A Comparative Study of Trends in Security in Cloud Computing

被引:1
作者
Khan, Abdul Muttalib [1 ]
Ahmad, Shish [1 ]
Haroon, Mohd. [1 ]
机构
[1] Integral Univ, CSE Dept, Lucknow, Uttar Pradesh, India
来源
2015 FIFTH INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS AND NETWORK TECHNOLOGIES (CSNT2015) | 2015年
关键词
Cloud Computing; Security; confidentiality; Encryption and Decryption; Integrity; Cloud Service Provider; Information Owner;
D O I
10.1109/CSNT.2015.31
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Cloud Computing represents the Internet-based platform for computing. It is the services offered via the internet. It is actually buying of services from the service provider. But because the information is kept at the third party location, these leads to a lot of insecurities in the minds of service owner. Hence, it leads to a lot of security concerns. Since, the data is processed on the cloud, it has to be managed carefully, maintain the integrity and confidentiality of the data is at stake. This paper represents all the security concerns faced during the processing of the data in the cloud. It represents the various approaches proposed by different researchers throughout the globe showing how important is the security issue in cloud computing. This paper also tries to gives the deep impact these researches have in cloud computing paradigm.
引用
收藏
页码:586 / 590
页数:5
相关论文
共 18 条
[1]  
Ahmed M., 2010, Proceedings 2010 IEEE/IFIP 8th International Conference on Embedded and Ubiquitous Computing (EUC 2010), P723, DOI 10.1109/EUC.2010.114
[2]  
Ali Arshad, 2012, IJSER, V3
[3]  
Ali Azhar, 2012, IJCST, V3
[4]  
Almorsy M., 2011, Proceedings of the 2011 IEEE 4th International Conference on Cloud Computing (CLOUD 2011), P364, DOI 10.1109/CLOUD.2011.9
[5]  
AlZain Mohammed A., NEW APPROACH USING R, P230
[6]  
Clavister, 2008, CLAV WHIT PAP
[7]  
Eichler A., 2011, GOOGLE ACCIDENTALLY
[8]  
Gawali M.B, ENHANCEMENT DATA SEC
[9]  
Goodin D., 2011, USER DATA STOLEN SON
[10]  
Kantarcioglu Murat, 2011, 2011 49th Annual Allerton Conference on Communication, Control, and Computing (Allerton), P670