Analysis of security in cloud computing

[{“box”:0,”content”:”[if 992 equals=”Open Access”]

n

Open Access

n

[/if 992]n

n

Year : April 4, 2024 at 4:11 pm | [if 1553 equals=””] Volume :11 [else] Volume :11[/if 1553] | [if 424 equals=”Regular Issue”]Issue[/if 424][if 424 equals=”Special Issue”]Special Issue[/if 424] [if 424 equals=”Conference”][/if 424] : 01 | Page : –

n

n

n

n

n

n

By

n

    n t

    [foreach 286]n

    n

    B. Krishna, D. Madhan, U. Udayakumar, K. Sutha

  1. [/foreach]

    n

n

n[if 2099 not_equal=”Yes”]n

    [foreach 286] [if 1175 not_equal=””]n t

  1. Student, Student, Assistant Professor, Assistant Professor, Department of Computer Science & Applications, Faculty of Science and Humanities, SRM Institute of Science and Technology, Ramapuram, Chennai, Department of Computer Science & Applications, Faculty of Science and Humanities, SRM Institute of Science and Technology, Ramapuram, Chennai, Department of Computer Science & Applications, Faculty of Science and Humanities, SRM Institute of Science and Technology, Ramapuram, Chennai, Department of Computer Science & Applications, Faculty of Science and Humanities, SRM Institute of Science and Technology, Ramapuram, Chennai, Tamil Nadu, Tamil Nadu, Tamil Nadu, Tamil Nadu, India, India, India, India
  2. n[/if 1175][/foreach]

[/if 2099][if 2099 equals=”Yes”][/if 2099]nn

n

Abstract

nThese days, cloud computing is expanding quickly in the IT sector, offering a fresh approach to managing various information systems. The rapid pace of technological advancement highlights the importance of embracing and leveraging its advantages. Organizations transitioning to cloud-based information archiving demonstrate several key characteristics. These include enhanced IT infrastructure, the ability to manage remote access from any location in the world with a stable Internet connection, and the cost savings that come with using cloud computing. As we shift everything to a distributed environment and toward the concept of asset pooling and on-request management. Security and privacy concerns are always paramount. This document provides an in-depth exploration of issues related to cloud security. The architecture, features, delivery strategy, and stakeholders of the cloud are all taken into consideration while looking into the security problem. This paper examines some of the main security challenges related to implementing cloud-aware security solutions that might potentially safeguard the dynamic and constantly evolving cloud paradigm.

n

n

n

Keywords: Cloud computing, Security, networking, databases, operating systems

n[if 424 equals=”Regular Issue”][This article belongs to Recent Trends in Parallel Computing(rtpc)]

n

[/if 424][if 424 equals=”Special Issue”][This article belongs to Special Issue under section in Recent Trends in Parallel Computing(rtpc)][/if 424][if 424 equals=”Conference”]This article belongs to Conference [/if 424]

n

n

n

How to cite this article: B. Krishna, D. Madhan, U. Udayakumar, K. Sutha Analysis of security in cloud computing rtpc April 4, 2024; 11:-

n

How to cite this URL: B. Krishna, D. Madhan, U. Udayakumar, K. Sutha Analysis of security in cloud computing rtpc April 4, 2024 {cited April 4, 2024};11:-. Available from: https://journals.stmjournals.com/rtpc/article=April 4, 2024/view=0

n


n[if 992 equals=”Open Access”] Full Text PDF Download[else] nvar fieldValue = “[user_role]”;nif (fieldValue == ‘indexingbodies’) {n document.write(‘Full Text PDF‘);n }nelse if (fieldValue == ‘administrator’) { document.write(‘Full Text PDF‘); }nelse if (fieldValue == ‘rtpc’) { document.write(‘Full Text PDF‘); }n else { document.write(‘ ‘); }n [/if 992] [if 379 not_equal=””]n

Browse Figures

n

n

[foreach 379]n

n[/foreach]n

nn

n

n[/if 379]n

n

References

n[if 1104 equals=””]n

1. Mell, P., & Grance, T. (2011). The NIST Definition of Cloud Computing. National Institute of Standards and Technology, U.S. Department of Commerce. Special Publication 800-145. DOI: 10.6028/NIST.SP.800-145.

2. Subashini, S., & Kavitha, V. (2011). A survey on security issues in service delivery models of cloud computing. Journal of Network and Computer Applications, 34(1), 1- 11. DOI: 10.1016/j.jnca.2010.07.006.

3. Hashizume, K., Rosado, D. G., Fernández-Medina, E., & Fernandez, E. B. (2013). An analysis of security issues for cloud computing. DOI: 10.1186/1869-0238-4-5.

4. Modi, C., Patel, D., Borisaniya, B., Patel, H., Patel, A., & Rajarajan, M. (2013). A survey of intrusion detection techniques in Cloud. Journal of Network and Computer Applications, 36(1), 42-57. DOI: 10.1016/j.jnca.2012.05.003.

5. Aljawarneh, S., Aldwairi, M.,  Yassein, M. B. (2018). Cloud security: Challenges and future trends. Cybersecurity, 1(1), 9. DOI: 10.1186/s42400-018-0010-6.

6. Zissis, D.,  Lekkas, D. (2012). Addressing cloud computing security issues. Future Generation Computer Systems, 28(3), 583-592. DOI: 10.1016/j.future.2010.12.006.

7. Rittinghouse, J. W., & Ransome, J. F. (2016). Cloud Computing: Implementation, Management, and Security. CRC Press. ISBN: 978-1-4398-0680-7.

8. Takabi, H., Joshi, J. B. D., & Ahn, G. J. (2010). Security and Privacy Challenges in Cloud Computing Environments. IEEE Security & Privacy, 8(6), 24-31. DOI: 10.1109/MSP.2010.186.

9. December 2017 – DOI:10.1109/ICCES.2017.8275295, Conference: 2017,12th International Conference on Computer Engineering and Systems (ICCES). Authors: Ayman M. El-Zoghby, Marianne A. Azer, National Telecommunication Institute, Egypt.

10. Santosh Bulusu 880216-5798, Computer Intel Neurosci. 2022; 2022: 8303504. Published online 2022 Jun 7. Doi: 10.1155/2022/8303504. PMCID: PMC9197654, PMID: 35712069.

nn[/if 1104][if 1104 not_equal=””]n

    [foreach 1102]n t

  1. [if 1106 equals=””], [/if 1106][if 1106 not_equal=””],[/if 1106]
  2. n[/foreach]

n[/if 1104]

nn


nn[if 1114 equals=”Yes”]n

n[/if 1114]

n

n

[if 424 not_equal=””]Regular Issue[else]Published[/if 424] Subscription Review Article

n

n

n

n

n

Recent Trends in Parallel Computing

n

[if 344 not_equal=””]ISSN: 2393-8749[/if 344]

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n[if 2146 equals=”Yes”]

[/if 2146][if 2146 not_equal=”Yes”]

[/if 2146]n

n

n

Volume 11
[if 424 equals=”Regular Issue”]Issue[/if 424][if 424 equals=”Special Issue”]Special Issue[/if 424] [if 424 equals=”Conference”][/if 424] 01
Received February 16, 2024
Accepted March 8, 2024
Published April 4, 2024

n

n

n

n

n

n

nn function myFunction2() {n var x = document.getElementById(“browsefigure”);n if (x.style.display === “block”) {n x.style.display = “none”;n }n else { x.style.display = “Block”; }n }n document.querySelector(“.prevBtn”).addEventListener(“click”, () => {n changeSlides(-1);n });n document.querySelector(“.nextBtn”).addEventListener(“click”, () => {n changeSlides(1);n });n var slideIndex = 1;n showSlides(slideIndex);n function changeSlides(n) {n showSlides((slideIndex += n));n }n function currentSlide(n) {n showSlides((slideIndex = n));n }n function showSlides(n) {n var i;n var slides = document.getElementsByClassName(“Slide”);n var dots = document.getElementsByClassName(“Navdot”);n if (n > slides.length) { slideIndex = 1; }n if (n (item.style.display = “none”));n Array.from(dots).forEach(n item => (item.className = item.className.replace(” selected”, “”))n );n slides[slideIndex – 1].style.display = “block”;n dots[slideIndex – 1].className += ” selected”;n }n”}]