IJSTR

International Journal of Scientific & Technology Research

IJSTR@Facebook IJSTR@Twitter IJSTR@Linkedin
Home About Us Scope Editorial Board Blog/Latest News Contact Us
CALL FOR PAPERS
AUTHORS
DOWNLOADS
CONTACT
QR CODE
IJSTR-QR Code

IJSTR >> Volume 6 - Issue 1, January 2017 Edition



International Journal of Scientific & Technology Research  
International Journal of Scientific & Technology Research

Website: http://www.ijstr.org

ISSN 2277-8616



Analysis On Security Of Cloud Computing

[Full Text]

 

AUTHOR(S)

Muhammad Zunnurain Hussain, Muhammad Zulkifl Hasan

 

KEYWORDS

 

ABSTRACT

In this paper, Author will be discussing the security issues and challenges faced by the industry in securing the cloud computing and how these problems can be tackled. Cloud computing is modern technique of sharing resources like data sharing, file sharing, basically sharing of resources without launching own infrastructure and using some third party resources to avoid huge investment . It is very challenging these days to secure the communication between two users although people use different encryption techniques [1].

 

REFERENCES

[1] G. Kulkarni, J. Gambhir, T. Patil and A. Dongare, "A security aspects in cloud computing," in Software Engineering and Service Science (ICSESS), 2012 IEEE 3rd International Conference on, 2012, pp. 547-550.

[2] F. B. Shaikh and S. Haider, "Security threats in cloud computing," in Internet Technology and Secured Transactions (ICITST), 2011 International Conference for, 2011, pp. 214-219.

[3] Y. Chen, V. Paxson and R. H. Katz, "What’s new about cloud computing security?" University of California, Berkeley Report no.UCB/EECS-2010-5 January, vol. 20, pp. 2010-2015, 2010.

[4] L. Arockiam, S. Monikandan and G. Parthasarathy, "Cloud computing: A survey," in Proceedings of International Conference on Computer Science and Engineering, Bangalore, India, 2011, pp. 67-74.

[5] T. Andrei and R. Jain, "Cloud computing challenges and related security issues," A Survey Paper.DOI= Http://www.Cse.Wustl.Edu/~ jain/cse571-09/ftp/cloud.Pdf, 2009.

[6] R. Chow, P. Golle, M. Jakobsson, E. Shi, J. Staddon, R. Masuoka and J. Molina, "Controlling data in the cloud: Outsourcing computation without outsourcing control," in Proceedings of the 2009 ACM Workshop on Cloud Computing Security, Chicago, Illinois, USA, 2009, pp. 85-90.