A Review on Multiple Layer Security of Cloud Server

Sanjeev Kumar, Mukesh Kumar

Abstract


Cloud services[1] are offering flexible & scalable services. But there is always issue of security. When data is transferred from centrally located server storage to different cloud compromise of person & private data would increase.  There is always risk to confidentiality & availability of data prior to selecting a cloud vender or choosing own cloud & cloud service migration. Cloud services usually have their security concerns that must be addressed. In this paper we have discussed threats to cloud service & data in case of conventional security system & modern security system & proposed an idea to secure data on cloud using multiple layers of security.

Full Text:

PDF

References


Peter mill & Tim grance, The NIST Definition of Cloud Computing, 2011, National Institute of Standards & Technology, Gaitherbsburg, MD 20899-8930, NIST.

In April 2001 by Ben Y. Zhao, Anthony Joseph and John Kubiatowicz. Tapestry: The infrastructure for fault tolerant and wide-area location and routing.

Ellen Messmer New security demands arising for virtualization, cloud computing, 2011,security demands arising for the purpose of virtualization cloud computing.html

Sumedha Kaushik & Ankur Singhal, Network Security Using Cryptographic Techniques 2012, volume 2, Issue 12.

Charles Miers & Marcos Simplicio, A quantitative analysis of current security concerns & solutions for cloud computing in 2012.

Nelson Gonzalez. , A quantitative analysis with 7s of the current security concerns & solutions in case of cloud computing in 2012, The Journal of Cloud Computing: Advances, Systems & Applications, The electronic version of this article is complete one & could be found online

Security Guidance for Critical Areas of Focus in Cloud Computing in 2009, Tech. rep., Cloud Security Alliance.

In June 1997 by Andrea W. Richa Rajmohan Rajaraman C. Greg Plaxton,. To Access the nearby copies of replicated objects in the distributed environment.

In July2001 M. Frans Kaashoek ,Stefan Saroiu Steven D. Gribble and , P. Krishna Gummadi . The Measurement Study of the Peer-to- Peer File Sharing

Hu, Tung-Hui (2015). A Prehistory of the Cloud. MIT Press. ISBN 978-0-262-02951-3.

Dario Bruneo, Francesco Longo, Antonio Puliafito, Salvatore Distefano, Marco Scarpa: Workload-Based Software Rejuvenation in Cloud Systems. IEEE Trans: 1072–1085 in 2013

He, Sijin; L. Guo; Y. Guo; C. Wu; M. Ghanem; R. Han. Elastic Application Container: A Lightweight Approach for Cloud Resource Provisioning. 2012 IEEE 26th International Conference on Advanced Information Networking and Applications ISBN 978-1-4673-0714-7.

Marston, Sean; Bandyopadhyay, Li, Zhi; Subhajyoti; Ghalsasi, Anand; Zhang, Juheng. Cloud computing : The business perspective. Decision Support Systems. 51: 176–189.

Evolution of Cloud Computing. Retrieved 22 Apr 2015.

Disadvantages of Cloud Computing (Part 1) - Limited control and flexibility. www.cloudacademy.com. Retrieved 3 Nov 2013

Dario Bruneo, Salvatore Distefano,Francesco Longo, Antonio Puliafito, Marco Scarpa: Workload Based Software Rejuvenation in Cloud Systems. IEEE Trans. Computers: 1072–1085 (2013)

King, Rachael. Cloud Computing: Small Companies Take Flight. Bloomberg BusinessWeek. Retrieved 22 August 2010.

http://www.infoexchangeja.com/uploads/blog_thumbs/secure_hybrid_cloud.jpg

http://surfcloudtech.com/wp-content/uploads/2017/01/Cloud-Computing-Deployment-Models.png

https://grupodigitexblog.files.wordpress.com/2016/07/cloud-computing.jpg

https://lauriemccabe.files.wordpress.com/2012/09/slide3.png

https://i.stack.imgur.com/SnHH2.png

https://www.tutorialspoint.com/cryptography/images/encryption_scheme.jpg




DOI: https://doi.org/10.23956/ijarcsse/V7I5/0181

Refbacks

  • There are currently no refbacks.




© International Journals of Advanced Research in Computer Science and Software Engineering (IJARCSSE)| All Rights Reserved | Powered by Advance Academic Publisher.