An efficient Literature Review and Analysis of Data Security in Cloud Computing

AUTHORS

M.M.S.L Bhavani,Student of IV B.Tech I sem, Department of Computer Science and Engineering, Vignan's Institute of Information Technology, Visakhapatnam, AP, India.,
Ch Sudhakar,Asst. Prof, Department of Computer Science and Engineering, Vignan's Institute of Information Technology, Visakhapatnam, AP, India,

ABSTRACT

Distributed computing is a developmental outgrowth of earlier registering approaches which expand after existing and new advancements. Distributed computing is a model for on request organise access to a mutual pool of assets, for example, servers, stockpiling, applications and related administrations. Distributed computing can be provisioned and discharged with least collaboration and ideally without the intercession of cloud specialist organisation. The rising mindfulness and executions of cloud administrations and its hidden innovations cause the requirement for security necessities being a la mode. This paper exhibits an outline and investigation of distributed computing, with a few security dangers, security issues, at modern utilised cloud advances and countermeasures. The security challenges in distributed computing are imposing, particularly for open mists whose foundation and computational assets are claimed by an outside gathering that pitches those administrations to the overall population. Cloud security prerequisites have been tended to in productions before. However, it is as yet hard to appraise what sorts of necessities have been inquired about most, and which are still under-investigated. This paper does a precise writing survey by distinguishing distributed computing security prerequisites from productions.

 

KEYWORDS

Cloud Computing, Deployment Models, Literature Review, Security Issues, Service Models, Threats.

REFERENCES

[1] Bukhari: Cloud Trust - a Security Assessment Model infrastructure as a Service (IaaS) Clouds, IJST, Vol 4, Sep-Oct (2016)
[2] Ryan Shea, Jiangchuan Liu: Performance of Virtual Machines Under Networked Denial of Service Attacks: Experiments and Analysis, IEEE Systems Journal Volume: 7, Issue: 2, June (2013).(CrossRef)(Google Scholar)
[3] Justin LeJeune, Cara Tunstall, Kuo-Pao Yang: An algorithmic approach to improving cloud security: The MIST and Malachi algorithms, IEEE Aerospace Conference, (2016)(CrossRef)(Google Scholar)
[4] Jens Lindemann: Towards Abuse Detection and Prevention in IaaS Cloud Computing, IEEE International Conference on ARES, Aug (2015).(CrossRef)(Google Scholar)
[5] Jens Lindemann: Towards Abuse Detection and Prevention in IaaS Cloud Computing, University of Hamburg, Germany Publications, Aug (2015)(CrossRef)(Google Scholar)
[6] Qiao Yan, F. Richard Yu, Qingxiang Gong: Software- Defined Networking (SDN) and Distributed Denial of Service (DDoS) Attacks in Cloud Computing Environments: A Survey, Some Research Issues, and Challenges, IEEE Communications Surveys & Tutorials (Volume: 18, Issue: 1, First quarter (2016)(CrossRef)(Google Scholar)
[7] R. Ashalatha, Jayashree Agarkhed: Multi-tenancy issues in cloud computing for SaaS environment: Circuit, Power and Computing Technologies (ICC CT), 2016 International IEEE (CrossRef)(Google Scholar)
[8] Conference on 18 - 19 March 2016 1Wayne Jansen Timothy Grance, Guidelines on Security and Privacy in Public Cloud Computing. National Institute of Standards and Technology (NIST) Special Publication 800-144, US Department of Commerce; December (2011).
[9] E. Bangerter, D. Gullasch, and S. Krenn. Cache games: bringing access-based cache attacks on AES to practice. In 32nd IEEE Symposium on Security and Privacy; (2011)(CrossRef)(Google Scholar)
[10] .Subashini, S. and Kavitha, V: A survey on security issues in service delivery models of cloud computing. Journal of Network and Computer Applications, 34; 1 (2011).(CrossRef)(Google Scholar)
[11] Ziqi Wang, Rui Yang et al.: A shared memory based cross-VM side-channel attacks in IaaS cloud, IEEE Conference on Computer Communications Workshops (INFOCOMWKSHPS); April (2016).
[12] Arun Kumar, Dr S.S. Tyagi, et al.: "A Comparative Study of Public Key Cryptosystem based on ECC and RSA” - International Journal on Computer Science and Engineering (IJCSE), Vol 3, No. 5, pp. 1904-1905; May (2011).
[13] ENISA: Cloud Computing: benefits, risks and recommendations for information Security; (2009).
[14] Vic (J.R.) Winkler: Securing the Cloud Cloud Computer Security Techniques and Tactics; Jun (2011)
[15] ConfidentialityAccess Manipulate Procedure Intended for http://www.ijrcct.org/index.php/ojs/article/download/1239/pdf

CITATION

  • APA:
    Bhavani,M.M.S.L.& Sudhakar,C.(2018). An efficient Literature Review and Analysis of Data Security in Cloud Computing. International Journal of Advanced Research in Big Data Management System, 2(2), . http://dx.doi.org/10.21742/IJARBMS.2018.2.2.03
  • Harvard:
    Bhavani,M.M.S.L.and Sudhakar,C.(2018). "An efficient Literature Review and Analysis of Data Security in Cloud Computing". International Journal of Advanced Research in Big Data Management System, 2(2), pp.. doi:http://dx.doi.org/10.21742/IJARBMS.2018.2.2.03
  • IEEE:
    [1]M.M.S.L.Bhavaniand C.Sudhakar, "An efficient Literature Review and Analysis of Data Security in Cloud Computing". International Journal of Advanced Research in Big Data Management System, vol.2, no.2, pp., Dec. 2018
  • MLA:
    Bhavani M.M.S.Land Sudhakar Ch. "An efficient Literature Review and Analysis of Data Security in Cloud Computing". International Journal of Advanced Research in Big Data Management System, vol.2, no.2, Dec. 2018, pp., doi:http://dx.doi.org/10.21742/IJARBMS.2018.2.2.03

ISSUE INFO

  • Volume 2, No. 2, 2018
  • ISSN(p):2208-1674
  • ISSN(o):2208-1682
  • Published:Dec. 2018

DOWNLOAD