Total views : 391

Data Security is the Major Issue in Cloud Computing - A Review

Affiliations

  • Department of Computer Application, Vels University, Chennai – 600117, Tamil Nadu, India

Abstract


Objectives: Cloud computing is a vast technology which is growing very fast in the IT environment. The cloud computing faces many security issues both in the service provider side and client side. Methods/Statistical Analysis: This paper carries forward the analysis of security issues and its solutions. There are many issues discussed earlier some are with solutions and encryption techniques. Few issues are still with unfound solutions too and researchers are trying to solve them. Cloud computing has problem with storage procedure since the data are stored in the data center far away from the source system. Many common security issues are discussed in the paper and the major security is taken as the data security. Findings: This paper says that data security is the major issue in the security concern because both the service provider and client are worried about the data. The data is the target for the hijackers for attacking the data center server. The data security issues are also analyzed and some solutions are discussed in this paper. Applications/Improvements: Further this paper could be enhanced by broadly discussing the solutions of the security issues.

Keywords

Client, Cloud Computing, Data Security, Encryption, Security, Server.

Full Text:

 |  (PDF views: 412)

References


  • Kaur R, Kaur J. Cloud computing security issues and its solution: A review. 2015 2nd International Conference on Computing for Sustainable Global Development (INDIACom); 2015. p. 1198–200.
  • Kumar SRG. Security facet in cloud computing. International Journal of Advanced Research in Computer Science and Software Engineering. 2014; 4(4):964–7.
  • Grover J, Shikha S, Sharma M. Cloud computing and its security issues - A review. 2014 International Conference on Computing, Communication and Networking Technologies, ICCCNT’14; 2014. p. 1–5.
  • Moyo T, Bhogal J. Investigating security issues in cloud computing. 2014 8th International Conference on Complex, Intelligent and Software Intensive Systems; 2014. p. 141–6
  • Kaur JP, Singh S, Karn A. Analysis of security issues and management standards in cloud computing. 2nd International Conference on Computing for Sustainable Global Development (INDIACom); 2015. p. 1474–8.
  • Kaur M, Singh H. A review of cloud computing security issues. International Journal of Advances in Engineering and Technology. 2015; 8(3):397–403.
  • Narula S, Jain A, Prachi MS. Cloud computing security: Amazon web service. 2015 5th International Conference on Advanced Computing and Communication Technologies; 2015. p. 501–5.
  • Badawi EAALA, Kayed A. Survey on enhancing the data security of the cloud computing environment by using data segregation technique. IJRRAS. 2015 May; 23(2):136–43.
  • Vasanth C, Bhagawat B, Arul D, Kumar LS. Survey on data security issues in cloud environment. IJIRAE. 2015; 2(1):31–5.
  • Cyril BR, Kumar SBR. Cloud computing data security issues, challenges, architecture and methods - A survey. IRJET. 2015; 2(4):848–57.
  • Puthal D, Sahoo BPS, Mishra S, Swain S. Cloud computing features, issues and challenges: A big picture. International Conference on Computational Intelligence and Networks; 2015. p. 116–23.
  • Balasubramanian V, Mala T. A review on various data security issues in cloud computing environment and its solutions, ARPN Journal of Engineering and Applied Sciences. 2015; 10(2):883–9.
  • Suveetha K, Manju T. Ensuring confidentiality of cloud data using homomorphic encryption. Indian Journal of Science and Technology. 2016 Feb; 9(8):1–7.
  • Kaur R, Kaur J. Cloud computing security issues and its solution: A review. 2015 2nd International Conference on Computing for Sustainable Global Development (INDIACom); 2015. p. 1198–200.
  • Snehal A, Narale N. Employing security techniques in the current world of cloud computing environment: A study. International Journal of Computer Science and Mobile Computing. 2015; 4(4):796–801.

Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.