Open Access   Article Go Back

An analysis On Security Concerns and Their Possible Solutions in Cloud Computing Environment

Naveen Chandra1 , Parag Rastogi2 , Amit Asthana3

  1. Department of CSE, SITE, Swami Vivekanand Subharti University, Meerut (UP), India.
  2. Department of CSE, SITE, Swami Vivekanand Subharti University, Meerut (UP), India.
  3. Department of CSE, SITE, Swami Vivekanand Subharti University, Meerut (UP), India.

Section:Review Paper, Product Type: Journal Paper
Volume-6 , Issue-3 , Page no. 408-413, Mar-2018

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v6i3.408413

Online published on Mar 30, 2018

Copyright © Naveen Chandra, Parag Rastogi, Amit Asthana . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Naveen Chandra, Parag Rastogi, Amit Asthana, “An analysis On Security Concerns and Their Possible Solutions in Cloud Computing Environment,” International Journal of Computer Sciences and Engineering, Vol.6, Issue.3, pp.408-413, 2018.

MLA Style Citation: Naveen Chandra, Parag Rastogi, Amit Asthana "An analysis On Security Concerns and Their Possible Solutions in Cloud Computing Environment." International Journal of Computer Sciences and Engineering 6.3 (2018): 408-413.

APA Style Citation: Naveen Chandra, Parag Rastogi, Amit Asthana, (2018). An analysis On Security Concerns and Their Possible Solutions in Cloud Computing Environment. International Journal of Computer Sciences and Engineering, 6(3), 408-413.

BibTex Style Citation:
@article{Chandra_2018,
author = {Naveen Chandra, Parag Rastogi, Amit Asthana},
title = {An analysis On Security Concerns and Their Possible Solutions in Cloud Computing Environment},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {3 2018},
volume = {6},
Issue = {3},
month = {3},
year = {2018},
issn = {2347-2693},
pages = {408-413},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=1818},
doi = {https://doi.org/10.26438/ijcse/v6i3.408413}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i3.408413}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=1818
TI - An analysis On Security Concerns and Their Possible Solutions in Cloud Computing Environment
T2 - International Journal of Computer Sciences and Engineering
AU - Naveen Chandra, Parag Rastogi, Amit Asthana
PY - 2018
DA - 2018/03/30
PB - IJCSE, Indore, INDIA
SP - 408-413
IS - 3
VL - 6
SN - 2347-2693
ER -

VIEWS PDF XML
565 431 downloads 264 downloads
  
  
           

Abstract

Cloud computing offers services with much flexibility and very less infrastructure because of the distributed structure of cloud computing, this technology is used by an increasing number of end users. On the other hand, cloud computing presents an added level of risk because clouds are distributed in nature, so it becomes an easy targets for the intruders to exploit the vulnerabilities of the network. Therefore in this paper we have discussed the need of security mentioning different types of attacks which affect the availability, confidentiality and integrity of resources and services in cloud computing environment and suggested the cloud providers to protect the user data and information from inside or outside attacks by installing an intrusion detection and prevention system.

Key-Words / Index Term

Cloud Computing, Attacks, Intrusion Detection System, Intrusion Prevention System

References

[1] Zhao G, Liu J, Tang Y, Sun W, Zhang F, Ye X, Tang N (2009) Cloud Computing: A Statistics Aspect of Users. First International Conference on Cloud Computing (CloudCom), Beijing, China. Springer Berlin, Heidelberg, pp. 347-358.


[2] Zhang S, Zhang S, Chen X, Huo X(2010) Cloud Computing Research and Development Trend in Second International Conference on Future Networks, Sanya, Henan, China, IEEE Computer Society, Washington, DC, USA, pp. 93-97

[3] B R. Kandukuri, R. Paturi V.and A. Rakshit, “Cloud Security Issues,” 2009 IEEE International Conference on Services Computing, Sep 21-25,2009, Bangalore, India, pp. 517-520.


[4] E. H. Spafford and D. Zamboni, “Intrusion Detection Using Autonomous Agent,” Computer Networks, Vol. 34, Issue 4, 2000, pp. 547-570.

[5] Ms. Parag K. Shelke, Ms. Sneha Sontakke, Dr. A. D. Gawande,”Intrusion Detection System for Cloud Computing”, International Journal of Scientific & Technology Research, Vol. 1, Issue 4,May 2012, pp. 67-71.

[6] Chi-Chun Lo, Chun-Chieh Huang, Joy Ku, “A Cooperative Intrusion Detection System Framework for Clouding Computing Networks,” 2010, 39th International Conference on Parallel Processing Workshops, pp. 280-284.
[7] Anna Lenart, “ERP in the Cloud- Benefits and Challenges,”Springer Verlag Berlin Heidelberg, 2011, pp. 39-50.
[8] C. Modi, D. Patel, B. Borisaniya, H. Patel, M. Rajarajan, “A Survey OF Intrusion Detection Techniques in Cloud”, Journal of Network and Computer Applications 36(2013), pp. 42-57.