Comparative Analysis on Security Mechanisms in Cloud

被引:0
|
作者
Fakhar, Faiza [1 ]
Shibli, Muhammad Awais [1 ]
机构
[1] Natl Univ Sci & Technol, Sch Elect Engn & Comp Sci, Islamabad, Pakistan
来源
2013 15TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY (ICACT) | 2013年
关键词
Public Key Infrastructure (PKI); Trust Management; Key Management; Privacy Management; Access Control;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Cloud computing confers benefits to its customers but regardless of all the advantages, information security is one of the major concerns on cloud paradigm. Information security challenge rises from the fact that consumer of public cloud services has no access to physical servers while utilizing different cloud services. Several security mechanisms such as access control, privacy management and trust management are used to enhance security at cloud epitome. This research discuses several techniques proposed by different researchers related to different security mechanisms for cloud platform. A brief comparison of all identified techniques is presented based on the criteria identified by National Institute of standards and technology for good practices and quality assessment of security mechanisms.
引用
收藏
页码:45 / 50
页数:6
相关论文
共 50 条
  • [31] Enhancing Cloud-Based IoT Security Through Trustworthy Cloud Service: An Integration of Security and Reputation Approach
    Li, Xiang
    Wang, Qixu
    Lan, Xiao
    Chen, Xingshu
    Zhang, Ning
    Chen, Dajiang
    IEEE ACCESS, 2019, 7 : 9368 - 9383
  • [32] Cloud Edge Integrated Security Architecture of New Cloud Manufacturing System
    Zhao, Longbo
    Li, Bohu
    Yuan, Haitao
    JOURNAL OF SYSTEMS ENGINEERING AND ELECTRONICS, 2024, 35 (05) : 1177 - 1189
  • [33] Study on Access Control for Cloud Storage Security
    Ma, Xinqiang
    Huang, Yi
    Zhang, Mingsheng
    Liu, Youyuan
    PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INTELLIGENT COMMUNICATION, 2015, 16 : 333 - 336
  • [34] Security Techniques for Data Protection in Cloud Computing
    Jakimoski, Kire
    INTERNATIONAL JOURNAL OF GRID AND DISTRIBUTED COMPUTING, 2016, 9 (01): : 49 - 56
  • [35] Research on Security and Reliability Technologies in Cloud Storage
    Mao, Hongxia
    FRONTIERS OF MANUFACTURING AND DESIGN SCIENCE IV, PTS 1-5, 2014, 496-500 : 1905 - 1908
  • [36] Research of Security Model and Cloud Computing Strategy
    Ma Yingrui
    MECHATRONICS ENGINEERING, COMPUTING AND INFORMATION TECHNOLOGY, 2014, 556-562 : 6196 - 6198
  • [37] Knowledge Based Security Model for Banking in Cloud
    Auxilia, M.
    Raja, K.
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INFORMATICS AND ANALYTICS (ICIA' 16), 2016,
  • [38] Design and Implementation of cloud storage security system
    Zhou, Meirong
    Jiang, Zhengtao
    ADVANCES IN MANUFACTURING TECHNOLOGY, PTS 1-4, 2012, 220-223 : 2325 - 2329
  • [39] A Higher Level Security Protocol for Cloud Computing
    Celiktas, Baris
    Celikbilek, Ibrahim
    Ozdemir, Enver
    2019 4TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND ENGINEERING (UBMK), 2019, : 97 - 101
  • [40] Security Model of Ad hoc Cloud Computing
    Sharma, Deepti
    2017 6TH INTERNATIONAL CONFERENCE ON RELIABILITY, INFOCOM TECHNOLOGIES AND OPTIMIZATION (TRENDS AND FUTURE DIRECTIONS) (ICRITO), 2017, : 515 - 518