Cloud Computing: A Study on Security Issues and Their Impact on Cloud Computing Environment

Authors

  • Nisha Rani Computer Science

Keywords:

Cloud computing, Security Issues, Cloud Computing Impact

Abstract

Cloud computing enables users to use a Web browser only to receive computing services over the Internet. Users just have to pay for the services they are actually using. The present study shows that there is a large gap in the existing system's security issue. Confidentiality, authentication, access control, and integrity are the main security ideology and one of the most important requirements for any software. This paper investigates existing cloud computing solution for the SaaS model, and explores the various security flaws. The work concludes here with the comparative study of the various existing solutions and addresses the common problems and excuses.

References

M. Armbrust, A. Fox, R. Griffith, A. D. Joseph, R. H. Katz, A. Konwinski, G. Lee, D. . A. Patterson, A. Rabkin, I. Stoica and M. Zaharia (2009). “Electrical Engineering and Computer Sciences, University of California at Berkeley," 10 February 2009. [Online]. Available: http://www.eecs.berkeley.edu/Pubs/TechRpts/2009/EECS2009-28.pdf. [Accessed 12 July 2013].

S. Paquette, P. . T. Jaeger and S. C. Wilson (2010). “Identifying the security risks associated with governmental use of cloud computing," Government Information Quarterly, vol. 27, no. 1, pp. 245 - 253.

E. D. Canedo, R. T. de Sousa Junior and R. de Oliveira (2012). "Trust model for reliable file exchange in Cloud Computing," International Journal of Computer Science & Information Technology (IJCSIT), vol. 4, no. 1, pp. 1-18.

D. Zissis and D. Lekkas (2012). “Addressing cloud computing security issues," Future Generation Computer Systems, vol. 28, no. 1, pp. 583 - 592.

S. C. Misra and A. Mondal (2011). “Identification of a company’s suitability for the adoption of cloud computing and modelling its corresponding Return on Investment," Mathematical and Computer Modelling, vol. 53, no. 1, pp. 504 - 521.

M. Maurer, V. C. Emeakaroha, I. Brandic and J. Altmann (2012). “Cost–benefit analysis of an SLA mapping approach for defining standardized Cloud computing goods," Future Generation Computer Systems, vol. 28, no. 1, pp. 39 - 47.

X. Wang, Z. Du and Y. Chen (2012). "An adaptive model-free resource and power management approach for multi-tier cloud environments," The Journal of Systems and Software, vol. 85, no. 2, pp. 1135 - 1146.

Deyan Chen and Hong Zhao (2012). “Data Security and Privacy Protection Issues in Cloud Computing” IEEE International Conference on Computer Science and Electronics Engineering.

Tumpe Moyo, Jagdev Bhogal (2014). “Investigating Security Issues in Cloud Computing” 2014 IEEE Eighth International Conference on Complex, Intelligent and Software Intensive Systems.

Hussain Aljafer, Zaki Malik, Mohammed Alodib, Abdelmounaam Rezgui (2014). “A brief overview and an experimental evaluation of data confidentiality measures on the cloud” journal of innovation in digital ecosystems 1, 1 – 11, Elesvior.

Mrudula Sarvabhatla, Chandra Sekhar Vorugunti (2015). “A Robust Mutual Authentication Scheme for Data Security in Cloud Architecture” IEEE Future Information Security Workshop, COMSNETS.

Dimitrios Zissis, Dimitrios Lekkas (2012). “Addressing cloud computing security issues” Future Generation Computer System Volume 28, Issue 3, March 2012, (pp. 583–592), Elesvior.

Bokefode Jayant D, Ubale Swapnaja A, Pingale Subhash V, Karande Kailash J., Apate Sulabha S. (2015). “Developing Secure Cloud Storage System by Applying AES and RSA Cryptography Algorithms with Role based Access Control Model” International Journal of Computer Applications (0975 – 8887) Volume 118– No.12, May 2015.

Nasrin Khanezaei, Zurina Mohd Hanapi (2014). “A Framework Based on RSA and AES Encryption Algorithms for Cloud Computing Services” IEEE Conference on Systems, Process and Control (ICSPC 2014), 12 - 14 December 2014, Kuala Lumpur, Malaysia.

Cindhamani.J, Naguboynia Punya, Rasha Ealaruvi, L.D. Dhinesh Babu (2014). “An enhanced data security and trust management enabled framework for cloud computing systems” IEEE 5th International Conference on Computing, Communications and Networking Technologies July 11-13, 2014, Hefei, China.

Kawser Wazed Nafi, Tonny Shekha Kar, Sayed Anisul Hoque, Dr. M. M. A Hashem (2012). “A Newer User Authentication, File encryption and Distributed Server Based Cloud Computing security architecture” (IJACSA) International Journal of Advanced Computer Science and Applications, Vol. 3, No. 10.

Downloads

Published

2019-02-01

How to Cite

[1]
“Cloud Computing: A Study on Security Issues and Their Impact on Cloud Computing Environment”, JASRAE, vol. 16, no. 2, pp. 1261–1265, Feb. 2019, Accessed: Sep. 20, 2024. [Online]. Available: https://ignited.in/index.php/jasrae/article/view/14942

How to Cite

[1]
“Cloud Computing: A Study on Security Issues and Their Impact on Cloud Computing Environment”, JASRAE, vol. 16, no. 2, pp. 1261–1265, Feb. 2019, Accessed: Sep. 20, 2024. [Online]. Available: https://ignited.in/index.php/jasrae/article/view/14942