A REVIEW ON CLOUD COMPUTING SECURITY ISSUES AND CHALLENGES

Authors

  • Madhumala R B Assistant Professor, Department of CSE, SET- Jain University, India
  • Dr. Harshavardhan Tiwari Assistant Professor, Department of ISE, Jyothy Institute of Technology, India

DOI:

https://doi.org/10.29121/granthaalayah.v5.i4RACSIT.2017.3357

Keywords:

Cloud Computing

Abstract [English]

The new developments in the field of information technology offered the people enjoyment, comforts and convenience. Cloud computing is one of the latest developments in the IT industry also known as on-demand computing. It provides the full scalability, reliability, high performance and relatively low cost feasible solution as compared to dedicated infrastructures. It is the application provided in the form of service over the internet and system hardware in the data centers that gives these services. This technology has the capacity to admittance a common collection of resources on request. It is proving extremely striking to cash-strapped IT departments that are wanted to deliver better services under pressure. When this cloud is made available for the general customer on pay per use basis, then it is called public cloud. When customer develops their own applications and run their own internal infrastructure then is called private cloud. Integration and consolidation of public and private cloud is called hybrid cloud.

Downloads

Download data is not yet available.

References

Cheng-Kang Chu, Sherman S. M. Chow, Wen-GueyTzeng, Jianying Zhou, and Robert H. Deng, “Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage” IEEE Transactions on Parallel and Distributed Cloud Computing Systems,Volume:25, Issue:2,Issue Date: Feb2014. DOI: https://doi.org/10.1109/TPDS.2013.112

C. Wang, S. S. M. Chow, Q. Wang, K. Ren, and W. Lou, “Privacy-Preserving Public Auditing for Secure Cloud Storage,” IEEE Trans. Computers, vol. 62, no. 2, pp. 362–375, 2016. DOI: https://doi.org/10.1109/TC.2011.245

B. Wang, S. S. M. Chow, M. Li, and H. Li, “Storing Shared Data on the Cloud via Security-Mediator,” in International Conference on Distributed Computing Systems - ICDCS 2013. IEEE, 2016. DOI: https://doi.org/10.1109/ICDCS.2013.60

R. S. Sandhu, “Cryptographic Implementation of a Tree Hierarchy for Access Control,” Information Processing Letters, vol. 27, no. 2, pp. 95–98, 1988. DOI: https://doi.org/10.1016/0020-0190(88)90099-3

M. J. Atallah, M. Blanton, N. Fazio, and K. B. Frikken, “Dynamic and Efficient Key Management for Access Hierarchies,” ACM Transactions on Information and System Security (TISSEC), vol. 12,no. 3, 2009. DOI: https://doi.org/10.1145/1455526.1455531

V. Goyal, O. Pandey, A. Sahai, and B. Waters, “Attribute-Based Encryption for Fine-Grained Access Control of Encrypted data,” [7] D. Boneh and M. K. Franklin, “Identity-Based Encryption from the Weil Pairing,” in Proceedings of Advances in Cryptology – CRYPTO ’01, ser. LNCS, vol. 2139. Springer, 2015, pp. 213–229.

R. Canetti and S. Hohenberger, “Chosen-Ciphertext Secure Proxy Re-Encryption,” in Proceedings of the 14th ACM Conference on Computer and Communications Security (CCS ’07).

M. Chase and S. S. M. Chow, “Improving Privacy and Security in Multi-Authority Attribute-Based Encryption,” in ACM Conference on Computer and Communications Security, 2009, pp. 121–130.] DOI: https://doi.org/10.1145/1653662.1653678

Y. Sun and K. J. R. Liu, “Scalable Hierarchical Access Control in Secure Group Communications,” in Proceedings of the 23th IEEE International Conference on Computer Communications.

Jansen, W.A.; (2010), “ Cloud Hooks: Security and Privacy Issues in Cloud Computing5719001 IEEE 2015 44th Hawaii International Conference on System Sciences (HICSS), pp1, 4-7 Jan. 2015.

Downloads

Published

2017-04-30

How to Cite

R B, M., & Tiwari, H. (2017). A REVIEW ON CLOUD COMPUTING SECURITY ISSUES AND CHALLENGES. International Journal of Research -GRANTHAALAYAH, 5(4RACSIT), 76–80. https://doi.org/10.29121/granthaalayah.v5.i4RACSIT.2017.3357