Open Access Open Access  Restricted Access Subscription or Fee Access

A Critique of Cloud Computing and its Security

Riyajuddin Y. Mujawar, Aiyeshabi S. Mulla

Abstract


Cloud computing is an on-demand service model for
IT provision, often based on virtualization and distributed computing technologies. Cloud computing is a new way of delivering computing resources, not a new technology. It provides access to potentially Compos able & Interchangeable Services. There is a growing trend of using cloud environments for ever growing storage and data processing needs. Cloud computing introduces significant concerns
about privacy, security, data integrity, intellectual property management, audit trails, and other issues. Adopting a cloud computing paradigm may have positive as well as negative effects on the data security of service consumers. While using various cloud services, there are so many complications related to security of cloud. There should be a trust between cloud provider and consumer accessing services. Hence it is needed to know its basic layered services, its various security standards and mechanisms to provide security for cloud computing. This paper focuses on various hardware and
software components of cloud and its various security mechanisms.


Keywords


Cloud Computing, Cloud Provider, Distributed Computing, Security Standards, Security Mechanisms, Virtualization.

Full Text:

PDF

References


Amit Sangroya, Saurabh Kumar, Jaideep Dhok, and Vasudeva Varma,

“Towards Analyzing Data Security Risks in Cloud Computing

Environments”

Anthony Bisong and Syed (Shawon) M. Rahman,” An Overview Of

The Security Concerns In Enterprise Cloud Computing”, International

Journal of Network Security & Its Applications (IJNSA), Vol.3, No.1,

January 2011.

Bo Peng, Bin Cui and Xiaoming Li, “Implementation Issues of A

Cloud Computing Platform”

Herminder Singh & Babul Bansal, “Analysis Of Security Issues And

Performance Enhancement In Cloud Computing”, International Journal

of Information Technology and Knowledge Management, July-

December 2010, Volume 2, No. 2, pp. 345-349

Marinela Mircea and Anca Ioana Andreescu, “Using Cloud

Computing in Higher Education: A Strategy to Improve Agility in the

Current Financial Crisis”

Mr. Kailash Patidar ,Mr. Ravindra Gupta et. Al. “Integrating the

Trusted Computing Platform into the Security of Cloud Computing

System”, International Journal of Advanced Research in Computer

Science and Software Engineering Volume 2, Issue 2, February 2012

ISSN: 2277 128X .

Richard Chow, Philippe Golle et. Al. “Controlling Data in the Cloud:

Outsourcing Computation without Outsourcing Control”

Samir Tout, “Cloud Computing and its Security in Higher Education”

Trusted Computing Group, ”Cloud Computing and Security – A

Natural Match”

Wayne A. Jansen, “Cloud Hooks: Security and Privacy Issues in

Cloud Computing”, NIST Proceedings of the 44th Hawaii International

Conference on System Sciences – 2011

Yu-Chao Liu; Yu-Tao Ma et. Al “A Method for Trust Management in

Cloud Computing: Data Coloring by Cloud Watermarking”,

International Journal of Automation and Computing 8(3), August

, 280-285 DOI: 10.1007/s11633-011-0583-3

Zhidong Shen, “The Security of Cloud Computing System Enabled

by Trusted Computing Technology”, 2010 2nd International

Conference on Signal Processing Systems


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.