. 5931, (2009), pp. 69-79.
  • T. Ormandy, "An Empirical Study into the Security Exposure to Hosts of Hostile Virtualized Environments", Whitepaper, (2008).
  • B. P. Rimal, Choi Eunmi, I. Lumb, "A Taxonomy and Survey of Cloud Computing Systems", Intl. Joint Conference on INC, IMS and IDC, 2009, pp. 44-51, Seoul, Aug, 2009. DOI: 10. 1109/NCM. 2009. 218.
  • Fernandes, Diogo AB, et al. "Security issues in cloud environments: a survey" International Journal of Information Security (2013): 1-58.