Review of Security and Privacy Techniques in Cloud Computing Environment

被引:4
|
作者
Mote, Rutuja [1 ]
Pawar, Ambika [1 ]
Dani, Ajay [2 ]
机构
[1] Symbiosis Int Univ, Comp Sci Symbiosis Inst Technol SIT, Pune 412115, Maharashtra, India
[2] GH Raisoni Inst Engn & Technol, Pune 412207, Maharashtra, India
关键词
Cloud computing; Privacy; Security; Encryption; Hybrid cloud; Map-reduce; MANAGEMENT;
D O I
10.1007/978-3-319-30933-0_54
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Cloud is an ironic solution of the ultimate globalization which is a bunch of dedicated servers, networking elements such as software and hardware networked with the internet. Cloud computing enables the user to utilize the applications, storage solutions, and resources, likewise it also authorizes the data access, data management, and connectivity. All the activities of the cloud infrastructure seem to be transparent to ensure it without any notion of the locale to its user. The rising technology aids to deliver on-demand web access speedily to the computing resources. Cloud user can access and release the computing resources with minimum management effort and least interaction with cloud service provider. A consolidated cloud service i.e., hybrid cloud renders a federation, bridge, secure encrypted connection, information placement decision between the public and private cloud and utilizes the services of the two clouds those are security, availability, and cost effectiveness. Though cloud computing services have bags of inherent benefits, there are likelihood risks in privacy and security heeding's that should be thought over before collecting, processing, sharing or storing enterprise or individual's data in the cloud. This survey paper explores the contemporary techniques and methods to furnish a trustworthy and foolproof cloud computing environment.
引用
收藏
页码:543 / 551
页数:9
相关论文
共 50 条
  • [1] Security Techniques for Cloud Computing Environment
    Garg, Prachi
    Goel, Sandeep
    Sharma, Avinash
    [J]. 2017 IEEE INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND AUTOMATION (ICCCA), 2017, : 771 - 776
  • [2] A Review on Privacy and Security Assessment of Cloud Computing
    Jain, Khushboo
    Gupta, Manali
    Abraham, Ajith
    [J]. JOURNAL OF INFORMATION ASSURANCE AND SECURITY, 2021, 16 (05): : 161 - 168
  • [3] Security and Privacy in Cloud Computing: Technical Review
    Abdulsalam, Yunusa Simpa
    Hedabou, Mustapha
    [J]. FUTURE INTERNET, 2022, 14 (01)
  • [4] Analysing Security and Privacy Management For Cloud Computing Environment
    Gourkhede, Manish H.
    Theng, Deepti P.
    [J]. 2014 FOURTH INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS AND NETWORK TECHNOLOGIES (CSNT), 2014, : 677 - 680
  • [5] Special issue on security and privacy techniques in mobile cloud computing
    Ilsun You
    Jin Li
    [J]. Journal of Ambient Intelligence and Humanized Computing, 2016, 7 : 607 - 609
  • [6] Special issue on security and privacy techniques in mobile cloud computing
    You, Ilsun
    Li, Jin
    [J]. JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2016, 7 (05) : 607 - 609
  • [7] Security and Privacy Issues in Cloud Computing Environment: A Survey Paper
    Ullah, Kaleem
    Khan, M. N. A.
    [J]. INTERNATIONAL JOURNAL OF GRID AND DISTRIBUTED COMPUTING, 2014, 7 (02): : 89 - 98
  • [8] Security and Privacy in Cloud Computing
    Tari, Zahir
    [J]. IEEE CLOUD COMPUTING, 2014, 1 (01): : 54 - 57
  • [9] Security and Privacy in Cloud Computing
    Hamouda, Sara
    [J]. 2012 INTERNATIONAL CONFERENCE ON CLOUD COMPUTING TECHNOLOGIES, APPLICATIONS AND MANAGEMENT (ICCCTAM), 2012, : 241 - 245
  • [10] Security and Privacy in Cloud Computing
    Xiao, Zhifeng
    Xiao, Yang
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2013, 15 (02): : 843 - 859