The Recent Trends, Techniques and Methods of Cloud Security

被引:1
|
作者
Yadav, Ravinder [1 ]
Kilaru, Aravind [1 ]
Kumari, Shambhavi [1 ]
机构
[1] Manipal Univ Jaipur, Jaipur, Rajasthan, India
来源
INFORMATION AND COMMUNICATION TECHNOLOGY FOR INTELLIGENT SYSTEMS (ICTIS 2017) - VOL 2 | 2018年 / 84卷
关键词
Cloud computing; RDS; TDS; ACPM; SNM; GALAXY; PIPELINE;
D O I
10.1007/978-3-319-63645-0_66
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Security is one of the most important challenge that users face in migrating to cloud services. Users will lose the direct control over their data and they need to trust the cloud service provider (CSP) for security and access control. Therefore, this raises concern about security and privacy of data. Due to vulnerability of data being stored at these super data center, leads to more introspection about security in cloud computing. Thus, the security is the more prominent concern that need to be addressed to provide safe services. Many researches are going on for improving the security of the cloud storage systems. This survey paper focus on the trusted storage cloud computing proposed by different researchers.
引用
收藏
页码:594 / 601
页数:8
相关论文
共 50 条
  • [1] Recent Trends on Intelligent Management Technologies for Cloud Computing and Security
    Jung, Jason J.
    INFORMATION-AN INTERNATIONAL INTERDISCIPLINARY JOURNAL, 2011, 14 (11): : 3571 - 3573
  • [2] Single-objective service composition methods in cloud manufacturing systems: Recent techniques, classification, and future trends
    Hayyolalam, Vahideh
    Pourghebleh, Behrouz
    Chehrehzad, Mohammad Reza
    Pourhaji Kazem, Ali Asghar
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2022, 34 (05):
  • [3] Cloud Trends and Security Challenges
    Rong, Chunming
    Nguyen, Son T.
    PROCEEDINGS OF THE 2011 3RD INTERNATIONAL WORKSHOP ON SECURITY AND COMMUNICATION NETWORKS (IWSCN 2011), 2011, : 1 - 7
  • [4] Data Security on Cloud by Cryptographic Methods Using Machine Learning Techniques
    Gadde, Swetha
    Amutharaj, J.
    Usha, S.
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2022, 22 (05): : 342 - 347
  • [5] Recent advances in cloud security
    Wu J.
    Shen Q.
    Wang T.
    Zhu J.
    Zhang J.
    Journal of Computers, 2011, 6 (10) : 2156 - 2163
  • [6] Recent trends in analytical methods and separation techniques for drugs of abuse in hair
    Baciu, T.
    Borrull, F.
    Aguilar, C.
    Calull, M.
    ANALYTICA CHIMICA ACTA, 2015, 856 : 1 - 26
  • [7] Security failure trends of cloud computing
    Gariba, Zachariah Pabi
    Van Der Poll, John Andrew
    2017 IEEE 3RD INTERNATIONAL CONFERENCE ON COLLABORATION AND INTERNET COMPUTING (CIC), 2017, : 247 - 256
  • [8] Securing the cloud: Cloud computer security techniques and tactics
    Sullivan, Brandon A.
    SECURITY JOURNAL, 2014, 27 (03) : 338 - 340
  • [9] Securing the cloud: Cloud computer security techniques and tactics
    Brandon A Sullivan
    Security Journal, 2014, 27 : 338 - 340
  • [10] Recent security challenges in cloud computing
    Subramanian, Nalini
    Jeyaraj, Andrews
    COMPUTERS & ELECTRICAL ENGINEERING, 2018, 71 : 28 - 42