A Proposed Model Architecture for Ensuring Security and Privacy in Public Cloud Computing Systems
Keywords:
Cloud Computing, Security Service, Cloud SecurityAbstract
In recent scenario public cloud services has springing up as a widely embraced and effective proposal for the organizations seeking to process, save, and utilize data and application that uses internet to share resources and information. The purpose of this research is to look into the problems and security risks associated with public cloud computing. It is distinguished by five important characteristics: on-demand self-service, broad network access, resource pooling, measured service and rapid elasticity. However, the arising prevalence of the public cloud services, security considerations have become paramount in the authoritative processes. This study emphasis to scrutinize the information security concerns of public cloud services and pinpoint organizations potential penetrability and threats that may encountered. Specifically, the focus is on investigating the challenges pertaining to cloud databases and their security concerns. Additionally, it examines different cloud service models and potential information security issues. In summary, this study offers a comprehensive evaluation of available security solutions and presents recommendations for tackling the challenges posed by cloud security.
Downloads
References
Buyya R., Broberg J., Goscinski A. (2010). Cloud Computing: Principles and Paradigms, John Wiley & Sons, Vol. 87.
Mohammed M. (2014). Alani: Securing the cloud: threats, attacks and mitigation techniques, Journal of Advanced Computer Science and Technology, Vol. 3, No. 2, pp. 202-213.
Buecker A., Lodewijkx K., Moss H., Skapinetz K., Waidne M. (2009). Cloud security guidance, IBM Red Paper 2009, p. 12.
Padhy R.P., Patra M.R., Satapathy S.C. (2011). Cloud computing: security issues and research challenges, IRACST- International Journal of Computer Science and Information Technology & Security (IJCSITS), Vol. 11.
Tiwari P.K., Mishra B. Cloud computing security issues, challenges and solution, International Journal of Emerging Technology and Advanced Engineering. Vol. 2.
Prince Jain: security issues and their solution in cloud computing, International Journal of Computing & Business Research.
Anantwar R.G., Chatur P.N., Anantwar S.G. (2012), cloud computing and security model: a survey, International Journal of Engineering Science and Innovative Technology (IJESIT), Vol. 1.
Tim M., Subra K., Shahed L. (2009). Cloud security and privacy: an enterprise perspective on risks and compliance, O’ Reilly Media, USA.
Barrie S. (2011). Cloud Computing Bible, Wiley Publishing Inc.
Pearson S., Azzedine B. (2010). Privacy, security and trust issues arising from cloud computing, 2010 IEEE Second International Conference Cloud Computing Technology and Science (CloudCom), pp. 693-702.
Hamouda S.K., Glauert J. Security, Privacy and Trust Management Issues for Cloud Computing, Taylor & Francis Group.
Shakeeba S.K., Tuteja R.R. (year). Security in cloud computin using cryptographic algorithms, International Journal of Innovative Research in Computer and Communication Engineering, Vol. 3.
Oztemel, E., Gursev, S. Literature review of Industry 4.0 and related technologies. J Intell Manuf 31, 127–182 (2020). https://doi.org/10.1007/s10845-018-1433-8
P. D. Kaur and I. Chana, "Unfolding the Distributed Computing Paradigms," 2010 International Conference on Advances in Computer Engineering, Bangalore, India, 2010, pp. 339-342, doi: 10.1109/ACE.2010.80.
Jouini, M., & Rabai, L. B. A. (2019). A security framework for secure cloud computing environments. In Cloud security: Concepts, methodologies, tools, and applications (pp. 249-263). IGI Global.
Dhaya, R., Kanthavel, R., & Venusamy, K. (2021). Dynamic secure and automated infrastructure for private cloud data center. Annals of Operations Research, 1-21.
Bolívar, H., Parada, H. D. J., & Roa, O. (2019, October). Modeling cloud computing security scenarios through attack trees. In 2019 Congreso Internacional de Innovación y Tendencias en Ingenieria (CONIITI) (pp. 1-6). IEEE.
Barrett, P. (2000, December). Implementing the Rivest Shamir and Adleman public key encryption algorithm on a standard digital signal processor. In Advances in Cryptology—CRYPTO’86: Proceedings (pp. 311-323). Berlin, Heidelberg: Springer Berlin Heidelberg.
Hamouda, B. E. H. H. (2020). Comparative study of different cryptographic algorithms. Journal of Information Security, 11(3), 138-148.
Tabrizchi, H., & Kuchaki Rafsanjani, M. (2020). A survey on security challenges in cloud computing: issues, threats, and solutions. The journal of supercomputing, 76(12), 9493-9532.
Josyula, V., Orr, M., & Page, G. (2011). Cloud computing: Automating the virtualized data center. Cisco Press.
Tawalbeh, L. A., Muheidat, F., Tawalbeh, M., & Quwaider, M. (2020). IoT Privacy and security: Challenges and solutions. Applied Sciences, 10(12), 4102.
Pandey, S., & Farik, M. (2017). Best symmetric key encryption-A Review. International Journal of Scientific & Technology Research, 6(6), 310-312.
Kosta, S., Aucinas, A., Hui, P., Mortier, R., & Zhang, X. (2012, March). Thinkair: Dynamic resource allocation and parallel execution in the cloud for mobile code offloading. In 2012 Proceedings IEEE Infocom (pp. 945-953). IEEE.
Nishant, N. ., & Singh, V. . (2023). Distributed Infrastructure for an Academic Cloud. International Journal on Recent and Innovation Trends in Computing and Communication, 11(6), 34–38. https://doi.org/10.17762/ijritcc.v11i6.6769
Varghese, B.etal : Cloud Futurology Computer. 52, 9, 68–77(2019). https://doi.org/10.1109/MC.2019.2895307.
Nishant, N. ., & Singh, V. . (2023). Distributed Infrastructure for an Academic Cloud. International Journal on Recent and Innovation Trends in Computing and Communication, 11(6), 34–38. https://doi.org/10.17762/ijritcc.v11i6.6769.
Downloads
Published
How to Cite
Issue
Section
License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
All papers should be submitted electronically. All submitted manuscripts must be original work that is not under submission at another journal or under consideration for publication in another form, such as a monograph or chapter of a book. Authors of submitted papers are obligated not to submit their paper for publication elsewhere until an editorial decision is rendered on their submission. Further, authors of accepted papers are prohibited from publishing the results in other publications that appear before the paper is published in the Journal unless they receive approval for doing so from the Editor-In-Chief.
IJISAE open access articles are licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. This license lets the audience to give appropriate credit, provide a link to the license, and indicate if changes were made and if they remix, transform, or build upon the material, they must distribute contributions under the same license as the original.