3070 1302
Full Length Article
Journal of Cybersecurity and Information Management
Volume 4 , Issue 1, PP: 36 - 45 , 2020 | Cite this article as | XML | Html |PDF

Title

Security and Privacy Challenges in Cloud Computing: A Review

  Miss. Sayali Karmode Yelpale 1 *

1  Assistant Professor (CS & IT) at Satish Pradhan Dnyanasadhana College, Thane
    (sayalis.karmode@gmail.com)


Doi   :   https://doi.org/10.54216/JCIM.040102

Received: April 2, 2020 Revised: May 27, 2020 Accepted: June 25, 2020

Abstract :

Cloud computing is being transformed into a model with services. It is mainly focused on the concept of dynamic provisioning, which is applied to services as well as to the capacity, storage, networking, and information technology infrastructure. This paper reviews the key concepts of cloud computing exist. We are presenting here various concepts of cloud computing. According to the previous few surveys we are presenting various security challenges and for that what solution are overcome.

Keywords :

Cloud computing , Virtualization , Security , Privacy , Data protection

References :

[1]     S. Pearson, “Privacy, security and trust in cloud computing,” in Privacy and Security for Cloud Computing (S. Pearson and G. Yee, eds.), Computer Communications and Networks,

[2]     E. U. Directive, "95/46/EC of the European Parliament and of the Council of 24 October 1995 on the Protection       of Individuals about the Processing of Personal Data and the Free Movement of such Data," Official Journal of the EC, vol. 23, 1995.

[3]      “Hypervisors, virtualization, and the cloud: Learn about hypervisors, system virtualization, and how it works in a cloud environment.” Retrieved June 2015.

[4]     M. Portnoy, Virtualization Essentials. 1st ed., 2012.Alameda, CA, USA: SYBEX Inc.

[5]     F. Liu, J. Tong, J. Mao, R. Bohn, J. Messina, L. Badger, and D. Leaf, NIST Cloud Computing Reference Architecture: Recommendations of the National Institute of Standards and Technology (Special Publication 500-292). USA: CreateSpace Independent Publishing Platform, 2012.

[6]     R. Pike, D. Presotto, K. Thompson, H. Trickey, and P. Winterbottom, "The use of namespaces in plan 9," SIGOPS Oper. Syst. Rev., vol. 27, pp. 72–76, Apr. 1993..

[7]     M. A. Leandro, T. J. Nascimento, D. R. dos Santos, C. M. Westphall, and C. B. Westphall, “Multitenancy authorization system with federated identity for cloud-based environments using shibboleth,” in Proceedings of the 11th International Conference on Networks, ICN 2012, pp. 88–93, 2012.

[8]     G. Dreo, M. Golling, W. Hommel, and F. Tietze, "Iceman: An architecture for secure federated intercloud identity management," in Integrated Network Management (IM 2013), 2013 IFIP/IEEE International Symposium on, pp. 1207–1210, May 2013.

[9]     G. Sipos, D. Scardaci, D. Wallom, and Y. Chen, "The user support program and the training infrastructure of the EGI federated cloud," in High-Performance Computing Simulation (HPCS), 2015 International Conference on, pp. 9–18, July 2015.

[10]   N. Santos, K. P. Gummadi, and R. Rodrigues, “Towards trusted cloud computing,” in Proceedings of the 2009 Conference on Hot Topics in Cloud Computing, HotCloud’09, (Berkeley, CA, USA), USENIX Association, 2009. 

[11]   T. Garfinkel, B. Pfaff, J. Chow, M. Rosenblum, and D. Boneh, “Terra: A virtual machine-based platform for trusted computing,” in Proceedings of the Nineteenth ACM Symposium on Operating Systems Principles, SOSP ’03, (New York, NY, USA), pp. 193–206, ACM, 2003.

[12]   S. Zhu and G. Gong, “Fuzzy authorization for cloud storage,” Cloud Computing, IEEE Transactions on, vol. 2, pp. 422–435, Oct 2014.

[13]   F. F. Brasser, M. Bucicoiu, and A.-R. Sadeghi, "Swap and play: Live updating hypervisors and its application to Xen," in Proceedings of the 6th Edition of the ACM Workshop on Cloud Computing Security, CCSW '14, (New York, NY, USA), pp. 33–44, ACM, 2014.

[14]    C. Klein, A. Papadopoulos, M. Dellkrantz, J. Durango, M. Maggio, K.-E. Arnzen, F. HernandezRodriguez, and E. Elmroth, "Improving cloud service resilience using brownout-aware load balancing," in Reliable Distributed Systems (SRDS), 2014 IEEE 33rd International Symposium on, pp. 31–40, Oct 2014.

[15]   E. Lakew, L. Xu, F. Hernandez-Rodriguez, E. Elmroth, and C. Pahl, “A synchronization mechanism for cloud accounting systems,” in Cloud and Autonomic Computing (ICCAC), 2014 International Conference on, pp. 111–120, Sept 2014.

[16]   Y. Huang and I. Goldberg, “Outsourced private information retrieval,” in Proceedings of the 12th ACM Workshop on Workshop on Privacy in the Electronic Society, WPES ’13, (New York, NY, USA), pp. 119–130, ACM, 2013.

[17]   M. Gostev, J. Fernandez-Banet, J. Rung, J. Dietrich, I. Prokopenko, S. Ripatti, M. I. McCarthy, A. Brazma, and M. Krestyaninova, "SAIL - a software system for sample and phenotype availability across biobanks and cohorts," Bioinformatics, vol. 27, no. 4, pp. 589591, 2011.

[18]   A. Gholami, E. Laure, P. Somogyi, O. Spjuth, S. Niazi, and J. Dowling, “Privacy-preservation for publishing sample availability data with personal identifiers,” Journal of Medical and Bioengineering, vol. 4, pp. 117–125, April 2014.

[19]   L. Zhou, V. Varadharajan, and M. Hitchens, “Integrating trust with cryptographic role-based access control for secure cloud data storage,” in Trust, Security and Privacy in Computing and Communications (TrustCom), 2013 12th IEEE International Conference on, pp. 560–569, July 2013.

[20]    J. Sendor, Y. Lehmann, G. Serme, and A. Santana de Oliveira, "Platform level support for authorization in cloud services with OAuth 2," in Proceedings of the 2014 IEEE International Conference on Cloud Engineering, IC2E '14, (Washington, DC, USA), pp. 458–465, IEEE Computer Society, 2014.

[21]   C. Klein, A. Papadopoulos, M. Dellkrantz, J. Durango, M. Maggio, K.-E. Arnzen, F. HernandezRodriguez, and E. Elmroth, "Improving cloud service resilience using brownout-aware load balancing," in Reliable Distributed Systems (SRDS), 2014 IEEE 33rd International Symposium on, pp. 31–40, Oct 2014.

[22]   E. Lakew, L. Xu, F. Hernandez-Rodriguez, E. Elmroth, and C. Pahl, “A synchronization mechanism for cloud accounting systems,” in Cloud and Autonomic Computing (ICCAC), 2014 International Conference on, pp. 111–120, Sept 2014.

 

 

 


Cite this Article as :
Style #
MLA Miss. Sayali Karmode Yelpale. "Security and Privacy Challenges in Cloud Computing: A Review." Journal of Cybersecurity and Information Management, Vol. 4, No. 1, 2020 ,PP. 36 - 45 (Doi   :  https://doi.org/10.54216/JCIM.040102)
APA Miss. Sayali Karmode Yelpale. (2020). Security and Privacy Challenges in Cloud Computing: A Review. Journal of Journal of Cybersecurity and Information Management, 4 ( 1 ), 36 - 45 (Doi   :  https://doi.org/10.54216/JCIM.040102)
Chicago Miss. Sayali Karmode Yelpale. "Security and Privacy Challenges in Cloud Computing: A Review." Journal of Journal of Cybersecurity and Information Management, 4 no. 1 (2020): 36 - 45 (Doi   :  https://doi.org/10.54216/JCIM.040102)
Harvard Miss. Sayali Karmode Yelpale. (2020). Security and Privacy Challenges in Cloud Computing: A Review. Journal of Journal of Cybersecurity and Information Management, 4 ( 1 ), 36 - 45 (Doi   :  https://doi.org/10.54216/JCIM.040102)
Vancouver Miss. Sayali Karmode Yelpale. Security and Privacy Challenges in Cloud Computing: A Review. Journal of Journal of Cybersecurity and Information Management, (2020); 4 ( 1 ): 36 - 45 (Doi   :  https://doi.org/10.54216/JCIM.040102)
IEEE Miss. Sayali Karmode Yelpale, Security and Privacy Challenges in Cloud Computing: A Review, Journal of Journal of Cybersecurity and Information Management, Vol. 4 , No. 1 , (2020) : 36 - 45 (Doi   :  https://doi.org/10.54216/JCIM.040102)