Analysis of security in cloud computing

Year : 2024 | Volume :11 | Issue : 01 | Page : –
By

    B. Krishna

  1. D. Madhan

  2. U. Udayakumar

  3. K. Sutha

  1. Student, Department of Computer Science & Applications, Faculty of Science and Humanities, SRM Institute of Science and Technology, Ramapuram, Chennai, Tamil Nadu, India
  2. Student, Department of Computer Science & Applications, Faculty of Science and Humanities, SRM Institute of Science and Technology, Ramapuram, Chennai, Tamil Nadu, India
  3. Assistant Professor, Department of Computer Science & Applications, Faculty of Science and Humanities, SRM Institute of Science and Technology, Ramapuram, Chennai, Tamil Nadu, India
  4. Assistant Professor, Department of Computer Science & Applications, Faculty of Science and Humanities, SRM Institute of Science and Technology, Ramapuram, Chennai, Tamil Nadu, India

Abstract

These days, cloud computing is expanding quickly in the IT sector, offering a fresh approach to managing various information systems. The rapid pace of technological advancement highlights the importance of embracing and leveraging its advantages. Organizations transitioning to cloud-based information archiving demonstrate several key characteristics. These include enhanced IT infrastructure, the ability to manage remote access from any location in the world with a stable Internet connection, and the cost savings that come with using cloud computing. As we shift everything to a distributed environment and toward the concept of asset pooling and on-request management. Security and privacy concerns are always paramount. This document provides an in-depth exploration of issues related to cloud security. The architecture, features, delivery strategy, and stakeholders of the cloud are all taken into consideration while looking into the security problem. This paper examines some of the main security challenges related to implementing cloud-aware security solutions that might potentially safeguard the dynamic and constantly evolving cloud paradigm.

Keywords: Cloud computing, Security, networking, databases, operating systems

[This article belongs to Recent Trends in Parallel Computing(rtpc)]

How to cite this article: B. Krishna, D. Madhan, U. Udayakumar, K. Sutha.Analysis of security in cloud computing.Recent Trends in Parallel Computing.2024; 11(01):-.
How to cite this URL: B. Krishna, D. Madhan, U. Udayakumar, K. Sutha , Analysis of security in cloud computing rtpc 2024 {cited 2024 Apr 04};11:-. Available from: https://journals.stmjournals.com/rtpc/article=2024/view=138918


References

1. Mell, P., & Grance, T. (2011). The NIST Definition of Cloud Computing. National Institute of Standards and Technology, U.S. Department of Commerce. Special Publication 800-145. DOI: 10.6028/NIST.SP.800-145.

2. Subashini, S., & Kavitha, V. (2011). A survey on security issues in service delivery models of cloud computing. Journal of Network and Computer Applications, 34(1), 1- 11. DOI: 10.1016/j.jnca.2010.07.006.

3. Hashizume, K., Rosado, D. G., Fernández-Medina, E., & Fernandez, E. B. (2013). An analysis of security issues for cloud computing. DOI: 10.1186/1869-0238-4-5.

4. Modi, C., Patel, D., Borisaniya, B., Patel, H., Patel, A., & Rajarajan, M. (2013). A survey of intrusion detection techniques in Cloud. Journal of Network and Computer Applications, 36(1), 42-57. DOI: 10.1016/j.jnca.2012.05.003.

5. Aljawarneh, S., Aldwairi, M.,  Yassein, M. B. (2018). Cloud security: Challenges and future trends. Cybersecurity, 1(1), 9. DOI: 10.1186/s42400-018-0010-6.

6. Zissis, D.,  Lekkas, D. (2012). Addressing cloud computing security issues. Future Generation Computer Systems, 28(3), 583-592. DOI: 10.1016/j.future.2010.12.006.

7. Rittinghouse, J. W., & Ransome, J. F. (2016). Cloud Computing: Implementation, Management, and Security. CRC Press. ISBN: 978-1-4398-0680-7.

8. Takabi, H., Joshi, J. B. D., & Ahn, G. J. (2010). Security and Privacy Challenges in Cloud Computing Environments. IEEE Security & Privacy, 8(6), 24-31. DOI: 10.1109/MSP.2010.186.

9. December 2017 – DOI:10.1109/ICCES.2017.8275295, Conference: 2017,12th International Conference on Computer Engineering and Systems (ICCES). Authors: Ayman M. El-Zoghby, Marianne A. Azer, National Telecommunication Institute, Egypt.

10. Santosh Bulusu 880216-5798, Computer Intel Neurosci. 2022; 2022: 8303504. Published online 2022 Jun 7. Doi: 10.1155/2022/8303504. PMCID: PMC9197654, PMID: 35712069.


Regular Issue Subscription Review Article
Volume 11
Issue 01
Received February 16, 2024
Accepted March 8, 2024
Published April 4, 2024