• DocumentCode
    2982102
  • Title

    A security aspects in cloud computing

  • Author

    Kulkarni, Gaurav ; Gambhir, Jaimala ; Patil, Tejasvini ; Dongare, A.

  • Author_Institution
    Dept. of Electron. & Telecommun., Marathwada Mitra Mandal´s Polytech., Pune, India
  • fYear
    2012
  • fDate
    22-24 June 2012
  • Firstpage
    547
  • Lastpage
    550
  • Abstract
    The concept of cloud computing is a very vast concept which is very efficient and effective security services. The cloud computing methodology is a conceptual based technology which is used widely now a day. But in data privacy protection and data retrieval control is one of the most challenging research work in cloud computing, because of users secrete data which is to be stored by user. An enterprise usually store data in internal storage and then tries to protect the data from other outside source. They also provide authentication at certain specific level. Cloud computing offers an innovative business model for organizations to adopt IT services without upfront investment. Despite the potential gains achieved from the cloud computing, the organizations are slow in accepting it due to security issues and challenges associated with it. Security is one of the major issues which hamper the growth of cloud. The idea of handing over important data to another company is worrisome; such that the consumers need to be vigilant in understanding the risks of data breaches in this new environment. This paper introduces a detailed analysis of the cloud computing security issues and challenges focusing on the cloud computing types and the service delivery types. This paper mainly proposes the core concept of secured cloud computing. It suggests the cloud computing based on separate encryption and decryption services from the storage service. Due to this increasing demand for more clouds there is an ever growing threat of security becoming a major issue. This paper shall look at ways in which security threats can be a danger to cloud computing and how they can be avoided.
  • Keywords
    cloud computing; cryptography; data privacy; information retrieval; IT services; cloud computing methodology; conceptual based technology; data breach risk; data privacy protection; data retrieval control; decryption services; encryption services; innovative business model; security aspects; service delivery types; Authentication; Companies; Computational modeling; Cryptography; Monitoring; Privacy; IaaS; PaaS; SaaS; Security; threats;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Software Engineering and Service Science (ICSESS), 2012 IEEE 3rd International Conference on
  • Conference_Location
    Beijing
  • Print_ISBN
    978-1-4673-2007-8
  • Type

    conf

  • DOI
    10.1109/ICSESS.2012.6269525
  • Filename
    6269525