Downloads: 106 | Views: 256 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper | Computer Science & Engineering | India | Volume 3 Issue 6, June 2014 | Rating: 6.6 / 10
Investigation of Security in Cloud Computing
Annu Devi
Abstract: Cloud computing becomes more widely prevailed storage for outsourced data which may contain more sensitive information such as credit card numbers; passwords; e-mails; personal health records etc. As the data owners cannot risk their unencrypted outsourced data so as the cloud servers. The cloud server may fail to keep up the integrity of the cloud data due to hacking or entry of unauthorized entities. The increased attack surface in a in a Cloud environment allows for other vulnerabilities to be exploited; thereby increasing the organizations risk. While Cloud services offer flexibility; scalability and economies of scale; there have been commensurate concerns about security. As more data moves from centrally located server storage to the Cloud; the potential for personal and private data to be compromised will increase. Confidentiality; availability and integrity of data are at risk if appropriate measures are not put in place prior to selecting a Cloud vendor or implementing your own cloud and migrating to Cloud services. Cloud services such as Software as a service; Platform as a service or Infrastructure as a service will each have their own security concerns that need to be addressed. This paper reviews the best practices to secure Cloud services and data; including conventional security techniques and working with vendors to ensure proper Service Level Agreements exist.
Keywords: Cloud Computing, Encryption, Decryption, Threats, Public key, Private key, Cryptography
Edition: Volume 3 Issue 6, June 2014,
Pages: 2025 - 2029