Comparative Analysis on Security Mechanisms in Cloud

被引:0
|
作者
Fakhar, Faiza [1 ]
Shibli, Muhammad Awais [1 ]
机构
[1] Natl Univ Sci & Technol, Sch Elect Engn & Comp Sci, Islamabad, Pakistan
来源
2013 15TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY (ICACT) | 2013年
关键词
Public Key Infrastructure (PKI); Trust Management; Key Management; Privacy Management; Access Control;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Cloud computing confers benefits to its customers but regardless of all the advantages, information security is one of the major concerns on cloud paradigm. Information security challenge rises from the fact that consumer of public cloud services has no access to physical servers while utilizing different cloud services. Several security mechanisms such as access control, privacy management and trust management are used to enhance security at cloud epitome. This research discuses several techniques proposed by different researchers related to different security mechanisms for cloud platform. A brief comparison of all identified techniques is presented based on the criteria identified by National Institute of standards and technology for good practices and quality assessment of security mechanisms.
引用
收藏
页码:45 / 50
页数:6
相关论文
共 50 条
  • [1] A Comparative Analysis on Cloud Data Security
    Varghese, Saira
    Vigila, S. Maria Celestin
    2015 GLOBAL CONFERENCE ON COMMUNICATION TECHNOLOGIES (GCCT), 2015, : 495 - 498
  • [2] Quantum Key Distribution and Cryptography Mechanisms for Cloud Data Security
    Thangapandiyan, M.
    Anand, P. M. Rubesh
    Sankaran, K. Sakthidasan
    PROCEEDINGS OF THE 2018 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATION AND SIGNAL PROCESSING (ICCSP), 2018, : 1031 - 1035
  • [3] The Analysis of Critical Technology on Cloud Storage Security
    Yin, Lianfu
    2013 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCES AND APPLICATIONS (CSA), 2013, : 26 - 28
  • [4] Evaluating Security Mechanisms Implemented on Public Platform-as-a-Service Cloud Environments
    Akinbi, A.
    Pereira, E.
    Beaumont, C.
    2013 8TH INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS (ICITST), 2013, : 162 - 167
  • [5] Data security and privacy preservation in cloud storage environments based on cryptographic mechanisms
    Kaaniche, Nesrine
    Laurent, Maryline
    COMPUTER COMMUNICATIONS, 2017, 111 : 120 - 141
  • [6] On Cloud Computing Security
    Bai, Yun
    Policarpio, Sean
    RECENT TRENDS IN WIRELESS AND MOBILE NETWORKS, 2011, 162 : 388 - 396
  • [7] Verification of Cloud Security Policies
    Miller, Loic
    Merindol, Pascal
    Gallais, Antoine
    Pelsser, Cristel
    2021 IEEE 22ND INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE SWITCHING AND ROUTING (IEEE HPSR), 2021,
  • [8] The Security Risks of Cloud Computing
    Choi, Myeonggil
    2019 22ND IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING (IEEE CSE 2019) AND 17TH IEEE INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING (IEEE EUC 2019), 2019, : 330 - 330
  • [9] Security Issues for Cloud Computing
    Hamlen, Kevin
    Kantarcioglu, Murat
    Khan, Latifur
    Thuraisingham, Bhavani
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY, 2010, 4 (02) : 36 - 48
  • [10] Security and Risk Assessment in the Cloud
    Madria, Sanjay K.
    COMPUTER, 2016, 49 (09) : 110 - 113