Submit Search
Upload
Analysis of Cloud Computing Security Concerns and Methodologies
•
0 likes
•
8 views
IRJET Journal
Follow
https://www.irjet.net/archives/V10/i6/IRJET-V10I649.pdf
Read less
Read more
Engineering
Report
Share
Report
Share
1 of 7
Download now
Download to read offline
Recommended
IRJET- Two ways Verification for Securing Cloud Data
IRJET- Two ways Verification for Securing Cloud Data
IRJET Journal
Security Issues’ in Cloud Computing and its Solutions.
Security Issues’ in Cloud Computing and its Solutions.
IJCERT JOURNAL
IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...
IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...
IRJET Journal
IRJET- Model-Driven Platform for Service Security and Framework for Data ...
IRJET- Model-Driven Platform for Service Security and Framework for Data ...
IRJET Journal
Comparison of data security in grid and cloud
Comparison of data security in grid and cloud
eSAT Publishing House
IRJET- Secure Database Management and Privacy Preserving in Cloud Server
IRJET- Secure Database Management and Privacy Preserving in Cloud Server
IRJET Journal
Comparison of data security in grid and cloud computing
Comparison of data security in grid and cloud computing
eSAT Journals
Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...
eSAT Journals
Recommended
IRJET- Two ways Verification for Securing Cloud Data
IRJET- Two ways Verification for Securing Cloud Data
IRJET Journal
Security Issues’ in Cloud Computing and its Solutions.
Security Issues’ in Cloud Computing and its Solutions.
IJCERT JOURNAL
IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...
IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...
IRJET Journal
IRJET- Model-Driven Platform for Service Security and Framework for Data ...
IRJET- Model-Driven Platform for Service Security and Framework for Data ...
IRJET Journal
Comparison of data security in grid and cloud
Comparison of data security in grid and cloud
eSAT Publishing House
IRJET- Secure Database Management and Privacy Preserving in Cloud Server
IRJET- Secure Database Management and Privacy Preserving in Cloud Server
IRJET Journal
Comparison of data security in grid and cloud computing
Comparison of data security in grid and cloud computing
eSAT Journals
Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...
eSAT Journals
Enhanced security framework to ensure data security
Enhanced security framework to ensure data security
eSAT Publishing House
IRJET- Secure Cloud Data Using Attribute Based Encryption
IRJET- Secure Cloud Data Using Attribute Based Encryption
IRJET Journal
Security Issues in Cloud Computing - A Review
Security Issues in Cloud Computing - A Review
Eswar Publications
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET Journal
IRJET-Auditing and Resisting Key Exposure on Cloud Storage
IRJET-Auditing and Resisting Key Exposure on Cloud Storage
IRJET Journal
APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...
APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...
IJCNCJournal
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...
IRJET Journal
Comprehensive Study on Deployment Models and Service Models in Cloud Computing.
Comprehensive Study on Deployment Models and Service Models in Cloud Computing.
IRJET Journal
Proposed system for data security in distributed computing in using triple d...
Proposed system for data security in distributed computing in using triple d...
IJECEIAES
Data Security Approach in Cloud computing using SHA
Data Security Approach in Cloud computing using SHA
IRJET Journal
IRJET- SAAS Attacks Defense Mechanisms and Digital Forensic
IRJET- SAAS Attacks Defense Mechanisms and Digital Forensic
IRJET Journal
IRJET- Simultaneous ammunition for the multi-cloud computing simulation
IRJET- Simultaneous ammunition for the multi-cloud computing simulation
IRJET Journal
Maintaining Secure Cloud by Continuous Auditing
Maintaining Secure Cloud by Continuous Auditing
ijtsrd
DATA STORAGE SECURITY CHALLENGES IN CLOUD COMPUTING
DATA STORAGE SECURITY CHALLENGES IN CLOUD COMPUTING
ijsptm
A Trusted TPA Model, to Improve Security & Reliability for Cloud Storage
A Trusted TPA Model, to Improve Security & Reliability for Cloud Storage
IRJET Journal
IRJET- Security Concern: Analysis of Cloud Security Mechanism
IRJET- Security Concern: Analysis of Cloud Security Mechanism
IRJET Journal
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
IRJET Journal
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET Journal
Security Issues in Cloud Computing Solution of DDOS and Introducing Two-Tier ...
Security Issues in Cloud Computing Solution of DDOS and Introducing Two-Tier ...
ijccsa
IRJET- A Survey on SaaS-Attacks and Digital Forensic
IRJET- A Survey on SaaS-Attacks and Digital Forensic
IRJET Journal
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
More Related Content
Similar to Analysis of Cloud Computing Security Concerns and Methodologies
Enhanced security framework to ensure data security
Enhanced security framework to ensure data security
eSAT Publishing House
IRJET- Secure Cloud Data Using Attribute Based Encryption
IRJET- Secure Cloud Data Using Attribute Based Encryption
IRJET Journal
Security Issues in Cloud Computing - A Review
Security Issues in Cloud Computing - A Review
Eswar Publications
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET Journal
IRJET-Auditing and Resisting Key Exposure on Cloud Storage
IRJET-Auditing and Resisting Key Exposure on Cloud Storage
IRJET Journal
APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...
APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...
IJCNCJournal
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...
IRJET Journal
Comprehensive Study on Deployment Models and Service Models in Cloud Computing.
Comprehensive Study on Deployment Models and Service Models in Cloud Computing.
IRJET Journal
Proposed system for data security in distributed computing in using triple d...
Proposed system for data security in distributed computing in using triple d...
IJECEIAES
Data Security Approach in Cloud computing using SHA
Data Security Approach in Cloud computing using SHA
IRJET Journal
IRJET- SAAS Attacks Defense Mechanisms and Digital Forensic
IRJET- SAAS Attacks Defense Mechanisms and Digital Forensic
IRJET Journal
IRJET- Simultaneous ammunition for the multi-cloud computing simulation
IRJET- Simultaneous ammunition for the multi-cloud computing simulation
IRJET Journal
Maintaining Secure Cloud by Continuous Auditing
Maintaining Secure Cloud by Continuous Auditing
ijtsrd
DATA STORAGE SECURITY CHALLENGES IN CLOUD COMPUTING
DATA STORAGE SECURITY CHALLENGES IN CLOUD COMPUTING
ijsptm
A Trusted TPA Model, to Improve Security & Reliability for Cloud Storage
A Trusted TPA Model, to Improve Security & Reliability for Cloud Storage
IRJET Journal
IRJET- Security Concern: Analysis of Cloud Security Mechanism
IRJET- Security Concern: Analysis of Cloud Security Mechanism
IRJET Journal
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
IRJET Journal
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET Journal
Security Issues in Cloud Computing Solution of DDOS and Introducing Two-Tier ...
Security Issues in Cloud Computing Solution of DDOS and Introducing Two-Tier ...
ijccsa
IRJET- A Survey on SaaS-Attacks and Digital Forensic
IRJET- A Survey on SaaS-Attacks and Digital Forensic
IRJET Journal
Similar to Analysis of Cloud Computing Security Concerns and Methodologies
(20)
Enhanced security framework to ensure data security
Enhanced security framework to ensure data security
IRJET- Secure Cloud Data Using Attribute Based Encryption
IRJET- Secure Cloud Data Using Attribute Based Encryption
Security Issues in Cloud Computing - A Review
Security Issues in Cloud Computing - A Review
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET-Auditing and Resisting Key Exposure on Cloud Storage
IRJET-Auditing and Resisting Key Exposure on Cloud Storage
APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...
APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...
Comprehensive Study on Deployment Models and Service Models in Cloud Computing.
Comprehensive Study on Deployment Models and Service Models in Cloud Computing.
Proposed system for data security in distributed computing in using triple d...
Proposed system for data security in distributed computing in using triple d...
Data Security Approach in Cloud computing using SHA
Data Security Approach in Cloud computing using SHA
IRJET- SAAS Attacks Defense Mechanisms and Digital Forensic
IRJET- SAAS Attacks Defense Mechanisms and Digital Forensic
IRJET- Simultaneous ammunition for the multi-cloud computing simulation
IRJET- Simultaneous ammunition for the multi-cloud computing simulation
Maintaining Secure Cloud by Continuous Auditing
Maintaining Secure Cloud by Continuous Auditing
DATA STORAGE SECURITY CHALLENGES IN CLOUD COMPUTING
DATA STORAGE SECURITY CHALLENGES IN CLOUD COMPUTING
A Trusted TPA Model, to Improve Security & Reliability for Cloud Storage
A Trusted TPA Model, to Improve Security & Reliability for Cloud Storage
IRJET- Security Concern: Analysis of Cloud Security Mechanism
IRJET- Security Concern: Analysis of Cloud Security Mechanism
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
Security Issues in Cloud Computing Solution of DDOS and Introducing Two-Tier ...
Security Issues in Cloud Computing Solution of DDOS and Introducing Two-Tier ...
IRJET- A Survey on SaaS-Attacks and Digital Forensic
IRJET- A Survey on SaaS-Attacks and Digital Forensic
More from IRJET Journal
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
React based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
More from IRJET Journal
(20)
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
React based fullstack edtech web application
React based fullstack edtech web application
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Recently uploaded
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
ssuser7cb4ff
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
null - The Open Security Community
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Anamika Sarkar
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
Soham Mondal
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
britheesh05
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
jennyeacort
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...
asadnawaz62
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
KurinjimalarL3
Design and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdf
Tagore Institute of Engineering And Technology
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
RajaP95
power system scada applications and uses
power system scada applications and uses
DevarapalliHaritha
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Low Rate Call Girls In Saket, Delhi NCR
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting .
Satyam Kumar
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
Suhani Kapoor
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
9953056974 Low Rate Call Girls In Saket, Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
9953056974 Low Rate Call Girls In Saket, Delhi NCR
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
João Esperancinha
Past, Present and Future of Generative AI
Past, Present and Future of Generative AI
abhishek36461
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptx
KartikeyaDwivedi3
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
srsj9000
Recently uploaded
(20)
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
Design and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdf
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
power system scada applications and uses
power system scada applications and uses
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting .
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Past, Present and Future of Generative AI
Past, Present and Future of Generative AI
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptx
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Analysis of Cloud Computing Security Concerns and Methodologies
1.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 10 Issue: 06 | Jun 2023 www.irjet.net p-ISSN: 2395-0072 © 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 322 Analysis of Cloud Computing Security Concerns and Methodologies Ms. Neetu1, Mr. Varun Kumar Singh2 ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - Utilizing a network of remote computers maintained on the internet to store, manage, andanalysedata on demand and on a compensation, basis is the technique of cloud computing. It allows access to a common pool of resources rather than local servers or individual PCs. Asitdoes not acquire the objects physically, it saves businesses timeand money on management. Cloud computing is a connectivity technology in which client data is kept and managed in the data centre of a cloud service provider such as Google, Amazon, Microsoft, etc. Cloud computing is an emerging field that is recognised globally. Thereare certainsecurityconcerns while utilising cloud-based services. This research paper examines the fundamentals of cloud computing as well as the security challenges inherent to cloud computing and cloud infrastructure. In addition to analysing cryptographic algorithms with the process, this study addresses the dangers to cloud security. These cryptography algorithms are well- planned and thoroughly examined to improve the performance of existing cryptography systems. The outcome reveals the strategies applicable to real-time encryption. All encryption techniques have proved to have benefits and disadvantages and to be suitable for various purposes. Key Words: Cloud Storage, Cloud Performance, Cloud Scalability, Cloud Availability, Cloud Security, Cloud Access Control, Document Sharing 1. INTRODUCTION The cloud computing paradigm has expandedasa technique that enables ubiquitous, on-demand access to a shared pool of dynamically reconfigurable computing resources, including networks, servers, storagespace,applications,and services, with the goal of being rapidly deployed with minimal management effort and service provider interaction. The most common and clear definition of cloud is "a network solution that provides affordable,trustworthy, uncomplicated, and straightforward access to IT resources" [1]. The service-oriented strategy of cloud computing not only decreases infrastructureoperatingcostsandownership costs, but also improves customer performance and flexibility [13]. NIST has specifiedthekeycharacteristicsand two kinds of cloud computing equipment [13]. a) Deployment Model. b) Service Model Deployment Model are classified as [23]: a) Public b) Private c) Hybrid d) Community Fundamentally, it relies on the organization's requirement. The classification of cloud Service model computing is as follow [13,23]. Software as a Service (SaaS): OfferingSoftwareasa Service to customers according to their needsenablesthemtoutilise the services that are hosted on cloud servers. Platform as a Service (PaaS): Users are granted access to platforms, allowing them to deploy their own customised software and other applications in the cloud. Fig 1. A conceptual view of computing in cloud IaaS: Infrastructure as a ServiceTheprovisionofprocessing, storage, network capacity,andotherfundamental computing resources for rent enables customers to manage operating systems, applications, storage, and network connection. Performance, availability, scalability, and data security are the greatest obstacles to cloud adoption[1].Integrityofdata, privacy, and security are necessary concerns for cloud services. Numerous service providers employ diverse 1,2Sunder Deep Engineering College, Dr. A. P. J. Abdul Kalam Technical University, Ghaziabad, India Email: neetumaurya258@gmail.com, varunksingh07@gmail.com
2.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 10 Issue: 06 | Jun 2023 www.irjet.net p-ISSN: 2395-0072 © 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 323 policies, tactics, and procedures based on the following criteria: • Size of data. • Characteristics of data. • Patterns of data. 2. LITERATURE REVIEW Diverse resources were examined in order to appreciate the essential ideas of computing in the cloud and keeping safe data in the cloud. This section is devoted to a literature study to establish a foundation for examining various elements of cloud computing. Previous research reveals how to increase cloud computing performanceandthenumberofcriteriathat affect cloud performance. The direction of this study was determined by the following variables [1]. Diverse resources were examined in order to appreciate the essential ideas of computing in the cloud and keeping safe data in the cloud. This section is devoted to a literature study to establish a foundation for examining various elements of cloud computing. Previous research reveals how to increase cloud computing performanceandthenumberofcriteriathataffect cloud performance. The direction of this study was determined by the following variables [1]. a. How may Cloud Computing performance be enhanced? b. Workload analysis and inventive management of cloud resources? In a previous study, resource allocation was used to boost cloud performance, and data were encrypted using a cryptographic algorithm. Using these currenttechniqueswill lower the time required for downloading and uploading files to the cloud, hence improving performance [1]. Scalability, according to previous research, implies that, as the workstation's load increases,thesystem'sperformancemust remain consistentinallenvironmentswithoutcompromising client needs. According to a research, numerous scaling approaches exist to increase the scalability of cloud computing [1]. A. Vertical Scaling. B. Horizontal scaling. C. Diagonal scaling. A second definition of scalability is that several users can exchange their data concurrently withoutcausingacollision. The availability of the cloud is also a concern in cloud computing, according to prior research. It indicates that if a person is utilising the cloud, he should be able to obtain everything he desires. Availability and dependability are closely proportional. Everyone is familiar with this word; if a system is trustworthy, users will utilise it more. There are a variety of issues that can affect the availability of cloud computing. a. Human errors b. Software Failure c. Hardware malfunction d. Machine migration from one server to another According to prior research, the following constitutetheidea of cloud computing: In cloud computing, security plays a crucial role. It implies that attackers and hackers cannot access user information. Every user was concerned about their data's security, privacy, and secrecy. If there is a system that delivers this functionality robustly, which system will have the most success in the future? All unauthorised users will be denied access to the system.Thesecuritycriterianeed for a successful system is as follow [3, 24]. a. Privacy b. Confidentiality c. Unauthorized Access d. Attacker-Safe e. Hacker-Safe etc Every part of cloud computing requires this researcher to have many security methods in addition to the guidelines they can implement from a security standpoint. Previous research provides a respectable introduction to the fundamental ideas of cloud computing. In this study, several essential topics pertaining to instances of applications that may be produced utilising cloud computing and how they might assist the developing world in benefiting from this growing technology are investigated. Previous research Cloud computing enables Internet access to highly scalable resources. Since the usage of cloud computing by individuals and businesses throughout the globe is increasing rapidly, why haven't data protection issues in cloud computing yetbeenaddressed?Usersofcloud services face a significant risk of losing sensitive data. To address user data privacy concerns, they've established a data protection framework. The suggestedparadigmfordata protection covers difficulties across the life cycle of cloud services. Policy ranking, policy integration, and policy enforcement are the three major components of their suggested system. They have provided a variety of models and studied the attributes of each component. This study examines broad recommendations for evaluating created systems based on this type of paradigm. This study provides access to several models of data security and cost-function definitions [7]. Previous technique created a standard for securing cloud data intransit.Forthelengthofimmigration,a standard encryption mechanism has been suggested as a means of protecting sensitive information. Other encryption standard is essential for robust security, although requiring unnecessary processing. The metric presented in their
3.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 10 Issue: 06 | Jun 2023 www.irjet.net p-ISSN: 2395-0072 © 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 324 research provides a balance between the security and encryption overhead [14, 25, 27]. Every part of cloud computing requires this researcher to have many security methods in addition to the guidelines they can implement from a security standpoint. Previous research provides a respectable introduction to the fundamental ideas of cloud computing.Inthisstudy,severalessentialtopicspertainingto instances ofapplicationsthatmaybeproducedutilisingcloud computing and how theymightassistthedevelopingworldin benefiting from this growing technology are investigated. 3. SECURITY THREATS IN CLOUD Cloud computing is facing a lot of security issues. Those issues are listed below [6, 10, 26]: a. Data Loss. b. Malicious. c. Insecurity of interfaces and APIs. d. Hijacking of account and service. e. Leakage of data. f. Denial of service. g. Technology sharing risk. h. Integration of data and protection. A. Data Loss: Companies outsource their data to the cloud because it is inexpensive and secure, yet there is a risk of data loss. There are several opportunities for data loss during data outsourcing, some of which are listed below [4]. 1. Malicious Attack 2. Server failure 3. Erasure of data by providers 4. No data backup 5. Loss of the encryption key. There are several techniques to prevent data loss in cloud computing, including: Utilize a robust API for access control. Analysis of data protection at both runtime and compilation time. Utilize a robust key generation mechanism. Apply appropriate backup and retention strategies. B. Malicious insiders Contaminated insiders This might be a DBA (Data Base Administrator), an employee, a partner, etc. of the cloud business who is authorised to view cloud data. These individuals can steal and corrupt information if another firm pays a greater price [27]. Contaminated insiders This might be a DBA (Data Base Administrator), an employee, a partner, etc. of the cloud business who is authorised to view cloud data. These individuals can steal and corrupt information if another firm pays a greater price [27]. Fig 2: Threats of Security in computing of cloud. C. Insecurity of interfaces and APIs: The relationship between cloud service providers and customers must occur viaapplicationprogramminginterface (APIs). Therefore, these APIs must be protected to prevent unwanted access. D. Hijacking of account and service Every cloud user has an internet-based account (bank account, e-mail account or social media account). Account hacking can result in catastrophicdatalossforusersIntegrity and standing. E. Leakage of data The cloud service enables any user to move and access data from any location in the globe, therefore there is a possibility of data leakage. This demonstrates the vulnerabilities of cloud security and cloud's physical transport infrastructure. F. Denial of service In cloud computing, availability is a crucial factor; hence, many businesses want theirsystems to be alwaysaccessible. Another aspect ofcloudcomputingisthesharingofresources among users. If an attacker uses up all the computational resources in the cloud, then no one else may utilise those resources; this is known as a denial of service. When this occurs, user access to their resources will be sluggish, and cloud availability will be affected. G. Technology sharing risk. The foundation of infrastructure as a service is shared infrastructure. This service was not built with a multi-tenant
4.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 10 Issue: 06 | Jun 2023 www.irjet.net p-ISSN: 2395-0072 © 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 325 architecture; hence this architecture is essential for mitigating this risk. H. Integration of data and protection Many organisations must ensure that their data is protected between the end user and the cloud data centre since unprotected data is more susceptible to transmission interruptions [12]. 4. REQUIREMENTS FOR SECURITY IN CLOUD COMPUTING The ISO (International standard organisation) Information Security standardshouldincludeseveralsuggestedelements. In addition, cloud computing security should be directed in this manner for it to be an outstanding and secure technological solution. Fig 3: Security requirements in computing of cloud Figure 3 depicts information security needs that are intimately coupled with cloud deployment and delivery methods. [13]. In Fig. 3, the various cloud delivery models and deployment models are compared to the security needs forinformation, where "N" denotesmandatoryrequirements and "O" denotes optional requirements. However, further research is necessarytodeterminethebest balance required to secure cloud computing. The context of Figure 3 should be considered when judging the security level. The security needs of the cloud will be discussed in the context of cloud computing. a. Identification b. Authentication c. Anonymity d. Authorization e. Confidentiality f. Integrity g. non-repudiation h. Availability 5. SECURITY ALGORITHMS AND ITS PARAMETERS In cloud computing, data security encompasses not just encryption but also several additional procedures. Risk of data loss is contingent on the following elements. A) Reset of data: Clearing of data When a cloud user accesses their data through the internet, this is referred to as the Reset of data. This procedure operates on live data, as opposed to data backups. Fig 4 data at reset and transit B) Transit of data The passage of data in and out of the cloud is referred to as data transit. When users upload their data tothecloud,thisis
5.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 10 Issue: 06 | Jun 2023 www.irjet.net p-ISSN: 2395-0072 © 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 326 referred to as data transit. To prevent this, it is now time for the hacker to steal user data. The procedure of encryption and decryption should be adopted [18]. Encryption and decryption play a crucial part in cryptography techniques. There are now two types of cryptography methods used for data encryption and decryption: 1. ciphering using a Symmetric key Encryption with an asymmetric key. Fig 5. a basic cryptography approach Encryption using an asymmetric key, finds the researcher, is the best solution for data protection. In this method, both privateand publickeys will be utilised to encryptanddecode data between sender and recipient. Various cryptography algorithms are now employed for data encryption. Using cryptography, thelevelofsecuritywillbestrengthened,along with the following critical parameters: 1. Level of data protection 2. Contents' authenticity User identification 4. Availability. Encryption using an asymmetric key, finds the researcher, is the best solution for data protection. In this method, both private and public keys will be utilised to encrypt and decode data between sender and recipient. Various cryptography algorithms are now employedfordata encryption. Using cryptography, the level of security will be strengthened,along with thefollowingcriticalparameters:1. Level of data protection 2. Contents' authenticity User identification 4. Availability. Cryptography is the technique of concealing original information duringthetransmissionofplaintext.TheMethod of C. Hash algorithm: The mathematical function is the hash function. The hash function converts the supplied text to an alphanumeric string. This method also assures that no two strings may provideidentical alphanumericoutput.Thehash function is a straightforward mathematical operation, as given in [9] below. F(x) = x mod 10 ........ (1) All the above-mentioned approaches and techniques are frequently employed for encrypting cloud data to maintain data security. These methods may differ depending on the circumstances. Whatever method is employed. These strategiesare highly recommended for ensuring the security of data in both private and public clouds. 6. COMPARISON OF CRYPTOGRAPHIC ALGORITHMS The table 1 provides a comparisonofallpreviouslydescribed algorithms from the reference section. Based on this comparison, the following parameters are compared to determine the optimal security algorithm: 1. Name of the algorithm 2. Key and block sizes utilised in the algorithm 3. Round 4. Structure 5. Flexibility 6. Security features Algorit hm Name Key Size(bits) Bloc k Size (bit s) Round Structure Flexi ble Key Feature DES 64 64 16 Festiel function (F) No Not enough robust E-DES 1024 128 16 Festiel function( F) Excellent Security and swiftness T-DES 112,168 64 48 Festiel function( F) Yes Adequate Safety and Rapid T-DES 112,168 64 48 Festiel function( F) Yes Adequate Safety and Rapid RSA 1024 to 4096 128 1 Public key algorithm No Excellent Safety and low speed BLOW FISH 32-448 64 16 Festiel function( F) Yes Fast Encryptio n in SSL DSA Variable Public key algorithm Yes Excellent Security and swiftness RC6 128 to 256 128 20 Festiel function( F) Yes Good Security AES 128,192,2 56 128 10,12, 14 Substituti on Permutat ion Yes Security is superior. It performs the best in terms of security and encryptio n.
6.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 10 Issue: 06 | Jun 2023 www.irjet.net p-ISSN: 2395-0072 © 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 327 A further cloud-related method is the Attribute-based Encryption Algorithm (ABE). It contains access policies for the attribute set to identify the owner who wants to share their data, and encrypted data and the encryption key are kept on cloud servers, which is beneficial for security. In order to increase the security of the data on the servers, the AES algorithm is employed. First, data is encrypted with the AES algorithm [21], then with the ABE algorithm. 7. RESULT AND DISCUSSION The comparisons ofthealgorithmsarebasedonthefollowing criterion to determine which securityalgorithmprovidesthe best cloud computing security: 1. Key size of the block 3. Round 4. Structure 5. Adaptability Fig: 6 Encryption process of files with use of AES and ABE algorithm So, the researcher concludes his survey based on the aforementioned criteria. The algorithm [18] that has been applied to DES, EDES, RSA, Blow fish, DSA, RC6, AES,andABE has the quickest encryption time, speed, and flexibility. The resultsalso demonstrate thatthe AES algorithmprovidesthe highest levels of security, flexibility, and encryption performance. It is the most effective in comparison to others. Researchers conclude that AES with ABE Algorithms is most appropriate for future work [13] since this approach provides double encryption to give the highest level of security in cloud computing paradigms. Figure 6 depicts the full encryption procedure using AES and ABE [18]. 8. CONCLUSION This paper provides a quick introduction to the most major cryptographic algorithms used in the process, as well as a description of the dangers to cloud security. These cryptography algorithms are well-planned and thoroughly examined in order to improve the performance of existing cryptography systems. The outcome demonstrates the relevant strategies for real-time encryption. All encryption techniques have proved to have benefits and disadvantages and to be suitable for various purposes. The comparison between Symmetric and Asymmetric algorithms demonstrates that Symmetric algorithms are more efficient. Based on prior research and a comparison of potential results, researchers conclude that AES is the most dependable algorithmintermsofencryptionspeed,decoding difficulty, key length, structure, and adaptability. If the researcher will combine AES and ABE (Attribute based encryption). It will yield the finest results in termsofsecurity for cloud computing paradigms. REFERENCES [1] Shoaib Hassan, Asim Abbas kamboh, Farooque Azam, (2014). "Analysis of Cloud Computing Performance, Scalability, Availability&Security".IntheProceedingsof the 2014 International Conference on Information Science & Computing Basics", International Journal of Advanced Research in Computer and Communication Engineering, Vol. 1, Issue. 5, pp. 3-22. [2] M.A. Vouk, (2008). "Cloud computing - Issues, research and implementations", In Proceeding of the 2008 30th International Conference. On Information Technology Interfaces (ITI), Cavtat, Croatia, pp. 31-40. [3] P.S. Wooley, (2011). "Identifying Cloud Computing Security Risks," University of Oregon, pp.1-88February, 2011. [3]. P.S. Wooley, (2011). "Identifying Cloud Computing Security Risks," University of Oregon, pp.1- 88 February, 2011. [4] F.B. Shaikh and S. Haider, (2011). "Security Threats in Cloud Computing", In Proceeding of the 2011 International Conferenceon Internet Technology and Secured Transactions, Abu Dhabi, pp. 11-14. [5] Abdulrahman, Alharthi, Fara Yahya, Robert J. Walters and Gary B. Wills, (2015). "An Overview of Cloud Services Adoption Challenges in Higher Education Institutions", In Proceedings of the 2nd International Workshop on Emerging Software as a Service and Analytics (ESaaSA-2015), pp.102-109. [6] Dan Lin and Anna Squicciarini, (2010). "Data Protection Models for Service Provisioning in the Cloud", In Proceedings of ACM Symposium on Access Control Models and Technologies (SACMAT, 2010), Pittsburgh, Pennsylvania, USA. [7] J. Hu and A. Klein, (2009). "A benchmark of transparent data encryption for migration of web applicationsinthe cloud,". In Proceeding of 2009 8th International conference on Dependable, Autonomic and Secure Computing, Chengdu, China, pp. 735-740. [8] J. Srinivas, K. Reddy and A. Qyser, (2012). "Cloud Computing Basics",. International Journal of Advanced
7.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 10 Issue: 06 | Jun 2023 www.irjet.net p-ISSN: 2395-0072 © 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 328 Research in Computer andCommunicationEngineering, Vol. 1, Issue 5, pp. 3-22. [9] S.B. Bele, (2018). “An Empirical Study on ‘Cloud Computing”. International Journal of Computer Science and Mobile Computing, Vol. 7 Issue 2, pg. 33-41. [10] B. Sri Varsha et al. (2014). “Data Privacy and Protection Schemes in Cloud Computing”. International Journal of Computer Science and Information Technologies, Vol. 5(5): 6395-6399. [11] Cyber Investigation Challenges Faced by Future Technology Trends. Cloud Security and Forensics.https://raymondleo.wordpress.com/2018/10 /17/cyberrisks-in-the-near-future/ (fig.2) [12] Issa M. Khalil, Abdallah Khreishah and Muhammad Azeem (2014). Cloud Computing Security: A Survey. Computers, 3(1): 1-35. [13] Jitendra Kumar Seth and Satish Chandra, (2013). A Novel Design to Increase Trust in Cloud. International Journal of Computer Science Issues, Vol. 10, Issue 4, No 1, 329-336. [14] H. Suo, J. Wan, C. Zou, and J. Liu, (2012). “Security in the internet of things: a review,” In Proceedings of the International Conference on Computer Science and Electronics Engineering (ICCSEE), pp. 648–651. [15] Security for cloud computing tenstepstoensuresuccess version. Available from: http://www.cloudcouncil.org. [16] M. Zhou (2010).“Security and Privacy in Cloud Computing: A Survey,” Proceedings of the 2010 Sixth International Conference on Semantics, Knowledge and Grids-2010, Pages 105-112. [17] Firas A. Abdulatif, Maanzuhiar (2017). “Cloud Security Issues and Challenges:” Important Points to Move towards Cloud Storage. International Journal of Science and Research, 6(8): 6-391. [18] Monjur Ahmed, Mohammad Ashraf Hossain. (2014). "Cloud Computing and Security Issues in the Cloud". International Journal of Network Security & Its Applications (IJNSA), Vol. 6, No.1, 25-36. [19] Rohini H. Joshi, Divya P. Rathi, Asma Khan, Medha Jain (2018). "A Survey on Various Security Issues and Challenges to Secure Cloud Computing". International Journal of Innovative Research in Computer Science & Technology, Vol. 6, Issue 3, 31- 35. [20] Pushpalatha V., Sudeepa K.B., Mahendra H.N.,(2018)."A Survey on Security Issues in Cloud Computing", International Journal of Engineering & Technology, 7(3.34): 758-761. [21] Nisha, Nasseb Dillon, (2016). “A Novel Approach to Enhance the Security in Cloud Computing using AES Algorithm”, International Journal on Emerging Technologies (Special Issue on RTIESTM-2016) 7(1): 76-79(2016). [22] Parmar, Sapna and Mangane, Gangambika (2016). “Security Issues in Cloud Computing: A Review". International Journal onEmerging Technologies(Special Issue on ICRIET-2016) 7(2): 269-274. [23] Jain, Sweta and Richhariya, Vineet (2017). “Strong AuthenticationPolicyforCloudComputingEnvironment Using Modified Kerberos Authentication Protocol. International Journal of Theoretical & Applied Sciences, 9(2): 227-231. [24] Thakur, Priyanka and Thakur, Pawan (2016). “Cloud Computing: A Comprehensive View”. International Journal of Electrical, Electronics and Computer Engineering, 5(2): 11-15. [25] Adeppa, Sudarshan (2015). Data Sharing in Cloud Storage using Identity Encryption Technique. International Journal on Emerging Technologies, 6(1): 115-117. [26] Thakur, Pawan and Awasthi, Sachin (2017). Infrastructure as a Service (Iaas) Security Issues in Cloud Computing. International Journal on Emerging Technologies, 8(2): 01-06. [27] Pandey, Akanksha and Sharma, Sanjeev (2017). Hybrid Encryption Technique for Security of Cloud Data. International Journal of Theoretical & Applied Sciences, 9(2): 283-287.
Download now