A REVIEW ON A SECURITY MECHANISM IN CLOUD ENVIRONMENT

Authors

  • Jaspreet Kaur Research Scholar, Department of Computer Science & Engineering, LLRIET, Moga
  • Navdeep Kaler Assistant Professor, Department of Computer Science & Engineering, LLRIET, Moga

DOI:

https://doi.org/10.24297/ijct.v16i3.6130

Keywords:

Cloud Computing, Cloud Security, Security issues, OTP, AES, Hashing

Abstract

Cloud computing is a way to increase the capacity or add capabilities dynamically without investing in new infrastructure, training new personnel, or licensing new software. As information exchange plays an important role in today’s life, information security becomes more important. This paper is focused on the security issues of cloud computing and techniques to overcome the data security issue. Before analyzing the security issues, the definition of cloud computing and brief discussion to under cloud computing is presented. The various components that affect the security of the cloud and the problems faced by cloud service provider have been discussed in this paper.

Downloads

Download data is not yet available.

References

[1] Mohis M and Devipriya V S, "An improved approach for Enhancing Public Cloud Data Security through Steganographic Technique," IEEE, pp. 1-5, 2016.
[2] Kunal V. Raipurkar and Anil V. Deorankar , "Improve Data Security in Cloud Environment by using LDAP and Two Way Encryption Algorithm," IEEE, pp. 1-4, 2016.
[3] V.Swath, K.Sudha, R.Aruna, C.Sangeetha and R.Janani , "Providing Advanced Security Mechanism for Scalable Data Sharing In Cloud Storage," IEEE, pp. 1-6, 2016.
[4] Shivangi Sengar and Rajesh Kumar Chakrawarti , "Implementation of PDS System with Improved Security and Transparency under Cloud Environment," IEEE, pp. 1-6, 2016.
[5] Mohis M and Devipriya V S, "An improved approach for Enhancing Public Cloud Data Security through Steganographic Technique," IEEE, 2016.
[6] S. Pandey , A. Dwivedi , J. Pant and M. Lohani , "Security Enforcement using TRBAC in Cloud Computing," IEEE, pp. 1232-1238, 2016.
[7] R.K.Shyamasundar, N.V.Narendra Kumar and Muttukrishnan Rajarajan, "Information-Flow Control for Building Security and Privacy Preserving Hybrid Clouds," IEEE, pp. 1410-1417, 2016.
[8] P. More and D G Harkut, "Cloud Data Security using Attribute-based Key Aggregate Cryptosystem," IEEE, pp. 855-861, 2016.
[9] D. Singh and Harsh K Verma, "A New Framework for Cloud Storage Confidentiality to Ensure Information Security," IEEE, 2016.
[10] Kunal V. Raipurkar and Anil V. Deorankar , "Improve Data Security in Cloud Environment by using LDAP and Two Way Encryption Algorithm," IEEE, 2016.
[11] S. Sengar and . R. K. Chakrawarti , "Implementation of PDS System with Improved Security and Transparency under Cloud Environment," IEEE, 2016.
[12] A. Albugmi, M. O. Alassafi , . R. Walters and Gary Wills, "Data Security in Cloud Computing," IEEE, pp. 55-59, 2016.
[13] A. Singh and M. Malhotra , "Hybrid Two-Tier Framework for Improved Security in Cloud Environment," IEEE, pp. 955-960, 2016.
[14] Bin Feng, Xinzhu Ma, Cheng Guo, Hui Shi, Zhangjie Fu and Tie Qiu, "An Efficient Protocol with Bidirectional Verification for Storage Security in Cloud Computing," IEEE, pp. 1-13, 2016.
[15] Mrinal Kanti Sarkar and S. Kumar, "A Framework to Ensure Data Storage Security in Cloud Computing," IEEE, 2016.
[16] N.Thillaiarasu and ChenthurPandian.S, "Enforcing Security and Privacy over Multi – Cloud Framework Using Assessment Techniques," IEEE, 2016.
[17] R. R. Gupta, G. Mishra, S. Katara, A. Agarwal, M. K. Sarkar, R. Das and S. Kumar, "Data Storage Security in Cloud Computing Using Container Clustering," IEEE, 2016.
[18] S.Petcy Carolin and M.Somasundaram, "Data Loss Protection And Data Security Using Agents For Cloud Environment," IEEE, pp. 1-5, 2016.
[19] T. Mavroeidakos, A. Michalas and Dimitrios D. Vergados , "Security Architecture based on Defense in Depth for Cloud Computing Environment," IEEE, 2016.
[20] Deepak H. Sharma, C A. Dhote and Manish M. Potey, "Intelligent Transparent Encryption-Decryption as Security-as-a-Service from Clouds," IEEE, pp. 359-362, 2016.
[21] Deepak H. Sharma, C A. Dhote and Manish M. Potey, "Implementing Intrusion Management as Security¬as-a-Service from Cloud," IEEE, pp. 363-366, 2016.

Downloads

Published

2017-05-11

How to Cite

Kaur, J., & Kaler, N. (2017). A REVIEW ON A SECURITY MECHANISM IN CLOUD ENVIRONMENT. INTERNATIONAL JOURNAL OF COMPUTERS &Amp; TECHNOLOGY, 16(3), 6219–6224. https://doi.org/10.24297/ijct.v16i3.6130

Issue

Section

Research Articles