Google scholar arxiv informatics ads IJAIS publications are indexed with Google Scholar, NASA ADS, Informatics et. al.

Call for Paper

-

August Edition 2021

International Journal of Applied Information Systems solicits high quality original research papers for the August 2021 Edition of the journal. The last date of research paper submission is July 15, 2021.

A Study on Security and Privacy Issues of Cloud Eco-System

Manu A. R, V. K Agrawal, K N Bala Subramanya Murthy Published in Security

International Journal of Applied Information Systems
Year of Publication: 2013
© 2012 by IJAIS Journal
10.5120/ijais13-450931
Download full text
  1. Manu A R, V K Agrawal and Bala Subramanya K N Murthy. Article: A Study on Security and Privacy Issues of Cloud Eco-System. International Journal of Applied Information Systems 5(5):28-37, April 2013. BibTeX

    @article{key:article,
    	author = "Manu A. R and V. K Agrawal and K N Bala Subramanya Murthy",
    	title = "Article: A Study on Security and Privacy Issues of Cloud Eco-System",
    	journal = "International Journal of Applied Information Systems",
    	year = 2013,
    	volume = 5,
    	number = 5,
    	pages = "28-37",
    	month = "April",
    	note = "Published by Foundation of Computer Science, New York, USA"
    }
    

Abstract

Cloud computing is an Internet-based model for enabling appropriate on - demand network gateway to the pooled setup of computing resources and related infrastructure on sharing basis. Cloud computing offers four broad categories of services namely, IaaS, PaaS, DSaaS and SaaS. In these cloud services, individuals and organizations usually face security, privacy and trust challenges. Most of the R & D centers and researchers across the world are working towards resolving these security issues and achieving the trust among each other. In this paper we present a framework for unified security design which may help to resolve privacy, trust and security challenges that are faced in cloud- based networks. We also expect that this would help us to understand existing security challenges, while trying to achieve common standards for secure cloud services, design secure cloud transmission protocol, and devise an algorithm in this regard.

Reference

  1. National Institute of Standards & Technology, Definition and standards, on cloud computing.
  2. N. Sarat Chandra Babu, "Cloud Security", CSI. Proceedings of the international conference on advances in cloud computing, ACC-2012, July 26-28.
  3. Security Guidance for Critical Areas of Focus in Cloud Computing - CSA.
  4. Whitehall drives open standards compliance regime
  5. David Bicknell Published 01 November 2012.
  6. "The-Emergence-of-As-A-Service-Offerings-That-Are-Not-Cloud-Services", Business & Technology Sourcing Review - Issue 18, 19 Dec 2012.
  7. White paper "The Seven Standards of Cloud Computing Service Delivery" - Salesforce
  8. Dinesha H A, V. K Agrawal "Framework Design of Secure Cloud Transmission Protocol", IJCSI, Vol. 10, Issue 1, No 1, January 2013
  9. Government of Saskatchewan Reference document – Plan and annual Report, Comprehensive guidelines
  10. CONCURRENT JURISDICTION PLANNING, GUIDELINES,AND APPLICATION - MICHIGAN SUPREME COURT, State Court Administrative Office
  11. N. Sarat Chandra Babu, Cloud Computing Overview National Workshop on Cloud Computing, 21st May 2011 C-DAC, KP, Bengaluru
  12. Slidesharenet "Cloud computing vision and strategy feb -2010, GSA draft.
  13. Scribd- doc-48631944-1-Cloud-Computing.
  14. Principles of practices of information security – Michael E. Whitman, Herbert J. Mattord. Cengage learing, India edition.
  15. "Planning Guide Cloud Security", Seven Steps for Building Security in the Cloud from the Ground Up, Intel
  16. Planning for Security – VTU elearning Dr. Nalini N. Prof. & Head, Dept of CSE,NMIT,Bangalore
  17. HTTP: Communication Technology Proceedings-2003. ICCT 2003. International Conference on Study on conformance testing of hypertext transfer protocol by Xiaoli Yu; Jianping Wu; Xia Yin; Dept. of Computer. Sci. , Tsinghua Univ. , Beijing, China.
  18. Microsoft -licensing-options and enrollments.
  19. Security Challenges with Virtualization – Thesis by Hans Peter Reiser
  20. Mihai Christodorescu, Reiner Sailer, Douglas Lee Schales, Daniele Sgandurra, Diego Zamboni, "Cloud Security Is Not (Just) Virtualization Security", CSE-PSU, IBM T. J. Watson Research
  21. "Security in Inter Cloud",
  22. Wikipedia – "Cloud_computing_security".
  23. Ibm developer works-websphere-techjourna--0904_amrhein.

Keywords

Cloud Computing, Challenges, Security and Privacy Issues