Research Key Techniques of Data Security in Public Cloud

Authors

  • Sheik Saidhbi Assistant Professor, Department of Information Systems, Faculty of Informatics, University of Gondar, Ethiopia

DOI:

https://doi.org/10.51983/ajcst-2019.8.2.2143

Keywords:

Cloud Computing, Security Issues, Cloud Models

Abstract

Internet working security has become one of the biggest uprising points of concern now days. People are getting attached more and more to the internet in order to fulfill their demands. Not only customers but also the IT based companies are also getting themselves relying on up growing technology called as cloud computing. Cloud is a branch of computer science that provides the services on lease. In this paper we will make a comparative analysis of various technical security issues towards cloud computing, cloud deployment based security and model based security issues. A comparative analysis has been made at the end of the paper.

References

Cloud Security Alliance (CSA), "Security Guidance for Critical Areas of Focus in Cloud computing," presented in April 2009.

A. Ukil, D. Jana, and A. D. Sarkar, "A Security Framework In Cloud Computing Infrastructure," International Journal of Network Security & Its Applications (IJNSA), vol. 5, no. 5, September 2013, DOI:10.5121/ijnsa.2013.5502 11.

R. P. Padhy, M. R. Patra, and S. C. Satapathy, "Cloud Computing: Security Issues and Research Challenges," IRACST – International Journal of Computer Science and Information Technology & Security (IJCSITS), vol. 1, no. 2, December 2011.

K. Munir and Prof Dr. S. Palaniappan, "Framework for Secure Cloud Computing," International Journal on Cloud Computing: Services and Architecture (IJCCSA), vol. 3, no. 2, April 2013.

N. Singh, A. Hans, A. Sharma, and K. Kumar, "A Review on Security Issues in Cloud Computing," International Journal of Innovation and Applied Studies, vol. 8, no. 3, pp. 1090–1093, September 2014.

M. McIntosh and P. Austel, "XML signature element wrapping attacks and countermeasures," in SWS ’05: Proceedings of the 2005 workshop on Secure web services, ACM Press, pp. 20–27, 2005.

S. Stamm, Z. Ramzan, and M. Jakobsson, "Drive-by pharming," Indiana University Computer Science, Tech. Rep. 641, 2006.

A. Malik and M. M. Nazir, "Security Framework for Cloud Computing Environment: A Review," Journal of Emerging Trends in Computing and Information Sciences 2009-2012 CIS Journal, vol. 3, no. 3, March 2012.

J. Wei, X. Zhang, G. Ammons, P. Bala, and P. Ning, "Managing security of virtual machine images in a cloud environment," in Proceedings of the 2009 ACM workshop on Cloud computing security, pp. 91-96, November 2009.

M. Mowbray and S. Pearson, "A Client-Based Privacy Manager for Cloud computing," Proceedings of the Fourth International ICST Conference on communication system software and Middleware, June 2009.

F. Lombardi and R. Di Pietro, "Transparent Security for Cloud," Proceedings of the 2010 ACM Symposium on Applied Computing, pp. 414-415, March 2010.

W. Wang, Z. Li, R. Owens, and B. Bhargava, "Secure and Efficient Access to Outsourced Data," in Proceedings of the ACM workshop on Cloud computing security, pp. 55-65, 2009.

K. Popović, Ž. Hocenski, "Cloud computing security issues and challenges," MIPRO 2010, May 24-28, 2010, Opatija, Croatia.

T. Takahashi et al., "Enabling Secure Multi-tenancy in Cloud Computing: Challenges and Approaches."

Nagarjuna, C.C. Kalyansrinivas, S. Sajida, and Lokesh, "Security techniques for multi-tenancy applications in Cloud," International Journal of Computer Science and Mobile Computing, vol. 2, no. 8, pp. 248-251, August 2013.

Downloads

Published

27-04-2019

How to Cite

Saidhbi , S. (2019). Research Key Techniques of Data Security in Public Cloud. Asian Journal of Computer Science and Technology, 8(2), 40–43. https://doi.org/10.51983/ajcst-2019.8.2.2143