Most Read Research Articles


Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79
Call for Paper - May 2015 Edition
IJCA solicits original research papers for the May 2015 Edition. Last date of manuscript submission is April 20, 2015. Read More

Analysis on Cloud Computing Security Issues, Threats and Solutions

Print
PDF
IJCA Proceedings on International Conference on Communication, Computing and Information Technology
© 2015 by IJCA Journal
ICCCMIT 2014 - Number 2
Year of Publication: 2015
Authors:
K. B. Priya Iyer
Padma Priya
R. Anusha

Priya K b Iyer, Padma Priya and R Anusha. Article: Analysis on Cloud Computing Security Issues, Threats and Solutions. IJCA Proceedings on International Conference on Communication, Computing and Information Technology ICCCMIT 2014(2):21-25, March 2015. Full text available. BibTeX

@article{key:article,
	author = {K.b. Priya Iyer and Padma Priya and R. Anusha},
	title = {Article: Analysis on Cloud Computing Security Issues, Threats and Solutions},
	journal = {IJCA Proceedings on International Conference on Communication, Computing and Information Technology},
	year = {2015},
	volume = {ICCCMIT 2014},
	number = {2},
	pages = {21-25},
	month = {March},
	note = {Full text available}
}

Abstract

Cloud computing is becoming very popular computing standard for network application. It is the result of existing technologies and paradigms. It is a set of resources and services offered to customers through network or internet. It provides resources that are provided as on request services to end user. It mainly aims at reduced cost, less complexity, flexibility, scalability and efficiency. Cloud computing extends various techniques such as grid computing, distributed computing and utility computing [1]. Cloud computing is used in both industrial and academic field. The data storage as a service (DAAS) in cloud provides the user a facility to store their data in remote servers which may be accessible by the user anywhere he is through the internet facility [3]. The data stored in cloud can also be accessed by other users. There is also a possibility where a hacker can pierce the cloud by stealing a genuine user's data. He is also capable of infecting the cloud which in turn affects the entire user's who are sharing the infected cloud. Here comes the problem of providing security to the cloud. Likewise both customer and service provider face few security threats [2]. Data communication through any network is at risk now, there are many encryption techniques used to protect the data. This paper discusses about security issues faced by client and server and also have analyzed about threats involved in different service models such as infrastructure as a service (IAAS), software as a service (SAAS) and platform as a service (PAAS). We have also tried to provide few countermeasures for those security issues

References

  • VahidAshktorab, Syed Reza Taghizadeh(2012)," Security Threats and Countermeasures in Cloud Computing", International Journal of Application or Innovation in Engineering & Management (IJAIEM), Volume 1, Issue 2, October 2012.
  • KangchanLee(2012)," Security Threats in Cloud Computing Environments", International Journal of Security and Its Applications Vol. 6, No. 4, October, 2012.
  • PradnyeshBhisikar, Prof. AmitSahu," Security in Data Storage and Transmission in Cloud Computing", International Journal of Advanced Research in Computer Science and Software Engineering,Volume 3, Issue 3, March 2013.
  • Prince Jain," Security Issues and their Solution in Cloud Computing", International Journal of Computing & Business Research.
  • Anjanachaudry, Ravinderthakur, manishmann,"A Review: Data Security Approach in Cloud computing by using RSA Algorithm ",International Journal of Advance Research in Computer Science and Management Studies ,Volume 1, Issue 7, December 2013 .
  • DimitriosZissis&Lekkas," Addressing cloud computing security issues,Future Generation Computer Systems.
  • Navdeep Singh, Abhinav Hans, Ashish Sharma, and Kapil Kumar," A Review on Security Issues in Cloud Computing", International Journal of Innovation and Applied Studies, Vol. 8 No. 3 Sep. 2014.
  • HarshalMahajan, Dr. NupurGiri," Threats to Cloud Computing Security", International Technological Conference-2014 (I-TechCON), Jan. 03 – 04, 2014.
  • K. S. Suresh,Prof K. V. Prasad," Security Issues and Security Algorithms in Cloud Computing", International Journal of Advanced Research in Computer Science and Software Engineering,Volume 2, Issue 10, October 2012.
  • Frederick R. Carlson," Security Analysis of Cloud Computing"
  • Garima Gupta, P. R. Laxmi and Shubhanjali Sharma," A Survey on Cloud Security Issues and Techniques",