A Survey in Cloud Computing: Security Issues and Their Solutions

Authors

  • Chaitali Patel  Department of Information Technology, Shantilal Shah Engineering College, Bhavnagar, Gujarat, India
  • Disha Sanghani  Department of Information Technology, Shantilal Shah Engineering College, Bhavnagar, Gujarat, India

Keywords:

Cloud Computing, Security, Cryptographic Algorithms

Abstract

In current scenario cloud computing is touching the moons. Cloud computing becomes today’s hottest research area because of its ability to reduce cost of computing. Most of the companies and industries adopt cloud computing for their data storage and develop cloud computing applications. As cloud computing provide services through internet users concern more and more about security of their data stored on cloud. In this survey paper we discuss various security issues faced by cloud computing and their solution using different cryptographic algorithms based on different security parameters.

References

  1. Chunming Rong a, Son T. Nguyen a, Martin Gilje Jaatun, Beyond lightning: A survey on security challenges in cloud computing” Computers and Electrical Engineering xxx (2012) xxx–xxx elsevier
  2. Minqi Zhou, Rong Zhang, Wei Xie, Weining Qian, Aoying Zhou “Security and Privacy in Cloud Computing: A Survey”, 2010 Sixth International Conference on Semantics, Knowledge and Grids
  3. Dr. Chander Kant and Yogesh Sharma, "Enhanced Security Architecture for Cloud Data Security" International Journal of Advanced Research in Computer Science and Software Engineering, Volume 3, Issue 5, May 2013, pp.571-575.
  4. Pratyush Ranjan, Preeti Mishra, Jaiveer Singh Rawat, Emmanuel S. Pilli, and R.C. Joshi” Improved Technique for Data Confidentiality in Cloud Environment” © Springer International Publishing Switzerland 2014
  5. R. Buyya, C. Vecchiola, S.T. Selvi, Mastering Cloud Computing (McGraw-Hill, New Delhi, 2013)
  6. Kashish Goyal, Supriya Kinger” Modified Caesar Cipher for Better Security Enhancement” International Journal of Computer Applications (0975 – 8887) Volume 73– No.3, July 2013.
  7. Yogesh Kumar, Rajiv Munjal and Harsh Sharma,”Comparison of Symmetric and Asymmetric Cryptography with Existing Vulnerabilities and Countermeasures” IJCSMS International Journal of Computer Science and Management Studies, Vol. 11, Issue 03, Oct 2011.
  8. Mr. Gurjeevan Singh, Mr. Ashwani Singla and Mr. K S Sandha “Cryptography Algorithm Comparison For Security Enhancement in Wireless Intrusion Detection System” International Journal of Multidisciplinary Research Vol.1 Issue 4, August 2011.
  9. D. S. Abdul. Elminaam, H. M. Abdul Kader and M. M. Hadhoud, “Performance Evaluation of Symmetric Encryption Algorithms”, Communications of the IBIMA Volume 8, 2009.
  10. Gurpreet Singh, Supriya Kinger”Integrating AES, DES, and 3-DES Encryption Algorithms for Enhanced Data Security “International Journal of Scientific & Engineering Research, Volume 4, Issue 7, July-2013.
  11. Uma Somani, “Implementing Digital Signature with RSA Encryption Algorithm to Enhance the Data Security of Cloud in Cloud Computing," 2010 1st International Conference on Parallel, Distributed and Grid Computing (PDGC - 2010).
  12. M.B. Mollah, K.R. Islam, and S.S. Islam. Next generation of computing through cloud computing technology, in: 2012 25th IEEE Canadian Conference on Electrical Computer Engineering (CCECE), May 2012.p.1-6.

Downloads

Published

2015-12-25

Issue

Section

Research Articles

How to Cite

[1]
Chaitali Patel, Disha Sanghani, " A Survey in Cloud Computing: Security Issues and Their Solutions, International Journal of Scientific Research in Science, Engineering and Technology(IJSRSET), Print ISSN : 2395-1990, Online ISSN : 2394-4099, Volume 1, Issue 6, pp.265-269, November-December-2015.