Security enhancement in Cloud Computing

Authors

  • Pooja Bansal

Keywords:

Cloud Server, Encryption, Deployment Model

Abstract

Cloud computing makes it possible to use Internet-based apps as utilities. It gives us the ability to design, configure, and personalise our apps in real time through the internet. Using cloud computing, customers may store and execute programmes on a virtual computer infrastructure. Because cloud service providers may access and modify client data without their knowledge or consent, there are additional security risks associated with using the service. We're working to balance security, efficiency, and usability while developing cryptographic primitives and protocols for the cloud. Using cryptography, data may be encoded such that only the intended recipients can access it and process it.

References

Amazon. (2011). Amazon Web Services: Overview of Security Processes. Retrieved from

http://media.amazonwebservices.com/pdf/AWS_Security_Whitepaper.pdf

Arora, P., Biyani, R. and Dave, S. (2011). To the cloud:Cloud powering an enterprise. McGraw-Hill. Buck, K. and Hanf, D. (2009).

Mitre cloud computing series, Cloud SLA considerations for the government consumer. Retrieved from

http://www.mitre.org/work/tech_papers/2010/10_2902/cloud_sla_considerations_government.pdf

Introduction to Cryptography

http://en.wikipedia.org/wiki/Cryptography

Traditional Cloud server security

http://cloudsecuritythreats.blogspot.in/2011/11/traditional-security.html

Fundamentals of Cryptography: Algorithm and Security Services by Professor Guevara Noubir

http://www.ccs.neu.edu/home/noubir/Courses/CSU610/S06/cryptography.pdf

Logik Bomb: Hacker's Encyclopedia (1997)

Hafner, Katie; Markoff, John (1991). Cyberpunk: Outlaws and Hackers on the Computer Frontier. New York: Simon & Schuster. ISBN 0-671-68322-5.

Sterling, Bruce (1992). The Hacker Crackdown. Bantam. ISBN 0-553-08058-X.

Slatalla, Michelle; Joshua Quittner (1995). Masters of Deception: The Gang That Ruled Cyberspace. HarperCollins. ISBN 0-06-017030-1.

Dreyfus, Suelette (1997). Underground: Tales of Hacking, Madness and Obsession on the Electronic Frontier. Mandarin. ISBN 1-86330-595-5.

Verton, Dan (2002). The Hacker Diaries : Confessions of Teenage Hackers. McGraw-Hill Osborne Media. ISBN 0-07-222364-2.

Thomas, Douglas (2002). Hacker Culture. University of Minnesota Press. ISBN 0-8166-3345-2.

Taylor, Paul A. (1999). Hackers: Crime in the Digital Sublime. Routledge. ISBN 978-0-415-18072-6.

Downloads

Published

31-12-2016

How to Cite

Pooja Bansal. (2016). Security enhancement in Cloud Computing. International Journal for Research Publication and Seminar, 7(9), 202–205. Retrieved from https://jrps.shodhsagar.com/index.php/j/article/view/1076

Issue

Section

Original Research Article