A study in data security in cloud computing

The vision of 21st century computing is that users can access Internet services over lightweight portable devices rather than via variants of the traditional desktop computer. Consequently, users will have no interest in large, powerful machines. How, then, will computing power be provided? The answer to this question lies in cloud computing. Cloud computing is a recent trend in IT in which computing power and knowledge are moved away from the desktop and desktop PCs into giant datacenters. In the cloud computing paradigm, applications are delivered as services over the Internet. The key driving forces behind cloud computing are the presence of broadband and wireless networking, falling storage prices, and progressive enhancements in Internet computing software packages. Cloud service shoppers can add additional capabilities at peak demand, reduce prices, experiment with new services, and remove unessential capabilities. Service suppliers can increase utilization via multiplexing and allow for larger investments in software packages and hardware.

[1]  Dongho Won,et al.  Security Controls Based on K-ISMS in Cloud Computing Service , 2014 .

[2]  Meredith Ringel Morris,et al.  To search or to ask: the routing of information needs between traditional search engines and social networks , 2014, CSCW.

[3]  Dan Simon,et al.  Extensible Authentication Protocol (eap) Key Management Framework , 2007 .

[4]  John R. Vacca Computer and Information Security Handbook , 2009 .

[5]  M. Roberts Masillamani,et al.  Intrusion Detection in Cloud Computing Implementation of (SAAS & IAAS) Using Grid Environment , 2014 .

[6]  Nabil Sultan,et al.  loud computing for education : A new dawn ? , 2009 .

[7]  V. Kavitha,et al.  A survey on security issues in service delivery models of cloud computing , 2011, J. Netw. Comput. Appl..

[8]  Bofeng Zhang,et al.  Comparison of Several Cloud Computing Platforms , 2009, 2009 Second International Symposium on Information Science and Engineering.

[9]  Paul Ayers Securing and controlling data in the cloud , 2012 .

[10]  Haider Abbas,et al.  Cloud Computing Risk Assessment: A Systematic Literature Review , 2014 .

[11]  Jinho Hwang Improving and repurposing data center resource usage with virtualization , 2014 .

[12]  Cong Wang,et al.  Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing , 2010, 2010 Proceedings IEEE INFOCOM.

[13]  Pasi Tyrväinen,et al.  Role of acquisition intervals in private and public cloud storage costs , 2014, Decis. Support Syst..

[14]  Sumit Goyal,et al.  Public vs Private vs Hybrid vs Community - Cloud Computing: A Critical Review , 2014 .

[15]  Randy H. Katz,et al.  A view of cloud computing , 2010, CACM.