SlideShare a Scribd company logo
1 of 7
Download to read offline
CSEIT1835225 | Received : 25 June 2018 | Accepted : 04 July 2018 | July-August-2018 [ 3 (6) : 05-10 ]
International Journal of Scientific Research in Computer Science, Engineering and Information Technology
© 2018 IJSRCSEIT | Volume 3 | Issue 6 | ISSN : 2456-3307
05
A Systematic Review Paper on Cloud Security
Kirti Sharma*, Bharti Nagpal
CSE, AIACT & R, GGSIPU, Delhi, India
ABSTRACT
Cloud computing is a rising method for processing in software engineering. It expands different registering
systems like framework figuring, dispersed processing. Today cloud computing is utilized as a part of both
mechanical field and scholarly field. Cloud encourages its clients by giving virtual assets by means of web. As
the field of cloud computing is spreading the new systems are creating. This expansion in cloud processing
condition likewise expands security challenges for cloud engineers. Clients of cloud spare their information in
the cloud subsequently the absence of security in cloud can lose the client's trust. This paper presents a
systematic review on different cloud security issues with their respective pros and cons and imparting the
existing methodologies done by the researchers for cloud security.
Keywords : Cloud Security, Saas, Paas, And Iaas, Virtual Assets, Cloud Computing, Hadoop, Cryptography File
Systems, HDFS System
I. INTRODUCTION
Security in conveyed processing is a critical concern.
Data in cloud should be secured fit as a fiddle. To
bind client from getting to the common data direct,
mediator and lender organizations should be used.
Cloud computing is an arrangement of assets and
administrations that are offered by the system or
web. Cloud computing broadens different figuring
methods like framework processing, circulated
registering. Today cloud computing is utilized as a
part of both mechanical field and scholarly field.
Cloud encourages its clients by giving virtual assets
by means of web. Conveyed registering and limit
outfits customers with capacities to store and process
their data in untouchable server ranches.
Associations utilize the cloud in a wide range of
administration models (with acronyms, for example,
SaaS, PaaS, and IaaS) and arrangement models
(private, public, hybrid, and community). Security
concerns related with distributed computing fall into
two general classes: security issues looked by cloud
suppliers and security issues looked by their clients.
The supplier must guarantee that their framework is
secure and that their customers information and
applications are ensured, while the client must take
measures to invigorate their application and utilize
solid passwords and validation measures. Cloud
security considers mainly two factors better defense
as shown in fig. 1 below.
Figure 1.Factors of cloud security
II. ELEMENTARY STUDY MATERIAL
Cloud computing is an arrangement of existing
procedures and advances, bundled inside another
foundation worldview that offers enhanced
adaptability, flexibility, business nimbleness,
Factors
Security Reliability
Volume 3, Issue 6, July-August-2018 | http:// ijsrcseit.com
Kirti Sharma et al. Int J S Res CSE & IT. 2018 July-August; 3(6) : 05-10
6
speedier startup time, lessened administration costs,
and in the nick of time accessibility of assets.
1. Features:
 Use of web based administrations to help
business process.
 Rent IT-benefits on an utility-like premise.
2. Properties:
 Rapid organization
 Low startup costs/capital speculations
 Costs in view of utilization or membership
 Multi-occupant sharing of administrations/assets
3. Basic qualities:
 On request self-benefit
 Ubiquitous arrangement
 Location autonomous asset pooling
 Rapid versatility
 Measured benefit
4. Cloud models:
a. Delivery Models-
 SaaS
 PaaS
 IaaS
b. Deployment Models:-
 Private cloud
 Community cloud
 Public cloud
 Hybrid cloud
III. SURVEY OF CLOUD SECURITY CONCERN
A survey as shown in table 1 listing various
methodologies that were proposed by various authors
via executing different algorithms in previous years.
Table includes the pros and cons regarding with each
proposed algorithm.
TABLE 1
SURVEY OF CLOUD SECURITY CONCERN
S.No Year Author Proposed
Algorithm(s)
Pros Cons
1. 2015 Primoz cigoj [13] SSO(Single Sign
On) Approach
Unified access point
of a management in
cloud and a secure
strong
Authentication.
It attempts to remove
some vulnerability
only. It need more
flexible, secure
interfaces, control of
the user data & privacy
and not focusing in the
technology
development
2. 2015 R.Tamilaras I [14] DIM’s(Data and
Image
Mechanism)
Three-tier
Architecture used
in partitioning
method.
Data security,
Authentication,
confidentiality,
prevents data
leakage, CSA.
Only the suitable data
is valid for this
mechanism not for all
type of data.
Volume 3, Issue 6, July-August-2018 | http:// ijsrcseit.com
Kirti Sharma et al. Int J S Res CSE & IT. 2018 July-August; 3(6) : 05-10
7
3. 2016 Varsha&D. Mali
[15]
Cryptographic
RBDAC Trust
Mechanism.
Security for user’s to
determine the
individual role.
For Dynamic decision
making trust evaluation
is done.
4. 2016 Punam V.Maitri
& Aruna Verma
[16]
LSB
Steganography
technique
combined with
AES,RC6,Blowfish
& BRA Algorithm
Key information
security, data
integrity, low delay,
authentication,
confidentiality are
considered. Try to
accomplish high level
security using
hybridization of
public key
cryptography
algorithms
Not available high level
security and this
algorithm need 10%-
12% less time respect o
the blowfish algorithm.
5. 2016 J.Mahalaksh mi
and K.Kuppusa
my [17]
Security-as-a-
Service for files in
Cloud Computing
An application model
is developed that
encrypts sensitive
data and works well
against cryptanalytic
attacks
Key size is limited and
limited parameters are
verified.
6. 2017 Malik Irkain [18] Comprehensive
classification.
Verify data location,
assumptions
regarding CSP
behavior.
Addresses only
landmark based
approaches.
7. 2017 Noelle
Rakotondra vony
[19]
VMI-based
Mechanism’s.
Invention of target &
direction of attacks,
providing the
statistical analysis of
the report.
Briefs the issues and
lack on solutions.
8. 2017 Rongzhi wang
[20]
Data Secure
Storage based on
Tornado Codes
(DSBT).
Solve the problem of
data tampering.
It brings series of
negative issues, data
security issues
detection &retrieve in
the data availability.
9. 2018
 Husna Tariq and Fuzzy keyword Improve information Faced problem while
Volume 3, Issue 6, July-August-2018 | http:// ijsrcseit.com
Kirti Sharma et al. Int J S Res CSE & IT. 2018 July-August; 3(6) : 05-10
8
 Parul Agarwal
[21]
searching scheme
and Coordinated
symmetric and
asymmetric
encryption
algorithms
security and enhance
the security
framework and
shield sensitive
client’s information
from unauthorized
exposure.
decrypting data by
utilizing wild card
technique.
10. 2017 Iqjot Singh,
Prerna Dwivedi,
Taru Gupta and P.
G. Shynu [22]
Hashing on
Hadoop in big-
data
Ensure security while
uploading and
downloading files.
Access files faster and
with the help of
encryption
technology the data
stored in the HDFS is
safe and secure.
Lacks whenever
someone become able
to crack the security
and view the data,
moreover for searching
a normal file in data in
HDFS system
11. 2017  Mauro Storch,
César A. F. de
Rose [23]
Cryptography File
Systems (CFS)
adoption
The model is verified
in a real scenario for
estimating the total
cost when adding
security for storage in
a cloud environment.
It is used to estimate
the overhead of a
CFS hosting files of
an application
execution (based on
Big Data operations)
and the model
predictability
accuracy was close to
90%.
Not accounting the
throughput, cache
hierarchy and
synchronization
mechanisms.
12. 2017
 Narander Kumar
and Priyanka
Chaudhary [24]
Hashing
Approach and
Rail Fence
Technique
Use of bcrypt hashing
and rail fence
transposition method
for password
security. It upgrades
the security,
diminishes the issues
Chances of brute force
attack.
Volume 3, Issue 6, July-August-2018 | http:// ijsrcseit.com
Kirti Sharma et al. Int J S Res CSE & IT. 2018 July-August; 3(6) : 05-10
9
of cyber stalking.
13. 2017  Ioram S. Sette,
David W.
Chadwick and
Carlos A. G.
Ferraz [25]
Accounts with
multiple cloud
providers
Authorization
Policy Federations
allow policies to be
defined and stored
in a common
ontology in DNF,
and managed from a
central PAP, named
FAPManS.
Cannot preserve the
semantics of the
explicit deny rules.
14. 2018 Mylara Reddy
Chinnaiah [26]
Fault Tolerant
Technique
IFrFT(Frequency
of Configuration
interactions),
ChIFrFT
(Characteristics &
Frequency if
interactions).
It achieves reliability
& fault tolerance of a
software system in a
cost efficiency and it
is better than NOFT
Scheme
Percentage of
successful interactions
are low(25 & 40%).
15. 2018 Ahmed Nour
Moussa [27]
CFaaS Model. Consumers &
providers
independently
collect, verify the
equity of forensic
analysis resolve
collected results.
Independently collect,
verify the equity of
forensic analysis
resolve collected
results. Suitable
forensic analysis is not
available for accessing
the forensic data
directly.
IV. CONCLUSION
This paper portrays a portion of the cloud ideas,
properties and its elementary material. As the cloud
computing is dynamic and complex, the conventional
security arrangements gave by cloud condition do not
delineate to its virtualized surroundings. This paper
described a systematic review on different cloud
security issues imparting the existing methodologies
done by the researchers for cloud security.
V. REFERENCES
[1] NIST (Authors: P. Mell and T. Grance), "The
NIST Definition of Cloud Computing (ver. 15),"
National Institute of Standards and Technology,
Information Technology Laboratory (October 7
2009).
Volume 3, Issue 6, July-August-2018 | http:// ijsrcseit.com
Kirti Sharma et al. Int J S Res CSE & IT. 2018 July-August; 3(6) : 05-10
10
[2] J. McDermott, (2009) "Security Requirements
for Virtualization in Cloud Computing,"
presented at the ACSAC Cloud Security
Workshop, Honolulu, Hawaii, USA, 2009.
[3] Almorsy, Mohamed, John Grundy, and Ingo
Müller. "An analysis of the cloud computing
security problem." arXiv preprint
arXiv:1609.01107 (2016).
[4] Kalaiprasath, R., R. Elankavi, and Dr R.
Udayakumar. "Cloud. Security and
Compliance-A Semantic Approach in End to
End Security." International Journal Of
Mechanical Engineering And Technology
(Ijmet) 8.5 (2017).
[5] McGee, Pat. C# 5.0: A Beginner's Guide.
McGraw-Hill Education, 2015.
[6] slideplayer.com/slide/9476015/
[7] bigdata-madesimple.com/5-advantages-and-
disadvantages-of-cloud-storage/
[8] computer.howstuffworks.com/cloud-
computing/cloud-storage3.htm
[9] fac.ksu.edu.sa/sites/default/files/chapter_6._fun
damental_cloud_security.pdf
[10] https://www.slideshare.net/InderBarara1/securi
ty-issues-and-challenges-in-cloud-computing
[11] sciencedirect.com/science/article/pii/S13613723
18300058
[12] https://arxiv.org/ftp/arxiv/papers/1403/1403.562
7.pdf
[13] Cigoj, Primož, and Borka Jerman Blažič. "An
authentication and authorization solution for a
multiplatform cloud environment."
Information Security Journal: A Global
Perspective 24.4-6 (2015): 146-156.
[14] Tamilarasi, R., S. Prabu, and P. Swarnalatha. An
Approach for Data and Image Security in
Public Cloud using Segmentation and
Authentication (CSA) Protocol Suite. MAGNT
Research Report 2015. 133-141.
[15] VarshaD.Mali,Prof.Pramod
Patil,"Authentication and Access Control for
Cloud Computing using RBDAC Mechanism",
in International Journal of Innovative Research
in Computer and
Communicationngineering,vol.4,Issue11,Nov20
16,DOI:10.15680/IJIRCCE.2016.
[16] Punam V.Maitri ,Aruna verma ,"Secure File
Storage in Cloud Computing using Hybrid
Cryptography Algorithm",in IEEE explore on
WiSNET Conference, Sep
2013,DOI:10.1109/WiSPNET.2016.7566416.
[17] J.Mahalakshmi and K.Kuppusamy, "Security-
As-A-Service for files in Cloud Computing-A
Novel application Model", IEEE Digital Xplore,
DOI: 10.1109/ISCO.2016.7726889, November
2016, pp: 1-5, IEEE.
[18] Irain, Malik, Jacques Jorda, and Zoubir
Mammeri. "Landmark-based data location
verification in the cloud: review of approaches
and challenges." Journal of Cloud Computing
6.1 (2017): 31.
[19] Rakotondravony, Noëlle, and Hans P. Reiser.
"Visualizing and Controlling VMI-based
malware analysis in IaaS Cloud." Reliable
Distributed Systems (SRDS), 2016 IEEE 35th
Symposium on. IEEE, 2016.
[20] Wang, Rongzhi. "Research on Data Security
Technology Based on Cloud Storage." Procedia
engineering 174 (2017): 1340-1355.
[21] Tariq, Husna, and Parul Agarwal. "Secure
keyword search using dual encryption in cloud
computing." International Journal of
Information Technology: 1-10.
[22] Singh, Iqjot, et al. "Enhanced K-means
clustering with encryption on cloud." IOP
Conference Series: Materials Science and
Engineering. Vol. 263. No. 4. IOP Publishing,
2017.
[23] Storch, Mauro, and César AF De Rose. "Cloud
Storage Cost Modeling for Cryptographic File
Systems." Parallel, Distributed and Network-
based Processing (PDP), 2017 25th Euromicro
International Conference on. IEEE, 2017.
Volume 3, Issue 6, July-August-2018 | http:// ijsrcseit.com
Kirti Sharma et al. Int J S Res CSE & IT. 2018 July-August; 3(6) : 05-10
11
[24] Kumar, Narander, and Priyanka Chaudhary.
"Diminishing Cyber stalking and Cyber
bullying Issues using a Hashing Approach and
Rail Fence Technique."
[25] Sette, Ioram S., David W. Chadwick, and Carlos
AG Ferraz. "Authorization Policy Federation in
Heterogeneous Multicloud Environments."
IEEE Cloud Computing 4.4 (2017): 38-47.
[26] Chinnaiah, Mylara Reddy, and Nalini Niranjan.
"Fault tolerant software systems using software
configurations for cloud computing." Journal of
Cloud Computing 7.1 (2018): 3.
[27] Moussa, Ahmed Nour, Norafida Ithnin, and
Anazida Zainal. "CFaaS: bilaterally agreed
evidence collection." Journal of Cloud
Computing 7.1 (2018): 1.
[28] Attrapadung, Nuttapong; Herranz, Javier;
Laguillaumie, Fabien; Libert,Benoît; de
Panafieu, Elie; Ràfols, Carla (2012-03-09).
"Attribute-based encryption schemes with
constant-sizeciphertexts" Computer Science. 22:
15–38. doi:10.1016/j.tcs.2011.12.004.
[29] "Cloud Security Front and Center"
(http://blogs.forrester.com/srm/2009/11/cloud-
security-front-and-center.html). Forrester
Research. 2009-11-18. Retrieved 2010-01-25.
[30] Wang, Huang He, Yuan, Liu Xiao, Xi, Xu Jing,
Min, "Open Identity Management Framework
for SaaS Ecosystem," in ICEBE '09. pp. 512-517.
[31] Aizat Azmi, Ahmad Amsyar Azman,
Sallehuddin Ibrahim, and Mohd Amri Md
Yunus, “Techniques In Advancing The
Capabilities Of Various Nitrate Detection
Methods: A Review”, International Journal on
Smart Sensing and Intelligent Systems., VOL.
10, NO. 2, June 2017, pp. 223-261.

More Related Content

Similar to A Systematic Review Paper On Cloud Security

Assurance of Security and Privacy Requirements for Cloud Deployment Model
Assurance of Security and Privacy Requirements for Cloud Deployment ModelAssurance of Security and Privacy Requirements for Cloud Deployment Model
Assurance of Security and Privacy Requirements for Cloud Deployment Model
IJMTST Journal
 
A Data Sharing Protocol to Minimize Security and Privacy Risks in Cloud Storage
A Data Sharing Protocol to Minimize Security and Privacy Risks in Cloud StorageA Data Sharing Protocol to Minimize Security and Privacy Risks in Cloud Storage
A Data Sharing Protocol to Minimize Security and Privacy Risks in Cloud Storage
ijtsrd
 
APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...
APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...
APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...
IJCNCJournal
 
Maintaining Secure Cloud by Continuous Auditing
Maintaining Secure Cloud by Continuous AuditingMaintaining Secure Cloud by Continuous Auditing
Maintaining Secure Cloud by Continuous Auditing
ijtsrd
 
Secure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorizationSecure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorization
IAEME Publication
 
Secure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorizationSecure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorization
IAEME Publication
 
An approach for secured data transmission at client end in cloud computing
An approach for secured data transmission at client end in cloud computingAn approach for secured data transmission at client end in cloud computing
An approach for secured data transmission at client end in cloud computing
IAEME Publication
 

Similar to A Systematic Review Paper On Cloud Security (20)

CSPCR: Cloud Security, Privacy and Compliance Readiness - A Trustworthy Fram...
CSPCR: Cloud Security, Privacy and Compliance  Readiness - A Trustworthy Fram...CSPCR: Cloud Security, Privacy and Compliance  Readiness - A Trustworthy Fram...
CSPCR: Cloud Security, Privacy and Compliance Readiness - A Trustworthy Fram...
 
Assurance of Security and Privacy Requirements for Cloud Deployment Model
Assurance of Security and Privacy Requirements for Cloud Deployment ModelAssurance of Security and Privacy Requirements for Cloud Deployment Model
Assurance of Security and Privacy Requirements for Cloud Deployment Model
 
A Third Party Auditor Based Technique for Cloud Security
A Third Party Auditor Based Technique for Cloud SecurityA Third Party Auditor Based Technique for Cloud Security
A Third Party Auditor Based Technique for Cloud Security
 
A Data Sharing Protocol to Minimize Security and Privacy Risks in Cloud Storage
A Data Sharing Protocol to Minimize Security and Privacy Risks in Cloud StorageA Data Sharing Protocol to Minimize Security and Privacy Risks in Cloud Storage
A Data Sharing Protocol to Minimize Security and Privacy Risks in Cloud Storage
 
Review on Security Aspects for Cloud Architecture
Review on Security Aspects for Cloud Architecture Review on Security Aspects for Cloud Architecture
Review on Security Aspects for Cloud Architecture
 
APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...
APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...
APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...
 
IRJET- Design and Analytical Study of Id Based Pixel Secured Cloud Enablem...
IRJET- 	  Design and Analytical Study of Id Based Pixel Secured Cloud Enablem...IRJET- 	  Design and Analytical Study of Id Based Pixel Secured Cloud Enablem...
IRJET- Design and Analytical Study of Id Based Pixel Secured Cloud Enablem...
 
Maintaining Secure Cloud by Continuous Auditing
Maintaining Secure Cloud by Continuous AuditingMaintaining Secure Cloud by Continuous Auditing
Maintaining Secure Cloud by Continuous Auditing
 
Analysis of Cloud Computing Security Concerns and Methodologies
Analysis of Cloud Computing Security Concerns and MethodologiesAnalysis of Cloud Computing Security Concerns and Methodologies
Analysis of Cloud Computing Security Concerns and Methodologies
 
IRJET- SAAS Attacks Defense Mechanisms and Digital Forensic
IRJET-  	  SAAS Attacks Defense Mechanisms and Digital ForensicIRJET-  	  SAAS Attacks Defense Mechanisms and Digital Forensic
IRJET- SAAS Attacks Defense Mechanisms and Digital Forensic
 
IRJET- Simultaneous ammunition for the multi-cloud computing simulation
IRJET- Simultaneous ammunition for the multi-cloud computing simulation IRJET- Simultaneous ammunition for the multi-cloud computing simulation
IRJET- Simultaneous ammunition for the multi-cloud computing simulation
 
Secure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorizationSecure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorization
 
Secure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorizationSecure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorization
 
Cloud computing risk assesment report
Cloud computing risk assesment reportCloud computing risk assesment report
Cloud computing risk assesment report
 
SecSecuring Software as a Service Model of Cloud Computing: Issues and Solutions
SecSecuring Software as a Service Model of Cloud Computing: Issues and SolutionsSecSecuring Software as a Service Model of Cloud Computing: Issues and Solutions
SecSecuring Software as a Service Model of Cloud Computing: Issues and Solutions
 
J3602068071
J3602068071J3602068071
J3602068071
 
A study secure multi authentication based data classification model in cloud ...
A study secure multi authentication based data classification model in cloud ...A study secure multi authentication based data classification model in cloud ...
A study secure multi authentication based data classification model in cloud ...
 
A Modified Things Role Based Access Control Model For Securing Utilities In C...
A Modified Things Role Based Access Control Model For Securing Utilities In C...A Modified Things Role Based Access Control Model For Securing Utilities In C...
A Modified Things Role Based Access Control Model For Securing Utilities In C...
 
An approach for secured data transmission at client end in cloud computing
An approach for secured data transmission at client end in cloud computingAn approach for secured data transmission at client end in cloud computing
An approach for secured data transmission at client end in cloud computing
 
5. ijece guideforauthors 2012 edit sat
5. ijece guideforauthors 2012 edit sat5. ijece guideforauthors 2012 edit sat
5. ijece guideforauthors 2012 edit sat
 

More from Sandra Long

More from Sandra Long (20)

Essay On Teachers Day (2023) In English Short, Simple Best
Essay On Teachers Day (2023) In English Short, Simple BestEssay On Teachers Day (2023) In English Short, Simple Best
Essay On Teachers Day (2023) In English Short, Simple Best
 
10 Best Printable Handwriting Paper Template PDF For Free At Printablee
10 Best Printable Handwriting Paper Template PDF For Free At Printablee10 Best Printable Handwriting Paper Template PDF For Free At Printablee
10 Best Printable Handwriting Paper Template PDF For Free At Printablee
 
Buy College Application Essay. Online assignment writing service.
Buy College Application Essay. Online assignment writing service.Buy College Application Essay. Online assignment writing service.
Buy College Application Essay. Online assignment writing service.
 
FREE 6 Sample Informative Essay Templates In MS Word
FREE 6 Sample Informative Essay Templates In MS WordFREE 6 Sample Informative Essay Templates In MS Word
FREE 6 Sample Informative Essay Templates In MS Word
 
Small Essay On Education. Small Essay On The Educ
Small Essay On Education. Small Essay On The EducSmall Essay On Education. Small Essay On The Educ
Small Essay On Education. Small Essay On The Educ
 
Where Can I Buy A Persuasive Essay, Buy Per
Where Can I Buy A Persuasive Essay, Buy PerWhere Can I Buy A Persuasive Essay, Buy Per
Where Can I Buy A Persuasive Essay, Buy Per
 
Chinese Writing Practice Paper With Pinyin Goodnot
Chinese Writing Practice Paper With Pinyin GoodnotChinese Writing Practice Paper With Pinyin Goodnot
Chinese Writing Practice Paper With Pinyin Goodnot
 
Elephant Story Writing Sample - Aus - Elephant W
Elephant Story Writing Sample - Aus - Elephant WElephant Story Writing Sample - Aus - Elephant W
Elephant Story Writing Sample - Aus - Elephant W
 
391505 Paragraph-Writ. Online assignment writing service.
391505 Paragraph-Writ. Online assignment writing service.391505 Paragraph-Writ. Online assignment writing service.
391505 Paragraph-Writ. Online assignment writing service.
 
Get Essay Writing Assignment Help Writing Assignments, Essay Writing
Get Essay Writing Assignment Help Writing Assignments, Essay WritingGet Essay Writing Assignment Help Writing Assignments, Essay Writing
Get Essay Writing Assignment Help Writing Assignments, Essay Writing
 
Ampad EZ Flag Writing Pad, LegalWide, 8 12 X 11, Whi
Ampad EZ Flag Writing Pad, LegalWide, 8 12 X 11, WhiAmpad EZ Flag Writing Pad, LegalWide, 8 12 X 11, Whi
Ampad EZ Flag Writing Pad, LegalWide, 8 12 X 11, Whi
 
The Federalist Papers Writers Nozna.Net. Online assignment writing service.
The Federalist Papers Writers Nozna.Net. Online assignment writing service.The Federalist Papers Writers Nozna.Net. Online assignment writing service.
The Federalist Papers Writers Nozna.Net. Online assignment writing service.
 
Whoever Said That Money CanT Buy Happiness, Simply DidnT
Whoever Said That Money CanT Buy Happiness, Simply DidnTWhoever Said That Money CanT Buy Happiness, Simply DidnT
Whoever Said That Money CanT Buy Happiness, Simply DidnT
 
How To Write An Essay In College Odessa Howtowrit
How To Write An Essay In College Odessa HowtowritHow To Write An Essay In College Odessa Howtowrit
How To Write An Essay In College Odessa Howtowrit
 
How To Write A Career Research Paper. Online assignment writing service.
How To Write A Career Research Paper. Online assignment writing service.How To Write A Career Research Paper. Online assignment writing service.
How To Write A Career Research Paper. Online assignment writing service.
 
Columbia College Chicago Notable Alumni - INFOLEARNERS
Columbia College Chicago Notable Alumni - INFOLEARNERSColumbia College Chicago Notable Alumni - INFOLEARNERS
Columbia College Chicago Notable Alumni - INFOLEARNERS
 
001 P1 Accounting Essay Thatsnotus. Online assignment writing service.
001 P1 Accounting Essay Thatsnotus. Online assignment writing service.001 P1 Accounting Essay Thatsnotus. Online assignment writing service.
001 P1 Accounting Essay Thatsnotus. Online assignment writing service.
 
Essay Writing Tips That Will Make Col. Online assignment writing service.
Essay Writing Tips That Will Make Col. Online assignment writing service.Essay Writing Tips That Will Make Col. Online assignment writing service.
Essay Writing Tips That Will Make Col. Online assignment writing service.
 
Pin On Essay Writer Box. Online assignment writing service.
Pin On Essay Writer Box. Online assignment writing service.Pin On Essay Writer Box. Online assignment writing service.
Pin On Essay Writer Box. Online assignment writing service.
 
How To Write A Funny Essay For College - Ai
How To Write A Funny Essay For College - AiHow To Write A Funny Essay For College - Ai
How To Write A Funny Essay For College - Ai
 

Recently uploaded

Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPSSpellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
AnaAcapella
 
SURVEY I created for uni project research
SURVEY I created for uni project researchSURVEY I created for uni project research
SURVEY I created for uni project research
CaitlinCummins3
 
Contoh Aksi Nyata Refleksi Diri ( NUR ).pdf
Contoh Aksi Nyata Refleksi Diri ( NUR ).pdfContoh Aksi Nyata Refleksi Diri ( NUR ).pdf
Contoh Aksi Nyata Refleksi Diri ( NUR ).pdf
cupulin
 
MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...
MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...
MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...
MysoreMuleSoftMeetup
 
Personalisation of Education by AI and Big Data - Lourdes Guàrdia
Personalisation of Education by AI and Big Data - Lourdes GuàrdiaPersonalisation of Education by AI and Big Data - Lourdes Guàrdia
Personalisation of Education by AI and Big Data - Lourdes Guàrdia
EADTU
 

Recently uploaded (20)

TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
 
An overview of the various scriptures in Hinduism
An overview of the various scriptures in HinduismAn overview of the various scriptures in Hinduism
An overview of the various scriptures in Hinduism
 
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPSSpellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
 
Trauma-Informed Leadership - Five Practical Principles
Trauma-Informed Leadership - Five Practical PrinciplesTrauma-Informed Leadership - Five Practical Principles
Trauma-Informed Leadership - Five Practical Principles
 
SURVEY I created for uni project research
SURVEY I created for uni project researchSURVEY I created for uni project research
SURVEY I created for uni project research
 
VAMOS CUIDAR DO NOSSO PLANETA! .
VAMOS CUIDAR DO NOSSO PLANETA!                    .VAMOS CUIDAR DO NOSSO PLANETA!                    .
VAMOS CUIDAR DO NOSSO PLANETA! .
 
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
 
Supporting Newcomer Multilingual Learners
Supporting Newcomer  Multilingual LearnersSupporting Newcomer  Multilingual Learners
Supporting Newcomer Multilingual Learners
 
The Liver & Gallbladder (Anatomy & Physiology).pptx
The Liver &  Gallbladder (Anatomy & Physiology).pptxThe Liver &  Gallbladder (Anatomy & Physiology).pptx
The Liver & Gallbladder (Anatomy & Physiology).pptx
 
ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...
ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...
ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...
 
Including Mental Health Support in Project Delivery, 14 May.pdf
Including Mental Health Support in Project Delivery, 14 May.pdfIncluding Mental Health Support in Project Delivery, 14 May.pdf
Including Mental Health Support in Project Delivery, 14 May.pdf
 
Contoh Aksi Nyata Refleksi Diri ( NUR ).pdf
Contoh Aksi Nyata Refleksi Diri ( NUR ).pdfContoh Aksi Nyata Refleksi Diri ( NUR ).pdf
Contoh Aksi Nyata Refleksi Diri ( NUR ).pdf
 
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
 
MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...
MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...
MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...
 
Spring gala 2024 photo slideshow - Celebrating School-Community Partnerships
Spring gala 2024 photo slideshow - Celebrating School-Community PartnershipsSpring gala 2024 photo slideshow - Celebrating School-Community Partnerships
Spring gala 2024 photo slideshow - Celebrating School-Community Partnerships
 
Mattingly "AI & Prompt Design: Named Entity Recognition"
Mattingly "AI & Prompt Design: Named Entity Recognition"Mattingly "AI & Prompt Design: Named Entity Recognition"
Mattingly "AI & Prompt Design: Named Entity Recognition"
 
Personalisation of Education by AI and Big Data - Lourdes Guàrdia
Personalisation of Education by AI and Big Data - Lourdes GuàrdiaPersonalisation of Education by AI and Big Data - Lourdes Guàrdia
Personalisation of Education by AI and Big Data - Lourdes Guàrdia
 
How To Create Editable Tree View in Odoo 17
How To Create Editable Tree View in Odoo 17How To Create Editable Tree View in Odoo 17
How To Create Editable Tree View in Odoo 17
 
ESSENTIAL of (CS/IT/IS) class 07 (Networks)
ESSENTIAL of (CS/IT/IS) class 07 (Networks)ESSENTIAL of (CS/IT/IS) class 07 (Networks)
ESSENTIAL of (CS/IT/IS) class 07 (Networks)
 
AIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.pptAIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.ppt
 

A Systematic Review Paper On Cloud Security

  • 1. CSEIT1835225 | Received : 25 June 2018 | Accepted : 04 July 2018 | July-August-2018 [ 3 (6) : 05-10 ] International Journal of Scientific Research in Computer Science, Engineering and Information Technology © 2018 IJSRCSEIT | Volume 3 | Issue 6 | ISSN : 2456-3307 05 A Systematic Review Paper on Cloud Security Kirti Sharma*, Bharti Nagpal CSE, AIACT & R, GGSIPU, Delhi, India ABSTRACT Cloud computing is a rising method for processing in software engineering. It expands different registering systems like framework figuring, dispersed processing. Today cloud computing is utilized as a part of both mechanical field and scholarly field. Cloud encourages its clients by giving virtual assets by means of web. As the field of cloud computing is spreading the new systems are creating. This expansion in cloud processing condition likewise expands security challenges for cloud engineers. Clients of cloud spare their information in the cloud subsequently the absence of security in cloud can lose the client's trust. This paper presents a systematic review on different cloud security issues with their respective pros and cons and imparting the existing methodologies done by the researchers for cloud security. Keywords : Cloud Security, Saas, Paas, And Iaas, Virtual Assets, Cloud Computing, Hadoop, Cryptography File Systems, HDFS System I. INTRODUCTION Security in conveyed processing is a critical concern. Data in cloud should be secured fit as a fiddle. To bind client from getting to the common data direct, mediator and lender organizations should be used. Cloud computing is an arrangement of assets and administrations that are offered by the system or web. Cloud computing broadens different figuring methods like framework processing, circulated registering. Today cloud computing is utilized as a part of both mechanical field and scholarly field. Cloud encourages its clients by giving virtual assets by means of web. Conveyed registering and limit outfits customers with capacities to store and process their data in untouchable server ranches. Associations utilize the cloud in a wide range of administration models (with acronyms, for example, SaaS, PaaS, and IaaS) and arrangement models (private, public, hybrid, and community). Security concerns related with distributed computing fall into two general classes: security issues looked by cloud suppliers and security issues looked by their clients. The supplier must guarantee that their framework is secure and that their customers information and applications are ensured, while the client must take measures to invigorate their application and utilize solid passwords and validation measures. Cloud security considers mainly two factors better defense as shown in fig. 1 below. Figure 1.Factors of cloud security II. ELEMENTARY STUDY MATERIAL Cloud computing is an arrangement of existing procedures and advances, bundled inside another foundation worldview that offers enhanced adaptability, flexibility, business nimbleness, Factors Security Reliability
  • 2. Volume 3, Issue 6, July-August-2018 | http:// ijsrcseit.com Kirti Sharma et al. Int J S Res CSE & IT. 2018 July-August; 3(6) : 05-10 6 speedier startup time, lessened administration costs, and in the nick of time accessibility of assets. 1. Features:  Use of web based administrations to help business process.  Rent IT-benefits on an utility-like premise. 2. Properties:  Rapid organization  Low startup costs/capital speculations  Costs in view of utilization or membership  Multi-occupant sharing of administrations/assets 3. Basic qualities:  On request self-benefit  Ubiquitous arrangement  Location autonomous asset pooling  Rapid versatility  Measured benefit 4. Cloud models: a. Delivery Models-  SaaS  PaaS  IaaS b. Deployment Models:-  Private cloud  Community cloud  Public cloud  Hybrid cloud III. SURVEY OF CLOUD SECURITY CONCERN A survey as shown in table 1 listing various methodologies that were proposed by various authors via executing different algorithms in previous years. Table includes the pros and cons regarding with each proposed algorithm. TABLE 1 SURVEY OF CLOUD SECURITY CONCERN S.No Year Author Proposed Algorithm(s) Pros Cons 1. 2015 Primoz cigoj [13] SSO(Single Sign On) Approach Unified access point of a management in cloud and a secure strong Authentication. It attempts to remove some vulnerability only. It need more flexible, secure interfaces, control of the user data & privacy and not focusing in the technology development 2. 2015 R.Tamilaras I [14] DIM’s(Data and Image Mechanism) Three-tier Architecture used in partitioning method. Data security, Authentication, confidentiality, prevents data leakage, CSA. Only the suitable data is valid for this mechanism not for all type of data.
  • 3. Volume 3, Issue 6, July-August-2018 | http:// ijsrcseit.com Kirti Sharma et al. Int J S Res CSE & IT. 2018 July-August; 3(6) : 05-10 7 3. 2016 Varsha&D. Mali [15] Cryptographic RBDAC Trust Mechanism. Security for user’s to determine the individual role. For Dynamic decision making trust evaluation is done. 4. 2016 Punam V.Maitri & Aruna Verma [16] LSB Steganography technique combined with AES,RC6,Blowfish & BRA Algorithm Key information security, data integrity, low delay, authentication, confidentiality are considered. Try to accomplish high level security using hybridization of public key cryptography algorithms Not available high level security and this algorithm need 10%- 12% less time respect o the blowfish algorithm. 5. 2016 J.Mahalaksh mi and K.Kuppusa my [17] Security-as-a- Service for files in Cloud Computing An application model is developed that encrypts sensitive data and works well against cryptanalytic attacks Key size is limited and limited parameters are verified. 6. 2017 Malik Irkain [18] Comprehensive classification. Verify data location, assumptions regarding CSP behavior. Addresses only landmark based approaches. 7. 2017 Noelle Rakotondra vony [19] VMI-based Mechanism’s. Invention of target & direction of attacks, providing the statistical analysis of the report. Briefs the issues and lack on solutions. 8. 2017 Rongzhi wang [20] Data Secure Storage based on Tornado Codes (DSBT). Solve the problem of data tampering. It brings series of negative issues, data security issues detection &retrieve in the data availability. 9. 2018  Husna Tariq and Fuzzy keyword Improve information Faced problem while
  • 4. Volume 3, Issue 6, July-August-2018 | http:// ijsrcseit.com Kirti Sharma et al. Int J S Res CSE & IT. 2018 July-August; 3(6) : 05-10 8  Parul Agarwal [21] searching scheme and Coordinated symmetric and asymmetric encryption algorithms security and enhance the security framework and shield sensitive client’s information from unauthorized exposure. decrypting data by utilizing wild card technique. 10. 2017 Iqjot Singh, Prerna Dwivedi, Taru Gupta and P. G. Shynu [22] Hashing on Hadoop in big- data Ensure security while uploading and downloading files. Access files faster and with the help of encryption technology the data stored in the HDFS is safe and secure. Lacks whenever someone become able to crack the security and view the data, moreover for searching a normal file in data in HDFS system 11. 2017  Mauro Storch, César A. F. de Rose [23] Cryptography File Systems (CFS) adoption The model is verified in a real scenario for estimating the total cost when adding security for storage in a cloud environment. It is used to estimate the overhead of a CFS hosting files of an application execution (based on Big Data operations) and the model predictability accuracy was close to 90%. Not accounting the throughput, cache hierarchy and synchronization mechanisms. 12. 2017  Narander Kumar and Priyanka Chaudhary [24] Hashing Approach and Rail Fence Technique Use of bcrypt hashing and rail fence transposition method for password security. It upgrades the security, diminishes the issues Chances of brute force attack.
  • 5. Volume 3, Issue 6, July-August-2018 | http:// ijsrcseit.com Kirti Sharma et al. Int J S Res CSE & IT. 2018 July-August; 3(6) : 05-10 9 of cyber stalking. 13. 2017  Ioram S. Sette, David W. Chadwick and Carlos A. G. Ferraz [25] Accounts with multiple cloud providers Authorization Policy Federations allow policies to be defined and stored in a common ontology in DNF, and managed from a central PAP, named FAPManS. Cannot preserve the semantics of the explicit deny rules. 14. 2018 Mylara Reddy Chinnaiah [26] Fault Tolerant Technique IFrFT(Frequency of Configuration interactions), ChIFrFT (Characteristics & Frequency if interactions). It achieves reliability & fault tolerance of a software system in a cost efficiency and it is better than NOFT Scheme Percentage of successful interactions are low(25 & 40%). 15. 2018 Ahmed Nour Moussa [27] CFaaS Model. Consumers & providers independently collect, verify the equity of forensic analysis resolve collected results. Independently collect, verify the equity of forensic analysis resolve collected results. Suitable forensic analysis is not available for accessing the forensic data directly. IV. CONCLUSION This paper portrays a portion of the cloud ideas, properties and its elementary material. As the cloud computing is dynamic and complex, the conventional security arrangements gave by cloud condition do not delineate to its virtualized surroundings. This paper described a systematic review on different cloud security issues imparting the existing methodologies done by the researchers for cloud security. V. REFERENCES [1] NIST (Authors: P. Mell and T. Grance), "The NIST Definition of Cloud Computing (ver. 15)," National Institute of Standards and Technology, Information Technology Laboratory (October 7 2009).
  • 6. Volume 3, Issue 6, July-August-2018 | http:// ijsrcseit.com Kirti Sharma et al. Int J S Res CSE & IT. 2018 July-August; 3(6) : 05-10 10 [2] J. McDermott, (2009) "Security Requirements for Virtualization in Cloud Computing," presented at the ACSAC Cloud Security Workshop, Honolulu, Hawaii, USA, 2009. [3] Almorsy, Mohamed, John Grundy, and Ingo Müller. "An analysis of the cloud computing security problem." arXiv preprint arXiv:1609.01107 (2016). [4] Kalaiprasath, R., R. Elankavi, and Dr R. Udayakumar. "Cloud. Security and Compliance-A Semantic Approach in End to End Security." International Journal Of Mechanical Engineering And Technology (Ijmet) 8.5 (2017). [5] McGee, Pat. C# 5.0: A Beginner's Guide. McGraw-Hill Education, 2015. [6] slideplayer.com/slide/9476015/ [7] bigdata-madesimple.com/5-advantages-and- disadvantages-of-cloud-storage/ [8] computer.howstuffworks.com/cloud- computing/cloud-storage3.htm [9] fac.ksu.edu.sa/sites/default/files/chapter_6._fun damental_cloud_security.pdf [10] https://www.slideshare.net/InderBarara1/securi ty-issues-and-challenges-in-cloud-computing [11] sciencedirect.com/science/article/pii/S13613723 18300058 [12] https://arxiv.org/ftp/arxiv/papers/1403/1403.562 7.pdf [13] Cigoj, Primož, and Borka Jerman Blažič. "An authentication and authorization solution for a multiplatform cloud environment." Information Security Journal: A Global Perspective 24.4-6 (2015): 146-156. [14] Tamilarasi, R., S. Prabu, and P. Swarnalatha. An Approach for Data and Image Security in Public Cloud using Segmentation and Authentication (CSA) Protocol Suite. MAGNT Research Report 2015. 133-141. [15] VarshaD.Mali,Prof.Pramod Patil,"Authentication and Access Control for Cloud Computing using RBDAC Mechanism", in International Journal of Innovative Research in Computer and Communicationngineering,vol.4,Issue11,Nov20 16,DOI:10.15680/IJIRCCE.2016. [16] Punam V.Maitri ,Aruna verma ,"Secure File Storage in Cloud Computing using Hybrid Cryptography Algorithm",in IEEE explore on WiSNET Conference, Sep 2013,DOI:10.1109/WiSPNET.2016.7566416. [17] J.Mahalakshmi and K.Kuppusamy, "Security- As-A-Service for files in Cloud Computing-A Novel application Model", IEEE Digital Xplore, DOI: 10.1109/ISCO.2016.7726889, November 2016, pp: 1-5, IEEE. [18] Irain, Malik, Jacques Jorda, and Zoubir Mammeri. "Landmark-based data location verification in the cloud: review of approaches and challenges." Journal of Cloud Computing 6.1 (2017): 31. [19] Rakotondravony, Noëlle, and Hans P. Reiser. "Visualizing and Controlling VMI-based malware analysis in IaaS Cloud." Reliable Distributed Systems (SRDS), 2016 IEEE 35th Symposium on. IEEE, 2016. [20] Wang, Rongzhi. "Research on Data Security Technology Based on Cloud Storage." Procedia engineering 174 (2017): 1340-1355. [21] Tariq, Husna, and Parul Agarwal. "Secure keyword search using dual encryption in cloud computing." International Journal of Information Technology: 1-10. [22] Singh, Iqjot, et al. "Enhanced K-means clustering with encryption on cloud." IOP Conference Series: Materials Science and Engineering. Vol. 263. No. 4. IOP Publishing, 2017. [23] Storch, Mauro, and César AF De Rose. "Cloud Storage Cost Modeling for Cryptographic File Systems." Parallel, Distributed and Network- based Processing (PDP), 2017 25th Euromicro International Conference on. IEEE, 2017.
  • 7. Volume 3, Issue 6, July-August-2018 | http:// ijsrcseit.com Kirti Sharma et al. Int J S Res CSE & IT. 2018 July-August; 3(6) : 05-10 11 [24] Kumar, Narander, and Priyanka Chaudhary. "Diminishing Cyber stalking and Cyber bullying Issues using a Hashing Approach and Rail Fence Technique." [25] Sette, Ioram S., David W. Chadwick, and Carlos AG Ferraz. "Authorization Policy Federation in Heterogeneous Multicloud Environments." IEEE Cloud Computing 4.4 (2017): 38-47. [26] Chinnaiah, Mylara Reddy, and Nalini Niranjan. "Fault tolerant software systems using software configurations for cloud computing." Journal of Cloud Computing 7.1 (2018): 3. [27] Moussa, Ahmed Nour, Norafida Ithnin, and Anazida Zainal. "CFaaS: bilaterally agreed evidence collection." Journal of Cloud Computing 7.1 (2018): 1. [28] Attrapadung, Nuttapong; Herranz, Javier; Laguillaumie, Fabien; Libert,Benoît; de Panafieu, Elie; Ràfols, Carla (2012-03-09). "Attribute-based encryption schemes with constant-sizeciphertexts" Computer Science. 22: 15–38. doi:10.1016/j.tcs.2011.12.004. [29] "Cloud Security Front and Center" (http://blogs.forrester.com/srm/2009/11/cloud- security-front-and-center.html). Forrester Research. 2009-11-18. Retrieved 2010-01-25. [30] Wang, Huang He, Yuan, Liu Xiao, Xi, Xu Jing, Min, "Open Identity Management Framework for SaaS Ecosystem," in ICEBE '09. pp. 512-517. [31] Aizat Azmi, Ahmad Amsyar Azman, Sallehuddin Ibrahim, and Mohd Amri Md Yunus, “Techniques In Advancing The Capabilities Of Various Nitrate Detection Methods: A Review”, International Journal on Smart Sensing and Intelligent Systems., VOL. 10, NO. 2, June 2017, pp. 223-261.