Academia.eduAcademia.edu

A Security Method for Cloud Computing Threats

2015

Cloud computing could be a platform for enhancing capabilities and developing potentialities at run time while not adopting new infrastructure, human resources, or software package systems. Also cloud computing originated from an enterprise idea, and developed into a successful IT invention. Despite the plug surrounding cloud computing, customers stay reluctant to deploy their industrial enterprise into the cloud. All the same, lack of security is that the only major concern that hinders increased use of cloud computing. Moreover, the complexness with that cloud computing manages information privacy, and information security makes the market hesitant concerning cloud computing. The design of cloud models threatens the security of existing technologies once deployed in an exceedingly cloud environment. Thus, users of cloud

A Security Method for Cloud Computing Threats {tag} {/tag} IJCA Proceedings on National Conference Potential Research Avenues and Future Opportunities in Electrical and Instrumentation Engineering © 2015 by IJCA Journal ACEWRM 2015 - Number 1 Year of Publication: 2015 Authors: Arun Kumar Dewangan Gurudatta Verma {bibtex}acewrm6018.bib{/bibtex} Abstract Cloud computing could be a platform for enhancing capabilities and developing potentialities at run time while not adopting new infrastructure, human resources, or software package systems. Also cloud computing originated from an enterprise idea, and developed into a successful IT invention. Despite the plug surrounding cloud computing, customers stay reluctant to deploy their industrial enterprise into the cloud. All the same, lack of security is that the only major concern that hinders increased use of cloud computing. Moreover, the complexness with that cloud computing manages information privacy, and information security makes the market hesitant concerning cloud computing. The design of cloud models threatens the security of existing technologies once deployed in an exceedingly cloud environment. Thus, users of cloud 1/3 A Security Method for Cloud Computing Threats services must understand the dangers of uploading information into the new atmosphere. Therefore, in this paper we are proposing a different type of security technique for cloud computing threats so that all same problematic situations can be overcooked. Refer ences - Heena I. Syed and Naghma A. Baig, "Survey On Cloud Computing", International Journal of Emerging Technology and Advanced Engineering, Volume 3, Issue 4, pages 308-312, April 2013. - Kuyoro S. O. , Ibikunle F. and Awodele O. , "Cloud Computing Security Issues and Challenges", International Journal of Computer Networks, Volume 3, Issue 5, pages 247-255, 2011. - AMIT GOYAL and SARA DADIZADEH, "A Survey on Cloud Computing", University of British Columbia, Technical Report for CS 508, pages 1-14, December 2009. - Shilpashree Srinivasamurthy and David Q. Liu, "Survey on Cloud Computing Security". - S. Sathyavani and T. P. Senthilkumar, "Survey on Cloud Computing", International Journal of Computer Trends and Technology, volume 4, Issue 9, pages 3116-3120, Sep 2013. - Jason Carolan and Steve Gaede, "Introduction to Cloud Computing architecture", Sun Microsystems, Inc, 1st Edition, June 2009. - Wayne Jansen and Timothy Grance, "Guidelines on Security and Privacy in Public Cloud Computing", National Institute of Standards and Technology Draft Special Publication 800-144, January 2011. - S. Bleikertz, S. Bugiel, H. Ideler, S. Nürnberger, and A. -R. Sadeghi, "Client-controlled Cryptography-as-a-Service in the Cloud. " - S. Sanyal, and P. P. Iyer, "Cloud Computing--An Approach with Modern Cryptography," arXiv preprint arXiv:1303. 1048, 2013. - W. Mao, "The role and effectiveness of cryptography in network virtualization: a position paper. " pp. 179-182. - K. Rauber, "CLOUD CRYPTOGRAPHY," International Journal of Pure and Applied Mathematics, vol. 85, no. 1, pp. 1-11, 2013. - NaQi , Wei Wei, Jing Zhang, Wei Wang, Jinwei Zhao, Junhuai Li, Peiyi Shen, Xiaoyan Yin, Xiangrong Xiao and Jie Hu Analysis and Research of the RSA Algorithm SCIENCE ALERT 2013. Computer Science Index Terms Security 2/3 A Security Method for Cloud Computing Threats Keywords Cc Cloud Security Sha Rsa Crypto-chest 3/3