Comparative Analysis on Security Mechanisms in Cloud

被引:0
|
作者
Fakhar, Faiza [1 ]
Shibli, Muhammad Awais [1 ]
机构
[1] Natl Univ Sci & Technol, Sch Elect Engn & Comp Sci, Islamabad, Pakistan
来源
2013 15TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY (ICACT) | 2013年
关键词
Public Key Infrastructure (PKI); Trust Management; Key Management; Privacy Management; Access Control;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Cloud computing confers benefits to its customers but regardless of all the advantages, information security is one of the major concerns on cloud paradigm. Information security challenge rises from the fact that consumer of public cloud services has no access to physical servers while utilizing different cloud services. Several security mechanisms such as access control, privacy management and trust management are used to enhance security at cloud epitome. This research discuses several techniques proposed by different researchers related to different security mechanisms for cloud platform. A brief comparison of all identified techniques is presented based on the criteria identified by National Institute of standards and technology for good practices and quality assessment of security mechanisms.
引用
收藏
页码:45 / 50
页数:6
相关论文
共 50 条
  • [41] An Exhaustive Review on Security Issues in Cloud Computing
    Fatima, Shahin
    Ahmad, Shish
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2019, 13 (06): : 3219 - 3237
  • [42] Magnified Cloud Security through Access Control
    Ganagavalli, K.
    Saravanan, P.
    Krishnamoorthy, V.
    ICACCS 2015 PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING & COMMUNICATION SYSTEMS, 2015,
  • [43] Performance Enhanced Security for Enterprise Cloud Application
    Vanitha, M.
    Kavitha, C.
    2016 INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND INFORMATICS (ICCCI), 2016,
  • [44] Security and privacy issues in e-health cloud-based system: A comprehensive content analysis
    Azeez, Nureni Ayofe
    Van der Vyver, Charles
    EGYPTIAN INFORMATICS JOURNAL, 2019, 20 (02) : 97 - 108
  • [45] Cloud Security Auditing: Major Approaches and Existing Challenges
    Suryadipta, Majumdar
    Madi, Taous
    Jarraya, Yosr
    Pourzandi, Makan
    Wang, Lingyu
    Debbabi, Mourad
    FOUNDATIONS AND PRACTICE OF SECURITY, FPS 2018, 2019, 11358 : 61 - 77
  • [46] Threshold Cryptography Based Data Security in Cloud Computing
    Saroj, Sushil Kr
    Chauhan, Sanjeev Kr
    Sharma, Aravendra Kr
    Vats, Sundaram
    2015 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMMUNICATION TECHNOLOGY CICT 2015, 2015, : 202 - 207
  • [47] AN IMPROVED SECURITY SERVICE SCHEME IN MOBILE CLOUD ENVIRONMENT
    Dai, Qinyun
    Yang, Haijun
    Yao, Qinfeng
    Chen, Yaliang
    2012 IEEE 2ND INTERNATIONAL CONFERENCE ON CLOUD COMPUTING AND INTELLIGENT SYSTEMS (CCIS) VOLS 1-3, 2012, : 407 - 412
  • [48] Security and privacy protection in cloud computing: Discussions and challenges
    Sun, PanJun
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2020, 160
  • [49] Data Security Protocol with Blind Factor in Cloud Environment
    Zhang, Ping
    Chi, Huanhuan
    Wang, Jiechang
    Shang, Youlin
    INFORMATION, 2021, 12 (09)
  • [50] Access Control Research on Data Security in Cloud Computing
    Zhang, Pin
    Xu, Jing
    Muazu, Halilu
    Mao, Wenmin
    2015 IEEE 16TH INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY (ICCT), 2015, : 873 - 877