Review in Cloud Computing Security
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 2
Abstract
Abstract:The cloud Computing provides an undemanding and Non ineffectual Solution for Daily Computing. The prevalent Problem Associated with Cloud Computing is the Cloud security and the appropriate Implementation of Cloud over the Network. Cloud computing moves the application software and databases to the large data centers, where the management of the data and services may not be fully trustworthy. Problem is that Clouds typically have single security architecture but have many customers with different demands and we attempt to solve this problem. In this we need to provide availability of data by overcoming many existing problems like Data Leakage , Data Integrity and Privacy Protection. To learn about cloud computing security, a review process involving 2 stage approaches has been undertaken for 20 research papers which were published in the period of year 2010 to year 2013. After an exhaustive review process, four key issue were found “Security and privacy, Data Leakage and weakness, Data integrity problem and Data Hiding in cloud Computing.” which is mostly need to enhance of Cloud Security aspects to get better Data accessibility over network. Several solution approaches have been found in the 20 papers. The outcome of the review was in the form of various findings, found under various key issues. The findings included algorithms and methodologies used to solve particular research problem, along with their strengths and weaknesses and the scope for the future work in the area.
Authors and Affiliations
Anchal Pokharana , Shweta Meena
Attack Determination and its Security Analysis for Personal Communication in VoIP Networks
Voice over Internet Protocol (VoIP) is a technology that enables one to make and receive calls through the Internet instead of using the traditional analog PSTN (Public Switched Telephone Network) lines.Gtalk and...
IVRS and DTMF based Voting System
Abstract: A Voting System will be developed where a person can vote using a cell phone. A phone connected tothe voting system, will decode the DTMF pulses sent by another phone(mobile/landline) belonging to the vot...
Conceptual Design of “Lotos” Motorcar
Abstract: This work presents conceptual design of new “Lotos” motorcar. Brief review of analogue prototypes of different world-known motorcar manufacturers was made. When body concept design was created, bionic form of...
Simulating ECA-AODV Routing Scheme using TCP for MANETs
ECA model checks different resource constraints before constructing the path. This will ensure long time connectivity between source and destination nodes. TCP model will provide reliable data transfer between source nod...
Photo Polymerization of Host-Guest Complexes of Β- Cyclodextrin / Butyl Acrylate in Aqueous Solution, Kinetics And Mechanism
Abstract: The Photo polymerization of β-cyclodextrin host–guest complexes of Butyl acrylate sensitized by Fluoroscein sodium in homogeneous aqueous medium has been studied. The polymerization was carried out in presence...