A Proposed Model Architecture for Ensuring Security and Privacy in Public Cloud Computing Systems

Authors

  • Neerav Nishant, Vaishali Singh

Keywords:

Cloud Computing, Security Service, Cloud Security

Abstract

In recent scenario public cloud services has springing up as a widely embraced and effective proposal for the organizations seeking to process, save, and utilize data and application that uses internet to share resources and information. The purpose of this research is to look into the problems and security risks associated with public cloud computing. It is distinguished by five important characteristics: on-demand self-service, broad network access, resource pooling, measured service and rapid elasticity. However, the arising prevalence of the public cloud services, security considerations have become paramount in the authoritative processes. This study emphasis to scrutinize the information security concerns of public cloud services and pinpoint organizations potential penetrability and threats that may encountered. Specifically, the focus is on investigating the challenges pertaining to cloud databases and their security concerns. Additionally, it examines different cloud service models and potential information security issues. In summary, this study offers a comprehensive evaluation of available security solutions and presents recommendations for tackling the challenges posed by cloud security.

Downloads

Download data is not yet available.

References

Buyya R., Broberg J., Goscinski A. (2010). Cloud Computing: Principles and Paradigms, John Wiley & Sons, Vol. 87.

Mohammed M. (2014). Alani: Securing the cloud: threats, attacks and mitigation techniques, Journal of Advanced Computer Science and Technology, Vol. 3, No. 2, pp. 202-213.

Buecker A., Lodewijkx K., Moss H., Skapinetz K., Waidne M. (2009). Cloud security guidance, IBM Red Paper 2009, p. 12.

Padhy R.P., Patra M.R., Satapathy S.C. (2011). Cloud computing: security issues and research challenges, IRACST- International Journal of Computer Science and Information Technology & Security (IJCSITS), Vol. 11.

Tiwari P.K., Mishra B. Cloud computing security issues, challenges and solution, International Journal of Emerging Technology and Advanced Engineering. Vol. 2.

Prince Jain: security issues and their solution in cloud computing, International Journal of Computing & Business Research.

Anantwar R.G., Chatur P.N., Anantwar S.G. (2012), cloud computing and security model: a survey, International Journal of Engineering Science and Innovative Technology (IJESIT), Vol. 1.

Tim M., Subra K., Shahed L. (2009). Cloud security and privacy: an enterprise perspective on risks and compliance, O’ Reilly Media, USA.

Barrie S. (2011). Cloud Computing Bible, Wiley Publishing Inc.

Pearson S., Azzedine B. (2010). Privacy, security and trust issues arising from cloud computing, 2010 IEEE Second International Conference Cloud Computing Technology and Science (CloudCom), pp. 693-702.

Hamouda S.K., Glauert J. Security, Privacy and Trust Management Issues for Cloud Computing, Taylor & Francis Group.

Shakeeba S.K., Tuteja R.R. (year). Security in cloud computin using cryptographic algorithms, International Journal of Innovative Research in Computer and Communication Engineering, Vol. 3.

Oztemel, E., Gursev, S. Literature review of Industry 4.0 and related technologies. J Intell Manuf 31, 127–182 (2020). https://doi.org/10.1007/s10845-018-1433-8

P. D. Kaur and I. Chana, "Unfolding the Distributed Computing Paradigms," 2010 International Conference on Advances in Computer Engineering, Bangalore, India, 2010, pp. 339-342, doi: 10.1109/ACE.2010.80.

Jouini, M., & Rabai, L. B. A. (2019). A security framework for secure cloud computing environments. In Cloud security: Concepts, methodologies, tools, and applications (pp. 249-263). IGI Global.

Dhaya, R., Kanthavel, R., & Venusamy, K. (2021). Dynamic secure and automated infrastructure for private cloud data center. Annals of Operations Research, 1-21.

Bolívar, H., Parada, H. D. J., & Roa, O. (2019, October). Modeling cloud computing security scenarios through attack trees. In 2019 Congreso Internacional de Innovación y Tendencias en Ingenieria (CONIITI) (pp. 1-6). IEEE.

Barrett, P. (2000, December). Implementing the Rivest Shamir and Adleman public key encryption algorithm on a standard digital signal processor. In Advances in Cryptology—CRYPTO’86: Proceedings (pp. 311-323). Berlin, Heidelberg: Springer Berlin Heidelberg.

Hamouda, B. E. H. H. (2020). Comparative study of different cryptographic algorithms. Journal of Information Security, 11(3), 138-148.

Tabrizchi, H., & Kuchaki Rafsanjani, M. (2020). A survey on security challenges in cloud computing: issues, threats, and solutions. The journal of supercomputing, 76(12), 9493-9532.

Josyula, V., Orr, M., & Page, G. (2011). Cloud computing: Automating the virtualized data center. Cisco Press.

Tawalbeh, L. A., Muheidat, F., Tawalbeh, M., & Quwaider, M. (2020). IoT Privacy and security: Challenges and solutions. Applied Sciences, 10(12), 4102.

Pandey, S., & Farik, M. (2017). Best symmetric key encryption-A Review. International Journal of Scientific & Technology Research, 6(6), 310-312.

Kosta, S., Aucinas, A., Hui, P., Mortier, R., & Zhang, X. (2012, March). Thinkair: Dynamic resource allocation and parallel execution in the cloud for mobile code offloading. In 2012 Proceedings IEEE Infocom (pp. 945-953). IEEE.

Nishant, N. ., & Singh, V. . (2023). Distributed Infrastructure for an Academic Cloud. International Journal on Recent and Innovation Trends in Computing and Communication, 11(6), 34–38. https://doi.org/10.17762/ijritcc.v11i6.6769

Varghese, B.etal : Cloud Futurology Computer. 52, 9, 68–77(2019). https://doi.org/10.1109/MC.2019.2895307.

Nishant, N. ., & Singh, V. . (2023). Distributed Infrastructure for an Academic Cloud. International Journal on Recent and Innovation Trends in Computing and Communication, 11(6), 34–38. https://doi.org/10.17762/ijritcc.v11i6.6769.

Downloads

Published

16.03.2024

How to Cite

Vaishali Singh, N. N. . (2024). A Proposed Model Architecture for Ensuring Security and Privacy in Public Cloud Computing Systems. International Journal of Intelligent Systems and Applications in Engineering, 12(3), 1119–1125. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/5391

Issue

Section

Research Article