Research Paper | Computer Science & Engineering | India | Volume 3 Issue 6, June 2014
Investigation of Security in Cloud Computing
Annu Devi
Cloud computing becomes more widely prevailed storage for outsourced data which may contain more sensitive information such as credit card numbers; passwords; e-mails; personal health records etc. As the data owners cannot risk their unencrypted outsourced data so as the cloud servers. The cloud server may fail to keep up the integrity of the cloud data due to hacking or entry of unauthorized entities. The increased attack surface in a in a Cloud environment allows for other vulnerabilities to be exploited; thereby increasing the organizations risk. While Cloud services offer flexibility; scalability and economies of scale; there have been commensurate concerns about security. As more data moves from centrally located server storage to the Cloud; the potential for personal and private data to be compromised will increase. Confidentiality; availability and integrity of data are at risk if appropriate measures are not put in place prior to selecting a Cloud vendor or implementing your own cloud and migrating to Cloud services. Cloud services such as Software as a service; Platform as a service or Infrastructure as a service will each have their own security concerns that need to be addressed. This paper reviews the best practices to secure Cloud services and data; including conventional security techniques and working with vendors to ensure proper Service Level Agreements exist.
Keywords: Cloud Computing, Encryption, Decryption, Threats, Public key, Private key, Cryptography
Edition: Volume 3 Issue 6, June 2014
Pages: 2025 - 2029
How to Cite this Article?
Annu Devi, "Investigation of Security in Cloud Computing", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=2014706, Volume 3 Issue 6, June 2014, 2025 - 2029
133 PDF Views | 88 PDF Downloads
Similar Articles with Keyword 'Cloud Computing'
Survey Paper, Computer Science & Engineering, India, Volume 7 Issue 1, January 2018
Pages: 81 - 84Novel Approach to Virtual Machine Migration In Cloud Computing Environment - A Survey
Priyanka H, Dr. Mary Cherian
Research Paper, Computer Science & Engineering, India, Volume 2 Issue 8, August 2013
Pages: 71 - 73Cloud Computing and Its Types in Mobile Network
Palak Jain
Review Papers, Computer Science & Engineering, India, Volume 10 Issue 1, January 2021
Pages: 594 - 596A Review of Replication Strategies to Increase Data Availability for Data Intensive Applications in Cloud
K. Sreelatha
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 9 Issue 9, September 2020
Pages: 1028 - 1031Secure and Efficient Item Information Retrieval in Cloud Computing
Dr. Shameem Akther, Tahseen Begum
Research Paper, Computer Science & Engineering, India, Volume 2 Issue 4, April 2013
Pages: 315 - 318Cloud Computing - A Birds Eye View
S.Kalaiselvi, S.V.Revathi
Similar Articles with Keyword 'Encryption'
Research Paper, Computer Science & Engineering, India, Volume 9 Issue 11, November 2020
Pages: 470 - 478Ensuring Video Integrity Using Watermark - Chaining by SVD and DWT
Aditya Tiwari, Ayush Pandey
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015
Pages: 1069 - 1073Energy Efficient and Trust Based Node Disjoint Multipath Routing Protocol for WSN
Rucha Agrawal, Simran Khiani
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015
Pages: 1200 - 1203Efficient Hardware Encryption Using Lightweight Process
Deeksha Bhardwaj, Rohit Pawar, Aman Jain
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 1525 - 1529Blowfish Algorithm by Modify Randomness for S-Boxes using Fuzzy Value and Apply Encryption or Decryption on Image
Maulik P. Chaudhari, Neha Parmar
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 2025 - 2029Investigation of Security in Cloud Computing
Annu Devi
Similar Articles with Keyword 'Decryption'
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 1525 - 1529Blowfish Algorithm by Modify Randomness for S-Boxes using Fuzzy Value and Apply Encryption or Decryption on Image
Maulik P. Chaudhari, Neha Parmar
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 2025 - 2029Investigation of Security in Cloud Computing
Annu Devi
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015
Pages: 1579 - 1582Data Hiding in H.264/AVC Video Encryption with XOR-ed User Information and Data in File Format
Neenu Shereef
Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015
Pages: 1833 - 1836A Review of Enhanced Technique for Cloud Data Storage Security Using Data Slicing
Roshan M. Kawale, Bharti L. Dhote
Research Paper, Computer Science & Engineering, India, Volume 5 Issue 10, October 2016
Pages: 1345 - 1350Security Methods for Privacy Preserving and Data Sharing Over Cloud Computing and Big Data Frameworks
Kapilesh S. Swami, Dr. P Sai Kiran
Similar Articles with Keyword 'Threats'
Research Paper, Computer Science & Engineering, India, Volume 9 Issue 9, September 2020
Pages: 759 - 761Empirical Study of Fake Reviews Detection of Online Reviews from E-Commerce Website
Phani K. Cheruku, Atul Kumar
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 2025 - 2029Investigation of Security in Cloud Computing
Annu Devi
Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015
Pages: 1303 - 1306Survey on Privacy Preservation of Sensitive Data
Uma Ashok Huljanti, Dr. Srinivas Narasim Kini
Research Paper, Computer Science & Engineering, Bahrain, Volume 5 Issue 10, October 2016
Pages: 1112 - 1116Network Security Mechanism Based On Static Internet Protocol Addressing
Ahmed D. Asad
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 1058 - 1060Data Integrity Proof in Cloud Computing using TPA with Privacy Preserving
Rushikesh P. Dhanokar
Similar Articles with Keyword 'Public key'
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 2025 - 2029Investigation of Security in Cloud Computing
Annu Devi
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014
Pages: 651 - 653Watermark Detection for Security of Multimedia Data through MPC Privacy of Multimedia Data on the Cloud
Ujwala Pawar, Dhara Kurian
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 1436 - 1439Secure Transmission in Ad-hoc Network: Using Combined Cryptography
Nilesh T Patil
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014
Pages: 781 - 785Implementation of Fast Transmission to Remote Cooperative Groups: A New Key Management Scenario in Wireless Sensor Networks
P. Harikrishna, K. V. Srinivasa Rao
Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015
Pages: 1588 - 1591Study of Controlling Cloud Data Access Privilege and Attribute Based Data Sharing with Attribute Revocation
Nishitara Shelke, Vidya Dhamdhere
Similar Articles with Keyword 'Private key'
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 2025 - 2029Investigation of Security in Cloud Computing
Annu Devi
Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 10, October 2015
Pages: 1548 - 1550Survey on Distributed Mobile Cloud Computing Services: Signature Scheme for a Privacy-Aware Authentication
Chaitali P. Kathar, Vidya Dhamdhere
Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015
Pages: 1588 - 1591Study of Controlling Cloud Data Access Privilege and Attribute Based Data Sharing with Attribute Revocation
Nishitara Shelke, Vidya Dhamdhere
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 5 Issue 6, June 2016
Pages: 2165 - 2166Securing and Low Time Consuming for Sharing High Sensitive and Relevant Data
Princy.B, Nishley Elizabeth Joseph
Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015
Pages: 1687 - 1689Enhancing Security and Effectiveness in Characteristic Based Information Offering
Ashwini Ahire, Prashant Jawalkar
Similar Articles with Keyword 'Cryptography'
Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 7, July 2016
Pages: 1057 - 1058Survey on Novel Hybrid Techniques in EAACK for Prevention of Attacks in MANETS
Pranita Prakash Kulkarni
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015
Pages: 1069 - 1073Energy Efficient and Trust Based Node Disjoint Multipath Routing Protocol for WSN
Rucha Agrawal, Simran Khiani
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015
Pages: 1200 - 1203Efficient Hardware Encryption Using Lightweight Process
Deeksha Bhardwaj, Rohit Pawar, Aman Jain
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 1525 - 1529Blowfish Algorithm by Modify Randomness for S-Boxes using Fuzzy Value and Apply Encryption or Decryption on Image
Maulik P. Chaudhari, Neha Parmar
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014
Pages: 2394 - 2397Multilayered Security Approach for Cloud Data Centers using Hash Functions
Jashanpreet Pal Kaur, Rajbhupinder Kaur