Security Challenges and Policies in Cloud Computing for Services

Dattatray, B.P and Devare, A.S Security Challenges and Policies in Cloud Computing for Services. International Journal of Research in Engineering and Technology, 2018, vol. 3, n. 12, pp. 59-63. [Journal article (Paginated)]

[thumbnail of SECURITY CHALLENGES AND POLICIES IN CLOUD COMPUTING FOR SERVICES.pdf]
Preview
Text
SECURITY CHALLENGES AND POLICIES IN CLOUD COMPUTING FOR SERVICES.pdf

Download (349kB) | Preview

English abstract

Cloud computing is becoming most emerging trend in IT industry. With its potential growth and lucrative services cloud computing has acquired mass market in the industry large enterprises running their business on the cloud. A greater acceptance of public cloud by various businesses has given it a wide popularity, strengthening of public cloud security is big milestone. The article talks about cloud computing and its service models and deployment models. Different threats have been discovered in recent years. Database security in public cloud raised some critical issues for cloud service provider.Further, various security issues and policies related to cloud computing also discussed. Findings emphasis that rapid adaptation to the clouds have increased concerns on a critical issue for successive growth of communication technology and information security. From a cloud security perspective, a number of unexplored risks and challenges are faced by cloud because of migration, causing degradation of the effectiveness of traditional protection mechanisms.

Item type: Journal article (Paginated)
Keywords: Cloud computing, Cloud DBaaS, public cloud, Cloud Security, Confidentiality, Trust, Encryption.
Subjects: B. Information use and sociology of information > BF. Information policy
L. Information technology and library technology
L. Information technology and library technology > LH. Computer and network security.
L. Information technology and library technology > LI. Authentication, and access control.
L. Information technology and library technology > LT. Mobile devices
Depositing user: A.S Devare
Date deposited: 05 Aug 2020 01:26
Last modified: 05 Aug 2020 01:42
URI: http://hdl.handle.net/10760/40247

References

www.idgenterprise.com/dig-deeper-for-cloud- investment-decisions

http://www.cisco.com/c/en/us/solutions/collateral/ser vice-provider/global-cloud-index-gci/ Cloud_Index_White_Paper.html

W. Jansen and T. Grance, “Guidelines on Security and Privacy in Public Cloud Computing,” Technical Report Special Publication 800-144, NIST, 2011

H. Hacigu ̈mu ̈ s ̧, B. Iyer, and S. Mehrotra, “Providing Database as a Service,” Proc. 18th IEEE Int’l Conf. Data Eng., Feb. 2002

Cloud Security Alliance (2010) Top Threats to Cloud ComputingV1.0.Available:https://cloudsecurityallian ce.org/research/top-threats.

http://www.cloudtweaks.com/2012/10/insider-threats- to-cloudcomputing/

http://www.darkreading.com/insiderthreat/167801100 /security/news/240146276/cloud-s-privilegedidentity- gap-intensifies-insider-threats.html

Tadapaneni, N. R. Different Types of Cloud Service Models. Available at SSRN 3614630.

Sara Qaisar, Kausar Fiaz Khawaja, “Cloud Computing: Network/Security Threats and counter measures”, Interdisciplinary Journal of Contemporary Research in Business, ijcrb.webs.com, January 2012, Vol 3, N0 9, pp: 1323 – 1329. .

Kandukuri BR, Paturi VR, Rakshit A. Cloud security issues. In: IEEE international conference on services computing, 2009, p. 517–20.

D. Agrawal, A.E. Abbadi, F. Emekci, and A. Metwally, “Database Management as a Service: Challenges and Opportunities,” Proc. 25th IEEE Int’l Conf. Data Eng., Mar.-Apr. 2009

Chauhan, S., & Vermani, S. (2016). Shift from Cloud Computing to Fog Computing. Journal of Applied Computing, 1(1), 25-29.


Downloads

Downloads per month over past year

Actions (login required)

View Item View Item