Journal of Engineering and Applied Sciences

Year: 2017
Volume: 12
Issue: 11 SI
Page No. 9220 - 9226

A Study on State of the Art in Security and Privacy Issues on Cloud Computing

Authors : Abdulaziz Aldaej, Ravichandran , Mohammed Gulam Ahamad and M.R. Ashwin Dhivakar

References

Aljoumah, E., A.F. Mousawi, I. Ahmad, A.M. Shammri and A.Z. Jady, 2015. SLA in cloud computing architectures: A comprehensive study. Intl. J. Grid Distrib. Comput., 8: 7-32.

Biancheri, C. and M.R. Dagenais, 2016. Fine-grained multilayer virtualized systems analysis. J. Cloud Comput. Adv. Syst. Appl., 5: 1-14.
CrossRef  |  Direct Link  |  

Brey, P., 2007. Ethical Aspects of Information Security and Privacy. In: Security, Privacy and Trust in Modern Data Management, Petkovic, M. and W. Jonker (Eds.). Springer, Berlin, Germany, ISBN:978-3-540-69860-9, pp: 21-36.

Cayirci, E., A. Garaga, D.A.S. Oliveira and Y. Roudier, 2016. A risk assessment model for selecting cloud service providers. J. Cloud Comput. Adv. Syst. Appl., 5: 2-12.
CrossRef  |  Direct Link  |  

Chen, Y., V. Paxson and R.H. Katz, 2010. What’s new about cloud computing security. Master Thesis, University of California, Berkeley Berkeley, California.

Denz, R. and S. Taylor, 2013. A survey on securing the virtual cloud. J. Cloud Comput. Adv. Syst. Appl., 2: 2-9.
CrossRef  |  Direct Link  |  

Endo, P.T., M. Rodrigues, G.E. Gonçalves, J. Kelner and D.H. Sadok et al., 2016. High availability in clouds: Systematic review and research challenges. J. Cloud Comput. Adv. Syst. Appl., 5: 1-2.
CrossRef  |  Direct Link  |  

Gonzalez, N., C. Miers, F. Redigolo, M. Simplicio and T. Carvalho et al., 2012. A quantitative analysis of current security concerns and solutions for cloud computing. J. Cloud Comput. Adv. Syst. Appl., 1: 1-18.
CrossRef  |  Direct Link  |  

Halpert, B., 2011. Auditing Cloud Computing: A Security and Privacy Guide. John Wiley & Sons, Hoboken, New Jersey, ISBN:978-0-470-87474-5, Pages: 207.

Hashizume, K., D.G. Rosado, E. Fernandez-Medina and E.B. Fernandez, 2013. An analysis of security issues for cloud computing. J. Internet Services Applic. 10.1186/1869-0238-4-5

Huang, J. and D.M. Nicol, 2013. Trust mechanisms for cloud computing. J. Cloud Comput., 2: 1-14.
CrossRef  |  Direct Link  |  

Jaatun, M.G., C. Lambrinoudakis and C. Rong, 2012. Special issue on security in cloud computing. J. Cloud Comput. Adv. Syst. Appl., 1: 1-2.
CrossRef  |  Direct Link  |  

Kandukuri, B.R., V.R. Paturi and A. Rakshit, 2009. Cloud security issues. Proceedings of the IEEE International Conference on Services Computing, September 21-25, 2009, Bangalore, India, pp: 517-520.

Kaufman, L.M., 2009. Data security in the world of cloud computing. IEEE Secur. Privacy, 7: 61-64.
CrossRef  |  Direct Link  |  

Liu, F., L. Ren and H. Bai, 2014. Mitigating cross-VM side channel attack on multiple tenants cloud platform. J. Comput. Acad., 9: 1005-1013.
CrossRef  |  Direct Link  |  

Luo, S., Z. Lin, X. Chen, Z. Yang and J. Chen, 2011. Virtualization security for cloud computing service. Proceedings of the 2011 International Conference on Cloud and Service Computing, December 12-14, 2011, IEEE., Hong Kong, China, pp: 174-179.

Mather, T., S. Kumaraswamy and S. Latif, 2009. Cloud Security and Privacy. O’Reilly Media, Sebastopol, California, USA., ISBN:9780596807504, Pages: 312.

Mell, P. and T. Grance, 2011. The NIST definition of cloud computing recommendations of the national institute of standards and technology. Nist Spec. Publ., 145: 1-7.
Direct Link  |  

Mosa, A. and N.W. Paton, 2016. Optimizing virtual machine placement for energy and SLA in clouds using utility functions. J. Cloud Comput. Adv. Syst. Appl., 5: 2-17.
CrossRef  |  Direct Link  |  

Nagaraju, S. and L. Parthiban, 2015. Trusted framework for online banking in public cloud using multi-factor authentication and privacy protection gateway. J. Cloud Comput. Adv. Syst. Appl., 4: 1-22.
CrossRef  |  Direct Link  |  

Nikravesh, A.Y., S.A. Ajila and C.H. Lung, 2017. An autonomic prediction suite for cloud resource provisioning. J. Cloud Comput., 6: 1-20.
CrossRef  |  Direct Link  |  

Ouedraogo, M., S. Mignon, H. Cholez, S. Furnell and E. Dubois, 2015. Security transparency: The next frontier for security research in the cloud. J. Cloud Comput. Adv. Syst. Appl., 4: 1-14.
CrossRef  |  Direct Link  |  

Pearson, S. and A. Benameur, 2010. Privacy, security and trust issues arising from cloud computing. Proceedings of the 2010 IEEE 2nd International Conference on Cloud Computing Technology and Science, November 30-December 3, 2010, IEEE, Indianapolis, Indiana, ISBN:978-1-4244-9405-7, pp: 693-702.

Razaque, A. and S.S. Rizvi, 2017. Privacy preserving model: A new scheme for auditing cloud stakeholders. J. Cloud Comput. Adv. Syst. Appl., 6: 1-17.
CrossRef  |  Direct Link  |  

Sharkh, M.A., A. Shami and A. Ouda, 2017. Optimal and suboptimal resource allocation techniques in cloud computing data centers. J. Cloud Comput. Adv. Syst. Appl., 6: 1-17.
CrossRef  |  Direct Link  |  

Subashini, S. and V. Kavitha, 2011. A survey on security issues in service delivery models of cloud computing. J. Network Comput. Appl., 34: 1-11.
CrossRef  |  

Wang, C., Q. Wang, K. Ren and W. Lou, 2010. Privacy-preserving public auditing for data storage security in cloud computing. Proceedings of the 2010 IEEE Conference on INFOCOM, March 14-19, 2010, IEEE, San Diego, California, pp: 1-9.

Zhang, Q., L. Cheng and R. Boutaba, 2010. Cloud computing: State-of-the-art and research challenges. J. Internet Serv. Applic., 1: 7-18.
CrossRef  |  Direct Link  |  

Zhang, Y., A. Juels, M.K. Reiter and T. Ristenpart, 2012. Cross-VM side channels and their use to extract private keys. Proceedings of the 2012 ACM Conference on Computer and Communications Security, October 16-18, 2012, Raleigh, NC., USA., pp: 305-316.

Zissis, D. and D. Lekkas, 2012. Addressing cloud computing security issues. Future Gener. Comput. Syst., 28: 583-592.
CrossRef  |  Direct Link  |  

Design and power by Medwell Web Development Team. © Medwell Publishing 2024 All Rights Reserved