A COMPREHENSIVE REVIEW ON CLOUD COMPUTING SECURITY

被引:0
|
作者
Shanmugasundaram, G. [1 ]
Aswini, V. [1 ]
Suganya, G. [1 ]
机构
[1] Sri Manakula Vinayagar Engn Coll, Dept Informat Technol, Pondicherry, India
关键词
Cloud computing; Service provider; Cloning; Infrastructure;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Cloud computing have turn out to be a popular buzzword in IT industry as area of computer technology. For expanding the infrastructure at cheaper cost, globally the organizations are moving toward cloud based system. Cloud computing reduces the client organization having the complete physical infrastructure of software and hardware. However, with all vitality and flexibility provided by cloud there are some concerns regarding security which may turn out to be a strong barrier. Service providers have been geographically dispersed due to enhanced migration of organization from traditional system to the cloud. Hence the data are usually stored in the servers that are remotely located at various places and unauthorized parties may have access to those data which directs to various security issues like data availability, data leakage, resource pooling, diffident interface, cloning, allocation of data and some attacks in the interior. This paper presents a review on the security issues in security standards followed in cloud, infrastructure, access control, third party privacy, confidentiality, reliability and integrity of data. It portrays the techniques employed in addressing cloud security issues and its challenges.
引用
收藏
页数:5
相关论文
共 50 条
  • [1] A Comprehensive Survey on Security in Cloud Computing
    Ramachandra, Gururaj
    Iftikhar, Mohsin
    Khan, Farrukh Aslam
    [J]. 14TH INTERNATIONAL CONFERENCE ON MOBILE SYSTEMS AND PERVASIVE COMPUTING (MOBISPC 2017) / 12TH INTERNATIONAL CONFERENCE ON FUTURE NETWORKS AND COMMUNICATIONS (FNC 2017) / AFFILIATED WORKSHOPS, 2017, 110 : 465 - 472
  • [2] Data Security Frameworks for Mobile Cloud Computing: A Comprehensive Review of the Literature
    Ogwara, Noah Oghenefego
    Petrova, Krassie
    Yang, Mee Loong
    [J]. 2019 29TH INTERNATIONAL TELECOMMUNICATION NETWORKS AND APPLICATIONS CONFERENCE (ITNAC), 2019,
  • [3] Information Security Risk Assessment Methods in Cloud Computing: Comprehensive Review
    Ali, Tarek
    Al-Khalidi, Mohammed
    Al-Zaidi, Rabab
    [J]. JOURNAL OF COMPUTER INFORMATION SYSTEMS, 2024,
  • [4] Security in the Cloud Computing: A Review
    Nie, Xiao
    Suo, Hui
    [J]. PROCEEDINGS OF 2012 2ND INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND NETWORK TECHNOLOGY (ICCSNT 2012), 2012, : 2145 - 2149
  • [5] Review of cloud computing security
    School of Science and Technology, University of Science and Technology of China, Hefei, Anhui 230027, China
    [J]. Tien Tzu Hsueh Pao, 2013, 2 (371-381):
  • [6] A Review of Cloud Computing Security Issues
    Kaur, Manpreet
    Singh, Hardeep
    [J]. INTERNATIONAL JOURNAL OF GRID AND DISTRIBUTED COMPUTING, 2015, 8 (05): : 215 - 222
  • [7] Cloud computing simulators: A comprehensive review
    Mansouri, N.
    Ghafari, R.
    Zade, B. Mohammad Hasani
    [J]. SIMULATION MODELLING PRACTICE AND THEORY, 2020, 104
  • [8] A Systematic Review of Security in Cloud Computing
    Amoud, Mohamed
    Roudies, Ounsa
    [J]. PROCEEDINGS OF THE SECOND INTERNATIONAL AFRO-EUROPEAN CONFERENCE FOR INDUSTRIAL ADVANCEMENT (AECIA 2015), 2016, 427 : 69 - 81
  • [9] IDPS based Framework for Security in Green Cloud Computing and Comprehensive Review on Existing Frameworks and Security Issues
    Gill, Komal Singh
    Sharma, Anju
    [J]. 2015 INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND SECURITY (ICCCS), 2015,
  • [10] A Critical Review of Security Threats in Cloud Computing
    Irfan, Mahroosh
    Usman, Muhammad
    Zhuang, Yan
    Fong, Simon
    [J]. 2015 3RD INTERNATIONAL SYMPOSIUM ON COMPUTATIONAL AND BUSINESS INTELLIGENCE (ISCBI 2015), 2015, : 105 - 111