International Journal of Scientific & Technology Research

Home About Us Scope Editorial Board Contact Us

IJSTR >> Volume 6 - Issue 1, January 2017 Edition

International Journal of Scientific & Technology Research  
International Journal of Scientific & Technology Research

Website: http://www.ijstr.org

ISSN 2277-8616

Analysis On Security Of Cloud Computing

[Full Text]



Muhammad Zunnurain Hussain, Muhammad Zulkifl Hasan





In this paper, Author will be discussing the security issues and challenges faced by the industry in securing the cloud computing and how these problems can be tackled. Cloud computing is modern technique of sharing resources like data sharing, file sharing, basically sharing of resources without launching own infrastructure and using some third party resources to avoid huge investment . It is very challenging these days to secure the communication between two users although people use different encryption techniques [1].



[1] G. Kulkarni, J. Gambhir, T. Patil and A. Dongare, "A security aspects in cloud computing," in Software Engineering and Service Science (ICSESS), 2012 IEEE 3rd International Conference on, 2012, pp. 547-550.

[2] F. B. Shaikh and S. Haider, "Security threats in cloud computing," in Internet Technology and Secured Transactions (ICITST), 2011 International Conference for, 2011, pp. 214-219.

[3] Y. Chen, V. Paxson and R. H. Katz, "What’s new about cloud computing security?" University of California, Berkeley Report no.UCB/EECS-2010-5 January, vol. 20, pp. 2010-2015, 2010.

[4] L. Arockiam, S. Monikandan and G. Parthasarathy, "Cloud computing: A survey," in Proceedings of International Conference on Computer Science and Engineering, Bangalore, India, 2011, pp. 67-74.

[5] T. Andrei and R. Jain, "Cloud computing challenges and related security issues," A Survey Paper.DOI= Http://www.Cse.Wustl.Edu/~ jain/cse571-09/ftp/cloud.Pdf, 2009.

[6] R. Chow, P. Golle, M. Jakobsson, E. Shi, J. Staddon, R. Masuoka and J. Molina, "Controlling data in the cloud: Outsourcing computation without outsourcing control," in Proceedings of the 2009 ACM Workshop on Cloud Computing Security, Chicago, Illinois, USA, 2009, pp. 85-90.