Submit Search
Upload
A Comparative Review on Data Security Challenges in Cloud Computing
•
0 likes
•
91 views
IRJET Journal
Follow
https://www.irjet.net/archives/V3/i1/IRJET-V3I157.pdf
Read less
Read more
Engineering
Report
Share
Report
Share
1 of 6
Download now
Download to read offline
Recommended
Security for Effective Data Storage in Multi Clouds
Security for Effective Data Storage in Multi Clouds
Editor IJCATR
Cloud Computing Security Issues
Cloud Computing Security Issues
Stelios Krasadakis
Cloud Security (Domain1- 5)
Cloud Security (Domain1- 5)
Maganathin Veeraragaloo
A Secure Framework for Cloud Computing With Multi-cloud Service Providers
A Secure Framework for Cloud Computing With Multi-cloud Service Providers
iosrjce
Cloud security and services
Cloud security and services
Jas Preet
Cloud security (domain6 10)
Cloud security (domain6 10)
Maganathin Veeraragaloo
Cloud security
Cloud security
Mohamed Shalash
Cloud computing security & forensics (manu)
Cloud computing security & forensics (manu)
ClubHack
Recommended
Security for Effective Data Storage in Multi Clouds
Security for Effective Data Storage in Multi Clouds
Editor IJCATR
Cloud Computing Security Issues
Cloud Computing Security Issues
Stelios Krasadakis
Cloud Security (Domain1- 5)
Cloud Security (Domain1- 5)
Maganathin Veeraragaloo
A Secure Framework for Cloud Computing With Multi-cloud Service Providers
A Secure Framework for Cloud Computing With Multi-cloud Service Providers
iosrjce
Cloud security and services
Cloud security and services
Jas Preet
Cloud security (domain6 10)
Cloud security (domain6 10)
Maganathin Veeraragaloo
Cloud security
Cloud security
Mohamed Shalash
Cloud computing security & forensics (manu)
Cloud computing security & forensics (manu)
ClubHack
Cloud Computing Security Issues
Cloud Computing Security Issues
Discover Cloud Computing
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
Editor IJMTER
Cloud Data Protection for the Masses
Cloud Data Protection for the Masses
IRJET Journal
Ijaprr vol1-1-1-5dr tejinder
Ijaprr vol1-1-1-5dr tejinder
ijaprr_editor
Security Issues in Cloud Computing by rahul abhishek
Security Issues in Cloud Computing by rahul abhishek
Er. rahul abhishek
wp-security-dbsec-cloud-3225125
wp-security-dbsec-cloud-3225125
Gabor Bokor
Cloud Security Issues 1.04.10
Cloud Security Issues 1.04.10
Rugby7277
Security Issues in Cloud Computing by rahul abhishek
Security Issues in Cloud Computing by rahul abhishek
Er. rahul abhishek
Cloud Computing Security
Cloud Computing Security
Dhaval Dave
Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...
eSAT Journals
Enhanced security framework to ensure data security
Enhanced security framework to ensure data security
eSAT Publishing House
Ijaprr vol1-1-1-5dr tejinder
Ijaprr vol1-1-1-5dr tejinder
ijaprr
Security Issues in Cloud Computing
Security Issues in Cloud Computing
Jyotika Pandey
Ad4502189193
Ad4502189193
IJERA Editor
Iaetsd cloud computing and security challenges
Iaetsd cloud computing and security challenges
Iaetsd Iaetsd
Improve HLA based Encryption Process using fixed Size Aggregate Key generation
Improve HLA based Encryption Process using fixed Size Aggregate Key generation
Editor IJMTER
Cloud computing security issues and challenges
Cloud computing security issues and challenges
Dheeraj Negi
Cloud Security - Security Aspects of Cloud Computing
Cloud Security - Security Aspects of Cloud Computing
Jim Geovedi
IRJET- Simultaneous ammunition for the multi-cloud computing simulation
IRJET- Simultaneous ammunition for the multi-cloud computing simulation
IRJET Journal
Presentation on cloud computing security issues using HADOOP and HDFS ARCHITE...
Presentation on cloud computing security issues using HADOOP and HDFS ARCHITE...
Pushpa
How secured and safe is Cloud?
How secured and safe is Cloud?
IRJET Journal
IRJET- An Effective Protection on Content based Retrieval in Cloud Storehouse
IRJET- An Effective Protection on Content based Retrieval in Cloud Storehouse
IRJET Journal
More Related Content
What's hot
Cloud Computing Security Issues
Cloud Computing Security Issues
Discover Cloud Computing
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
Editor IJMTER
Cloud Data Protection for the Masses
Cloud Data Protection for the Masses
IRJET Journal
Ijaprr vol1-1-1-5dr tejinder
Ijaprr vol1-1-1-5dr tejinder
ijaprr_editor
Security Issues in Cloud Computing by rahul abhishek
Security Issues in Cloud Computing by rahul abhishek
Er. rahul abhishek
wp-security-dbsec-cloud-3225125
wp-security-dbsec-cloud-3225125
Gabor Bokor
Cloud Security Issues 1.04.10
Cloud Security Issues 1.04.10
Rugby7277
Security Issues in Cloud Computing by rahul abhishek
Security Issues in Cloud Computing by rahul abhishek
Er. rahul abhishek
Cloud Computing Security
Cloud Computing Security
Dhaval Dave
Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...
eSAT Journals
Enhanced security framework to ensure data security
Enhanced security framework to ensure data security
eSAT Publishing House
Ijaprr vol1-1-1-5dr tejinder
Ijaprr vol1-1-1-5dr tejinder
ijaprr
Security Issues in Cloud Computing
Security Issues in Cloud Computing
Jyotika Pandey
Ad4502189193
Ad4502189193
IJERA Editor
Iaetsd cloud computing and security challenges
Iaetsd cloud computing and security challenges
Iaetsd Iaetsd
Improve HLA based Encryption Process using fixed Size Aggregate Key generation
Improve HLA based Encryption Process using fixed Size Aggregate Key generation
Editor IJMTER
Cloud computing security issues and challenges
Cloud computing security issues and challenges
Dheeraj Negi
Cloud Security - Security Aspects of Cloud Computing
Cloud Security - Security Aspects of Cloud Computing
Jim Geovedi
IRJET- Simultaneous ammunition for the multi-cloud computing simulation
IRJET- Simultaneous ammunition for the multi-cloud computing simulation
IRJET Journal
Presentation on cloud computing security issues using HADOOP and HDFS ARCHITE...
Presentation on cloud computing security issues using HADOOP and HDFS ARCHITE...
Pushpa
What's hot
(20)
Cloud Computing Security Issues
Cloud Computing Security Issues
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
Cloud Data Protection for the Masses
Cloud Data Protection for the Masses
Ijaprr vol1-1-1-5dr tejinder
Ijaprr vol1-1-1-5dr tejinder
Security Issues in Cloud Computing by rahul abhishek
Security Issues in Cloud Computing by rahul abhishek
wp-security-dbsec-cloud-3225125
wp-security-dbsec-cloud-3225125
Cloud Security Issues 1.04.10
Cloud Security Issues 1.04.10
Security Issues in Cloud Computing by rahul abhishek
Security Issues in Cloud Computing by rahul abhishek
Cloud Computing Security
Cloud Computing Security
Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security
Enhanced security framework to ensure data security
Ijaprr vol1-1-1-5dr tejinder
Ijaprr vol1-1-1-5dr tejinder
Security Issues in Cloud Computing
Security Issues in Cloud Computing
Ad4502189193
Ad4502189193
Iaetsd cloud computing and security challenges
Iaetsd cloud computing and security challenges
Improve HLA based Encryption Process using fixed Size Aggregate Key generation
Improve HLA based Encryption Process using fixed Size Aggregate Key generation
Cloud computing security issues and challenges
Cloud computing security issues and challenges
Cloud Security - Security Aspects of Cloud Computing
Cloud Security - Security Aspects of Cloud Computing
IRJET- Simultaneous ammunition for the multi-cloud computing simulation
IRJET- Simultaneous ammunition for the multi-cloud computing simulation
Presentation on cloud computing security issues using HADOOP and HDFS ARCHITE...
Presentation on cloud computing security issues using HADOOP and HDFS ARCHITE...
Similar to A Comparative Review on Data Security Challenges in Cloud Computing
How secured and safe is Cloud?
How secured and safe is Cloud?
IRJET Journal
IRJET- An Effective Protection on Content based Retrieval in Cloud Storehouse
IRJET- An Effective Protection on Content based Retrieval in Cloud Storehouse
IRJET Journal
Security Issues’ in Cloud Computing and its Solutions.
Security Issues’ in Cloud Computing and its Solutions.
IJCERT JOURNAL
IRJET- A Survey on SaaS-Attacks and Digital Forensic
IRJET- A Survey on SaaS-Attacks and Digital Forensic
IRJET Journal
Security threat issues and countermeasures in cloud computing
Security threat issues and countermeasures in cloud computing
Jahangeer Qadiree
IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...
IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...
IRJET Journal
IRJET - Multitenancy using Cloud Computing Features
IRJET - Multitenancy using Cloud Computing Features
IRJET Journal
Ijirsm ashok-kumar-h-problems-and-solutions-infrastructure-as-service-securit...
Ijirsm ashok-kumar-h-problems-and-solutions-infrastructure-as-service-securit...
IJIR JOURNALS IJIRUSA
Cloud computing seminar report
Cloud computing seminar report
shafzonly
A Novel Computing Paradigm for Data Protection in Cloud Computing
A Novel Computing Paradigm for Data Protection in Cloud Computing
IJMER
IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...
IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...
IRJET Journal
SecSecuring Software as a Service Model of Cloud Computing: Issues and Solutions
SecSecuring Software as a Service Model of Cloud Computing: Issues and Solutions
ijccsa
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
IJNSA Journal
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
IJNSA Journal
Cloud computing security through symmetric cipher model
Cloud computing security through symmetric cipher model
ijcsit
A Review on Data Protection of Cloud Computing Security, Benefits, Risks and ...
A Review on Data Protection of Cloud Computing Security, Benefits, Risks and ...
United International Journal for Research & Technology
Cloud computing
Cloud computing
Dulith Kasun
Enhanced Integrity Preserving Homomorphic Scheme for Cloud Storage
Enhanced Integrity Preserving Homomorphic Scheme for Cloud Storage
IRJET Journal
SECURITY ISSUES IN CLOUD COMPUTING
SECURITY ISSUES IN CLOUD COMPUTING
International Journal of Technical Research & Application
Security of Data in Cloud Environment Using DPaaS
Security of Data in Cloud Environment Using DPaaS
IJMER
Similar to A Comparative Review on Data Security Challenges in Cloud Computing
(20)
How secured and safe is Cloud?
How secured and safe is Cloud?
IRJET- An Effective Protection on Content based Retrieval in Cloud Storehouse
IRJET- An Effective Protection on Content based Retrieval in Cloud Storehouse
Security Issues’ in Cloud Computing and its Solutions.
Security Issues’ in Cloud Computing and its Solutions.
IRJET- A Survey on SaaS-Attacks and Digital Forensic
IRJET- A Survey on SaaS-Attacks and Digital Forensic
Security threat issues and countermeasures in cloud computing
Security threat issues and countermeasures in cloud computing
IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...
IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...
IRJET - Multitenancy using Cloud Computing Features
IRJET - Multitenancy using Cloud Computing Features
Ijirsm ashok-kumar-h-problems-and-solutions-infrastructure-as-service-securit...
Ijirsm ashok-kumar-h-problems-and-solutions-infrastructure-as-service-securit...
Cloud computing seminar report
Cloud computing seminar report
A Novel Computing Paradigm for Data Protection in Cloud Computing
A Novel Computing Paradigm for Data Protection in Cloud Computing
IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...
IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...
SecSecuring Software as a Service Model of Cloud Computing: Issues and Solutions
SecSecuring Software as a Service Model of Cloud Computing: Issues and Solutions
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
Cloud computing security through symmetric cipher model
Cloud computing security through symmetric cipher model
A Review on Data Protection of Cloud Computing Security, Benefits, Risks and ...
A Review on Data Protection of Cloud Computing Security, Benefits, Risks and ...
Cloud computing
Cloud computing
Enhanced Integrity Preserving Homomorphic Scheme for Cloud Storage
Enhanced Integrity Preserving Homomorphic Scheme for Cloud Storage
SECURITY ISSUES IN CLOUD COMPUTING
SECURITY ISSUES IN CLOUD COMPUTING
Security of Data in Cloud Environment Using DPaaS
Security of Data in Cloud Environment Using DPaaS
More from IRJET Journal
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
React based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
More from IRJET Journal
(20)
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
React based fullstack edtech web application
React based fullstack edtech web application
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Recently uploaded
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
Dr SOUNDIRARAJ N
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
NikhilNagaraju
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
Asst.prof M.Gokilavani
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Anamika Sarkar
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
britheesh05
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
DeepakSakkari2
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
null - The Open Security Community
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
rehmti665
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECH
C Sai Kiran
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
PoojaBan
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
wendy cai
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
RajaP95
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
ssuser7cb4ff
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
jennyeacort
EduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AI
koyaldeepu123
Effects of rheological properties on mixing
Effects of rheological properties on mixing
viprabot1
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting .
Satyam Kumar
Past, Present and Future of Generative AI
Past, Present and Future of Generative AI
abhishek36461
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
João Esperancinha
Recently uploaded
(20)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECH
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
EduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AI
Effects of rheological properties on mixing
Effects of rheological properties on mixing
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting .
Past, Present and Future of Generative AI
Past, Present and Future of Generative AI
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
A Comparative Review on Data Security Challenges in Cloud Computing
1.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 03 Issue: 01 | Jan-2016 www.irjet.net p-ISSN: 2395-0072 © 2016, IRJET ISO 9001:2008 Certified Journal Page 334 A Comparative Review on Data Security Challenges in Cloud Computing Manpreet Kaur1, Kiranbir Kaur2 1 M.Tech Scholar, Computer Engineering and Technology Department, Guru Nanak Dev University, Punjab, India 2 Asst Prof, Computer Engineering and Technology Department, Guru Nanak Dev University, Punjab, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - Cloud computing is a model which provides on-demand delivery of Information Technology (IT) related capabilities or resources through the Internet to the outside world. Despite the advantages of cloud computing, the security of the data and resources is still doubtful which affect the cloud adoption. The raising amount of personal and confidential data brings up attention on storing the data securely. Data can be composed of financial transactions, vital documents, and multimedia contents. Implementation of cloud computing services may minimize local storage trust in addition decrease operational and maintenance costs. However, the users still have major privacy and security concerns about their data stored on remote servers due to potential unauthorized access among the service providers. So, these concerns bring focus on security issues related to cloud computing which is the reason why most of the industries still not adopting cloud server for the storage of their critical data. Cloud computing does not provide transparency to users to view where their data is being stored and users have to trust the service provider for handling and maintaining their data. Also, it does not provide users to access the audit logs because many users are sharing the same cloud server so audit activity of one tenant might constitute a transparency for another tenant. In this paper, the extreme focus is given to the security challenges related with cloud’s service models, deployment models, and issues related to networking capabilities are discussed and studied. In addition, the existing symmetric and asymmetric encryption algorithms utilized to render security in cloud computing environment are reviewed. Furthermore, the comparative analysis of different encryption algorithms based upon few parameters is also been performed. Key Words: Cloud Computing, Cloud Security Challenges, Encryption Algorithms. 1. INTRODUCTION Cloud computing is a model that enables the development, deployment and delivery of products and services to the customers with a pay-as-you-go model. It is a service model that involves the idea of storing and accessing the resources over the Internet rather than storing them on- premise. Basically, cloud computing has motivated academia, industry, businesses to take over this technology to host their applications on the cloud so as to cut-off the cost of buying the on-premise local server. As per Gartner survey [14], the cloud market is anticipated to rise from $76.9B in 2010 to $210B in 2016. These revenues connote that it is a promising platform. Types of Service models provided by cloud are described below: Software as a service (SaaS): SaaS is a software delivery model that provides access to software and its functions operating on a remote cloud infrastructure offered by cloud providers. Salesforce.com offering in the customer relationship management (CRM) space was the innovator to provide software as a service. Other examples include online word processing and spreadsheet tools, Gmail, WhatsApp, and SAP. Platform as a service (PaaS): PaaS provides the framework for deploying and delivering of applications and services. It allows developers to develop new applications without any pressure of buying expensive tools and managing the local servers. Examples include Hadoop, Microsoft Azure, Force.com, and Google App engine. Infrastructure as service (IaaS): IaaS provides the infrastructure such as network, memory, storage, processor to the users on demand. Examples include Amazon EC2, Windows Live Skydrive, and Rackspace Cloud. Deployment models identified for cloud architecture are described below: Public Cloud – The pubic cloud refers to sharing of computing infrastructure by many customers and they have no control and visibility over the computing resources where infrastructure is hosted.
2.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 03 Issue: 01 | Jan-2016 www.irjet.net p-ISSN: 2395-0072 © 2016, IRJET ISO 9001:2008 Certified Journal Page 335 Private Cloud – The private cloud does not share infrastructure with other organizations and dedicate to the particular organization. In terms of security and cost, a private cloud exceeds public clouds. Hybrid cloud – The hybrid cloud makes usage of both of the clouds discussed above. Organizations may host less critical data on the public cloud and confidential data on the private cloud. Community Cloud - The community cloud is used where several organizations share the similar infrastructures. It may exist on premise or off premise. Now the question arises, if cloud computing is so powerful, why isn’t everyone adopting it? In the cloud, the clients don’t have knowledge about what’s happening inside. In addition to this, even if the cloud provider is honest, it can have eavesdropper who can fiddle with the VMs and defiles confidentiality and integrity. Clouds are still susceptible to data confidentiality, integrity, availability, privacy issues plus some internal and external attacks. This paper primarily aims to give an insight to cloud consumers and providers about various security challenges and how they can tackle these challenges through encryption algorithms. The comparative analysis of various encryption algorithms is also presented. This paper is arranged as follows. Section II explores the security challenges in cloud computing. Section III introduces related work for further reading. In section IV, we explore the comparative analysis of existing encryption algorithms. Finally section V, concludes this paper. 2. SECURITY CHALLENGES IN CLOUD COMPUTING Security is the important aspect for many organizations for cloud adoption. Confidentiality, authentication, integrity, non-repudiation and availability for client’s systems are the general principles of security. Access control is another important factor for security. There are lots of security threats to cloud computing. A single flaw in one client application could allow a malicious hacker to acquire access to more than one client’s data. This problem is known as data breaches. The data loss is another issue that happens when the unauthorized user may delete or alter the entire records in the cloud if there is the vulnerability in cloud provider side. Insecure APIs and weak interfaces are another common security challenges in cloud computing. When confidential data is stored in it, the extreme focus should be given to the security of the cloud. Figure 1 shows the hierarchy of various security challenges in cloud computing. Generally, three types of deployment model are further classified as Public, Private and Hybrid and the security issues related to these models have been discussed. In the same way, the service model is categorized further as IaaS, PaaS, and SaaS stating its security issues in common. At last, the network related issues are discussed. 2.1 Security challenges in deployment models To raise the facility of access in the organizations assorted users and departments across the organization allow sharing of assorted resources but alas lead to data breach problem. Cloning leads to the problem of data leakage concealing the machine’s authenticity. Basically, the cloning deals with duplicating and replicating the data. Resource Pooling refers to the unauthorized access because of sharing through the same network. Furthermore, in a shared multi-tenant environment when any user consumes some unequal amount of resources then some resource contention issues might occur. Authentication and Identity Management is one of the another big issue associated with deployment models in cloud-based systems. 2.2 Security challenges in service models Typically the web browser is used for delivering applications in SaaS to cloud consumer. Since intruders are using the web to do malicious activities. So, there is a threat to data because the issues like data leakage, malicious attacks and in the case of disaster backup and storage can lead to unauthorized access of sensitive data. PaaS inherits security issues related to third-party web services. In the case of PaaS, the developers use the platform provided by cloud providers for deployment of the secure applications that can be hosted on the cloud and these PaaS applications should be upgraded frequently. This in turns affects security. Privacy and security can also be threatened because data may be stored in different locations with different legal authorities. So, the developer must be aware of legal issues related to data to ensure that data is stored in apropos locations. Service Hijacking is also considered to be as one of the topmost threat in which an unauthorized user gains an illegal access on certain authorized service. Generally in IaaS, computer hardware is provided to the consumer which can be threatened by physical attacks and there can be a lack of data security on replaced or repaired storage devices. 2.3 Network related security challenges Cloud computing principally depends on servers, the internet and remote computers in managing, storing and
3.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 03 Issue: 01 | Jan-2016 www.irjet.net p-ISSN: 2395-0072 © 2016, IRJET ISO 9001:2008 Certified Journal Page 336 Fig -1: Classification of Security Challenges [12] maintaining data. Therefore, the security issues associated with the network are of the prime concern. It provides on- Demand access to the high-speed data transmission rate, application, software, and resources to the users. But apart from this, the network infrastructure also faces various attacks and security challenges which are listed in the above diagram. 3. RELATED WORKS L. Tawalbeh, N.S. Darwazeh, R.S. Al-Qassas and F. AlDosari (2015) [1], proposed an efficient cloud storage model that provides confidentiality and integrity through data classification and minimizes the complexity and processing time needed to encrypt the data by applying TLS, AES and SHA security mechanism based on the type of classified data. They tested the proposed model with assorted encryption algorithms, and their simulation results showed the efficiency and reliability. This paper is established on the idea of manual classification of data and not the automatic classification and other encryption algorithms such as RSA, Elliptic curve cryptography, and asymmetric public key can be used to provide the higher level of security and confidentiality. N. Sengupta and R. Chinnasamy (2015) [2], designed an encryption algorithm Hybrid DESCAST to provide the security to the massive amount of data sent through the internet. Through proposed algorithm, they tackled the limitations of both DES and CAST Block Cipher Algorithm and analyzed that the computation time and complexity for encryption and decryption is higher than the respective DES and CAST algorithm. In addition to this, they concluded that combining 128-bit key and 64-bit key cipher algorithms, the brute-force attack and attacks via birthday problems were averted and the algorithm is more robust. S.K. Sood (2013) [9], proposed a security model that keeps the most confidential and critical data on the private cloud and rest of it on the public cloud and for checking the integrity of the data at the public cloud this model uses the hash codes. He proposed cloud security model that associates a role to each user and stores the role of the user in the database for user authorization process and operations can be performed by the user with respect to their roles. Also, for security purpose, this model uses dual verification scheme for key authentication on one layer and user authentication by using username and password on another layer. A cryptographic process is proposed for keeping data secure on the cloud. He analyzed the model against various types of attacks. This model is compared with various existing cloud security frameworks and the simulation results showed that this technique is much more robust, efficient and faster than other existing models. Furthermore, this model is efficient in terms of cost because it stores highly sensitive data on the private cloud and less critical data on the public cloud, where storage cost of data is relatively very less.
4.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 03 Issue: 01 | Jan-2016 www.irjet.net p-ISSN: 2395-0072 © 2016, IRJET ISO 9001:2008 Certified Journal Page 337 J.J. Hwang, Taoyuan, Taiwan, Y.C. Hsu and C.H. Wu (2011) [4], has proposed a data security model using encryption and decryption algorithms. The model used such a mechanism that the cloud service provider can perform storage and encryption/decryption tasks. The drawback of this method is that the user or data owner has no control of data. J. Lai, R. H. Deng, C. Guan and J. Weng (2013) [5], proposed an Attribute-Based Encryption (ABE) and decryption method in the cloud-based system to provide data security. They have been designed such a decryption algorithm which is based on the user-requested attributes of the outsourced encrypted data. The limitation of this method is that it emphasis more computational and storage overhead on cloud service provider for checking the user attributes with the outsourced encrypted data. Although these overheads of the cloud server can be minimized by introducing third party auditor. F. Moghaddam F, Karimi O and Alrashdan M T (2013) [6], reviewed the comparative analysis of six different symmetric key cryptographic algorithms in a cloud-based environment. They proposed two sorts of cloud servers; that is cloud and data servers. The limitation of this method is that it creates storage and computation overheads of maintaining two separate servers. W. Liu (2012) [7], discussed the security problems in cloud computing, strategies to combat security problems and demonstrated various cloud perimeters. He analyzed that the service availability and data privacy in the cloud- based systems are of the primal concern in security and through comparative analysis he judged that security problem cannot be tackled through single security method and many conventional and recent technologies and strategies must be needed for protecting the cloud-based systems. A. Behl and K. Behl (2012) [8], investigated the security challenges based on the four views such as cloud architecture view, delivery model view, characteristics view, and the stakeholder view. They investigated few solutions through which the dynamic cloud model can be secured. They discovered that how the existing issues exist in nowadays cloud model owing to confidentiality and integrity loss, SLA issues, elasticity, multi-tenancy, insecure management and cloud federation implications. Ryan K L Ko et al. (2011) [9], presented the model known as Trust Cloud, which addressed the accountability in cloud computing through the use of five abstraction layer architecture. They also discussed issues which were encountered in accomplishing a trusted cloud. They have proposed detective instead of preventive approaches for raising accountability since later complement the former. J.K. Wang and X. Jia (2012) [10], described several methods to secure user data such as authentication interface, single encryption, and multi-level virtualization. The other main topic of their paper is Authentication intercloud based on CA and PKI model. G L Prakash, Dr. M. Prateek and Dr. I. Singh (2014) [11], proposed an efficient data encryption and decryption using 256 bit symmetric key with rotation for securing the highly critical remote data in cloud paradigm. They conducted an experiment on the variable size text files repository and it showed that the proposed method is superior to existing methods. Also, they introduced the mechanism for securing the cloud server from unauthorized users. In addition, they have also demonstrated the performance analysis of encryption and decryption algorithms. 4. EXISTING ENCRYPTION ALGORITHMS FOR CLOUD SECURITY Cryptography is the one of the technique of the modern network security technologies that enables us to send secure data over an insecure channel and to protect valuable data on the internet, extranet, and the intranets. Encryption algorithms play a vital role for providing the secure transmission for sending and retrieving the data over the networks. It converts the letter to create a coded message, traditionally called as the cipher, which is used to convert a readable data called plaintext into scrambled, unreadable message called ciphertext. This conversion process makes the use of key (private key or public key) and authorized user can only decrypt the cipher text back to plain text. Basically, there are two methods for carrying out this process which are Symmetric key and asymmetric key encryption. The former make use of one key and the latter uses both keys for encrypting and decrypting the data. DES was the primary encoding normal to be counseled by National Institute of Standards and Technology. Several attacks and ways have witnessed weaknesses of DES that created it associate unsafe block cipher. Triple DES systems are more secure and slower than single DES. AES is stronger and faster than triple-DES. Blowfish is a block cipher algorithm which uses the variable length key. Blowfish is superior in performance and processing time. RC5 is a variable length, byte-oriented stream cipher. It is widely used for web SSL/TLS, wireless WEP. RSA is slower than certain other symmetric cryptosystems. It is the secure algorithm whose security depends on the process of factoring massive integers. DSA uses exponentiation in a finite and based on the difficulty of computing discrete logarithms. Diffie-Hellman is secret key exchange method. The algorithm uses a one-way function that is easy to encrypt and hard or difficult to
5.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 03 Issue: 01 | Jan-2016 www.irjet.net p-ISSN: 2395-0072 © 2016, IRJET ISO 9001:2008 Certified Journal Page 338 decrypt. The limitation of this algorithm is the lack of authentication. 5. COMPARATIVE ANALYSIS OF VARIOUS ENCRYPTION ALGORITHMS Table -1: Comparative Analysis of Algorithms 6. CONCLUSIONS Today, cloud computing is the technology being talked across industries due to its efficiency, the flexibility of resources, pay-per-use model, dynamic scalability, faster time-to-market, increased collaboration and cost efficiency. Despite its advantages, many organizations are still not adopting it because of security reasons associated with it. This paper analyzes the problem of security
6.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 03 Issue: 01 | Jan-2016 www.irjet.net p-ISSN: 2395-0072 © 2016, IRJET ISO 9001:2008 Certified Journal Page 339 associated with cloud. Encryption is the foremost option for securing the data and this paper highlights comparative analysis of symmetric as well as asymmetric encryption algorithms for providing security in cloud computing systems. REFERENCES [1] L. Tawalbeh, N.S. Darwazeh, R.S. Al-Qassas and F. AlDosari. ’A secure cloud computing model based on data classification.’ Elsevier, pp 1153-1158, 2015. [2] N. Sengupta and R. Chinnasamy. ‘Contriving hybrid DESCAST algorithm for cloud security.’ Elsevier, pp 47-56, 2015. [3] S.K. Sood. ‘Hybrid data security model for cloud.’ International Journal of Cloud Applications and Computing, pp 50-59, 2013. [4] J.J. Hwang, Taoyuan, Taiwan, Y.C. Hsu and C.H. Wu. ‘A Business Model for Cloud Computing Based on a Separate Encryption and Decryption Service.’ International Conference on Information Science and Applications (ICISA), pp 1-7, 2011. [5] J. Lai, R H Deng, C. Guan and J. Weng. ‘Attribute-Based Encryption with Verifiable Outsourced Decryption.’ IEEE Trans. Inf. Forens. Security, vol 8, pp 1343-1354, 2013. [6] F. Moghaddam F, Karimi O and Alrashdan M T. ‘A Comparative Study of Applying Real-Time Encryption in Cloud Computing Environments.’ Proceedings IEEE 2nd International Conference on Cloud Networking (CloudNet), San Francisco, USA, pp 185-189, 2013. [7] W. Liu. ‘Research on cloud computing security problem and strategy.’ IEEE, pp 1216-1219, 2012. [8] A. Behl and K. Behl. ‘An analysis of cloud computing security issues.’ IEEE World Congress on Information and Communication Technologies, pp 109-114, 2012. [9] Ryan K L Ko et al.. ‘Trustcloud: a framework for accountability and trust in cloud computing.’ IEEE World Congress on Services, pp 584-588, 2011. [10] J.K. Wang and X. Jia. ‘Data security and authentication in hybrid cloud computing model.’ IEEE Global High Tech Congress on Electronics, pp 117- 120, 2012. [11] Prakash G L, DR. M. Prateek and Dr. I. Singh, ‘Data encryption and decryption algorithms using key rotations for data security in cloud system.’ IEEE, 2014. [12] Ms. Disha H. Parekh and Dr. R. Sridaran. ‘An Analysis of Security Challenges in Cloud Computing.’ International Journal of Advanced Computer Science and Applications, Vol 4, pp 38-46, 2013. [13] R. Buyya, J. Broberg and A. Gosscinnski. ‘Cloud computing.’ Hoboken, N.J.: Wiley; 2011. [14] L. Columbus, 'Forbes / Tech', Forbes.com, 2013. [Online].Available: http://www.forbes.com/sites/louiscolumbus/2013/ 02/19/gartner-predicts-infrastructure-services-will- accelerate-cloud-computing-growth/. BIOGRAPHIES Manpreet Kaur pursuing M. Tech in Computer Science & Engineering from Department of Computer Engineering & Technology, Guru Nanak Dev University, Amritsar, Punjab, India. Her research interests include Cloud Computing. Ms. Kiranbir Kaur is working as a professor in the Department of Computer Engineering & Technology, GNDU, Amritsar, Punjab, India. She has published many research articles in the National/International conferences. Her research interests include Cloud Computing.
Download now