Paper Title : A Survey on Cloud Security Threats and Solution for Secure Data in Data Stages
ISSN : 2394-2231
Year of Publication : 2021
10.29126/23942231/IJCT-v8i2p36
MLA Style: BL.Nithiasree, BL.Raam Prakash, R.Shenbaga Sundar " A Survey on Cloud Security Threats and Solution for Secure Data in Data Stages " Volume 8 - Issue 2 March-April , 2021 International Journal of Computer Techniques (IJCT) ,ISSN:2394-2231 , www.ijctjournal.org
APA Style: BL.Nithiasree, BL.Raam Prakash, R.Shenbaga Sundar " A Survey on Cloud Security Threats and Solution for Secure Data in Data Stages " Volume 8 - Issue 2 March-April , 2021 International Journal of Computer Techniques (IJCT) ,ISSN:2394-2231 , www.ijctjournal.org
Abstract
This paper has comprehensively identified and discover vital security issues and challenges in front of cloud computing and proposed the model for cloud data security in three data stages, data-in-transit, data-in-rest, data-in-use. This paper contains four main segment, infrastructure of cloud computing, cloud security threats, vulnerability, and solution for cloud data security. First, it described the cloud service model and deployment model of cloud. Second, it explored the threats in cloud security. Third, it explored the vulnerability of cloud security. This paper has proposed the three-stage data security model in cloud computing.
Reference
[1] Keiko Hashizume, David G Rosado, Eduardo Fernández-Medina, Eduardo B Fernandez, "An analysis of security issues for cloud computing", Journal of Internet Services and Applications 2013, 4:5 . [2] Hassan Takabi , James B.D. Joshi, Gail Joon Ahn , ”Cloud Computing Security and Privacy Challenges in Cloud Computing Environments ", COPUBLISHED BY THE IEEE COMPUTER AND RELIABILITY SOCIETIES,1540- 7993/10/$26.00 © 2010 IEEE. [3] Mahesh U. Shankarwar and Ambika V. Pawar, "Security and Privacy in Cloud Computing: A Survey", Proc. of the 3rd Int. Conf. on Front. of Intell. Comput. (FICTA) 2014. [4] Nidal Hassan and Hussein Ahmed Khalid,” A survey of Cloud Computing Security challenges and solutions” International Journal of Computer Science and Information Security (IJCSIS), Vol. 14, No. 1, January 2016. [5] S. Venkata Krishna Kumar and S.Padmapriya , “A Survey on Cloud Computing Security Threats and Vulnerabilities” , INTERNATIONAL JOURNAL OF INNOVATIVE RESEARCH IN ELECTRICAL, ELECTRONICS, INSTRUMENTATION AND CONTROL ENGINEERING Vol. 2, Issue 1, January 2014 Copyright to IJIREEICE www.ijireeice.com 622. [6] Dahbur, K., Mohammad, B., "A Survey of Risks, Threats and Vulnerabilities in Cloud Computing.", Int Conference on Intelligent Semantic Web-Services and Applications, 2011, URL: http://www.jisajournal.com/content/4/1/5 [7] Latif, R., Abbas, H., Assar, S., Ali, Q., "Cloud computing risk assessment: a systematic literature review", Future Information Technology, pp. 285-295, Springer, Berlin, Germany, 2014., URL: http://www.researchgate.net/profile/Haider_Abbas8/publication /259221049_Cloud_Computing_Risk_Assessment_A_Systematic_Literature _Review/links /0a85e53328b478e2cb000000.pdf. [8] Bhadauria, Rohit, Sanyal, Sugata, "Survey on Security Issues in Cloud Computing and Associated Mitigation Techniques", Intl. Journal of Computer Applications, Vol. 47, No. 18, pp. 47-66., Foundation of Computer Science, New York, USA, URL: http://arxiv.org /pdf/1204.0764.pdf.
Keywords
—— Cloud infrastructure Models, cloud Security Threats, Vulnerability, three-stage security of data.