Review of Security and Privacy Techniques in Cloud Computing Environment

被引:4
作者
Mote, Rutuja [1 ]
Pawar, Ambika [1 ]
Dani, Ajay [2 ]
机构
[1] Symbiosis Int Univ, Comp Sci Symbiosis Inst Technol SIT, Pune 412115, Maharashtra, India
[2] GH Raisoni Inst Engn & Technol, Pune 412207, Maharashtra, India
来源
PROCEEDINGS OF FIRST INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY FOR INTELLIGENT SYSTEMS: VOL 1 | 2016年 / 50卷
关键词
Cloud computing; Privacy; Security; Encryption; Hybrid cloud; Map-reduce; MANAGEMENT;
D O I
10.1007/978-3-319-30933-0_54
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Cloud is an ironic solution of the ultimate globalization which is a bunch of dedicated servers, networking elements such as software and hardware networked with the internet. Cloud computing enables the user to utilize the applications, storage solutions, and resources, likewise it also authorizes the data access, data management, and connectivity. All the activities of the cloud infrastructure seem to be transparent to ensure it without any notion of the locale to its user. The rising technology aids to deliver on-demand web access speedily to the computing resources. Cloud user can access and release the computing resources with minimum management effort and least interaction with cloud service provider. A consolidated cloud service i.e., hybrid cloud renders a federation, bridge, secure encrypted connection, information placement decision between the public and private cloud and utilizes the services of the two clouds those are security, availability, and cost effectiveness. Though cloud computing services have bags of inherent benefits, there are likelihood risks in privacy and security heeding's that should be thought over before collecting, processing, sharing or storing enterprise or individual's data in the cloud. This survey paper explores the contemporary techniques and methods to furnish a trustworthy and foolproof cloud computing environment.
引用
收藏
页码:543 / 551
页数:9
相关论文
共 20 条
[1]   An Advanced MapReduce: Cloud MapReduce, Enhancements and Applications [J].
Dahiphale, Devendra ;
Karve, Rutvik ;
Vasilakos, Athanasios V. ;
Liu, Huan ;
Yu, Zhiwei ;
Chhajer, Amit ;
Wang, Jianmin ;
Wang, Chaokun .
IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2014, 11 (01) :101-115
[2]   Revamping Optimal Cloud Storage System [J].
Ghogare, Shraddha ;
Pawar, Ambika ;
Dani, Ajay .
PROCEEDINGS OF 3RD INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING, NETWORKING AND INFORMATICS, ICACNI 2015, VOL 2, 2016, 44 :457-463
[3]   Trust mechanisms for cloud computing [J].
Huang, Jingwei ;
Nicol, David M. .
JOURNAL OF CLOUD COMPUTING-ADVANCES SYSTEMS AND APPLICATIONS, 2013, 2
[4]   MAP-JOIN-REDUCE: Toward Scalable and Efficient Data Analysis on Large Clusters [J].
Jiang, Dawei ;
Tung, Anthony K. H. ;
Chen, Gang .
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2011, 23 (09) :1299-1311
[5]   Partitioning of web applications for hybrid cloud deployment [J].
Kaviani, Nima ;
Wohlstadter, Eric ;
Lea, Rodger .
JOURNAL OF INTERNET SERVICES AND APPLICATIONS, 2014, 5 (01) :1-17
[6]  
Liu X., 2015, Journal of Big Data, V2, P1, DOI [DOI 10.15226/2374-6890/2/3/00127, 10.1186/s40537-015-0021-4, DOI 10.1186/S40537-015-0021-4]
[7]  
Lord N., 2015, CRYPTOGRAPHY CLOUD S
[8]   Distributed Online Hybrid Cloud Management for Profit-Driven Multimedia Cloud Computing [J].
Lu, Ping ;
Sun, Quanying ;
Wu, Kaiyue ;
Zhu, Zuqing .
IEEE TRANSACTIONS ON MULTIMEDIA, 2015, 17 (08) :1297-1308
[9]  
Ningning S., 2014, MULTIMATRIX COMBINED
[10]   Security transparency: the next frontier for security research in the cloud [J].
Ouedraogo, Moussa ;
Mignon, Severine ;
Cholez, Herve ;
Furnell, Steven ;
Dubois, Eric .
JOURNAL OF CLOUD COMPUTING-ADVANCES SYSTEMS AND APPLICATIONS, 2015, 4 (01)