Open Access Open Access  Restricted Access Subscription or Fee Access

QoS of Security Threats and Solution in Cloud Computing Organization

M. Bhavani Preetha


Cloud computing was used to deliver a service through a network. Generally, it used for storing data and accessing services over through Internet. The cloud service models are Infrastructure as a service (IaaS), Platform as a service (PaaS), Software as a service (SaaS), Storage as a service, and Desktop as a service. Cloud basic characteristics are maintenance, performance, security and cost reduction. The most popular cloud service providers are AWS (Amazon Web Services) and IBM. Cloud deployment models are Private, Public, Hybrid and Community cloud. Cloud services major drawbacks are security. Since many cloud providers shares users data to third parties. This paper mainly focus on how to secure users data which are stored under cloud organization. Since, quality of the cloud service provider was standardized by security. Here, algorithm used RSA (Rivest-Shamir Adleman) algorithm. It was an public key encryption technology. By developing the strong login process by encrypting data and providing security alerts in case of emergency.


Cloud Computing, Cloud Provider, Service Model, Deployment Model, RSA Algorithm, Security.

Full Text:



Kuyoro S.O, Ibikunle F, Awodele O,” Cloud computing security issues and challenges”, International Journal of computer networks(IJCN), Vol.3: issue (5):2011.

RachnaArora, AnshuParashar,” Secure User Data In Cloud Computing Using Encryption Algorithms”, International Journal of Engineering Research and Applications (IJERA), Vol. 3, Issue 4, Jul-Aug 2013.

Joshna S1, Manjula P2,” Challenges and Security Issues in Cloud Computing”, International Journal of Computer Science and Mobile Computing, Vol.3 Issue.4, April- 2014.

Te-Shun Chou,” Security Threats On Cloud Computing Vulnerabilities”, International Journal of Computer Science & Information Technology (IJCSIT) Vol.5, No 3, June 2013

Kangchan Lee,” Security Threats in Cloud Computing Environments”, International Journal of Security and Its Applications Vol. 6, No. 4, October, 2012.

VenkataNarasimhaInukollu, Sailaja Arsi and Srinivasa Rao Ravuri, “Security Issues Associated With Big Data In Cloud Computing”,International Journal of Network Security & Its Applications (IJN SA), Vol.6, No.3, May 2014.

Waghamare Amol Arjun,”A Secure Hybrid Cloud Approach to Avoid Deduplication”, International Journal of Computer Science and Mobile Computing, Vol.4, April 2015.

P. Ramadevi, N.Siddaiah,”Cloud Computing Protection for Outsourced Record in Cloud Computing”, International Journal of Innovative Technologies, Vol.04, July 2016.

Yunchuan sun, Junsheng zhang, Yo ngping xiong, and Guangyu zhu,” Data Sucurity and Privacy in Cloud Computing”, International Journalcof Distributed Sensor Networks, Vol . 2014.

Swapnila S. Mirajkar, Shweta R. Kakade,” Cloud Computing Security Improvement using Secret Sharing Algorithm”, IJSART Vol.1, December 2015.

Shivam Sharma,” Cloud Computing Security Challenges and Solutions”, International Research Journal of Computer Science, Vol.5, February 2018.

NH Hussein, A Khalid “A survey of cloud computing security challenges and solutions”, International Journal of Computer Science and Information Security, Vol.14, No.1, January 2016.

A Patel, M Patel,PK Singh ”Study of security in the hybrid cloud”, International journal for research in advanced computer science and engineering,vol.2,February 2016.

Dapinder Singh, Megha Chhabra “Secure Server Provisioning and Communication Mechanism in Cloud”, International Journal of Advanced Research in Computer Science and Software Engineering, Vol.5, Issues 4,2015.

Zhifeng Xiao, Yang Xiao” Security and Privacy in Cloud Computing”, IEEE Communications Surveys & Tutorials, Vol.15, No.2, Second Quarter 2013.


  • There are currently no refbacks.

Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.