A survey on User's security in cloud

Cloud computing is a new wave in the field of information technology. Some see it as an emerging field in computer science. It consists of a set of resources and services offered through the Internet. Hence, “cloud computing” is also called “Internet computing.” The word “cloud” is a metaphor for describing the Web as a space where computing has been preinstalled and exists as a service. Operating systems, applications, storage, data, and processing capacity all exist on the Web, ready to be shared among users [1].

[1]  Arun Katara,et al.  A New Technique of Data Integrity for Analysis of the Cloud Computing Security , 2013, 2013 5th International Conference on Computational Intelligence and Communication Networks.

[2]  HoonJae Lee,et al.  Secure storage and access of data in cloud computing , 2012, 2012 International Conference on ICT Convergence (ICTC).

[3]  Issa M. Khalil,et al.  Security Concerns in Cloud Computing , 2013, 2013 10th International Conference on Information Technology: New Generations.

[4]  Abdulmotaleb El-Saddik,et al.  Three-Dimensional Password for More Secure Authentication , 2008, IEEE Transactions on Instrumentation and Measurement.

[5]  Shraddha M. Gurav,et al.  Graphical Password Authentication: Cloud Securing Scheme , 2014, 2014 International Conference on Electronic Systems, Signal Processing and Computing Technologies.

[6]  Matthew N. O. Sadiku,et al.  Cloud Computing: Opportunities and Challenges , 2014, IEEE Potentials.