Survey On Cloud Security And Algorithms

Survey On Cloud Security And Algorithms

International Journal of Computer Science and Engineering
© 2019 by SSRG - IJCSE Journal
Volume 6 Issue 11
Year of Publication : 2019
Authors : Dr.K.Karuppasamy, Ms.F.Margret Sharmila, Tharani .T
: 10.14445/23488387/IJCSE-V6I11P108

pdf
Citation:
MLA Style:

Dr.K.Karuppasamy, Ms.F.Margret Sharmila, Tharani .T, "Survey On Cloud Security And Algorithms" SSRG International Journal of Computer Science and Engineering 6.11 (2019): 40-42.

APA Style:

Dr.K.Karuppasamy, Ms.F.Margret Sharmila, Tharani .T,(2019). Survey On Cloud Security And Algorithms. SSRG International Journal of Computer Science and Engineering 6(11), 40-42.

Abstract:

Cloud computing is that the the next generation’s computing infrastructure that is well known and Cloud computing offers some benefits by permitting users to use infrastructure, platforms, and softwares provided by cloud suppliers at low value .additionally, Cloud computing enable users to elastically utilize resources in AN on demand fashion.The Objective of the work is to understand the security threats and the appropriate security techniques used in the cloud computing. The security challenges and the counter measures in the cloud computing were also identified .The survey with many security experts on cloud computing is made and satisfactory number of challenges and mitigation techniques are used at the present stage.

References:

[1] Priyanka Arora, Arun Singh, Himanshu Tyagi ―Analysis of performance by using security algorithm on cloud network‖ in international conference on Emerging trends in engineering and management (ICETM2012), 23-24 june, 2012.
[2] ―"Swamp Computing" a.k.a. Cloud Computing". Web Security Journal. 2009-12-28. Retrieved 2010-01-25.
[3] ""Thunderclouds: Managing SOA-Cloud Risk", Philip Wik". Service Technology Magazine. 2011-10.
[4] Winkler, Vic. "Cloud Computing: Virtual Cloud Security Concerns". Technet Magazine, Microsoft. Retrieved 12 February 2012.
[5] Hickey, Kathleen. "Dark Cloud: Study finds security risks in virtualization". Government Security News. Retrieved 12 February 2012.
[6] Winkler, Vic (2011). Securing the Cloud: Cloud Computer Security Techniques and Tactics. Waltham, MA USA: Elsevier. pp. 59. ISBN Securing the Cloud Cloud Computer Security Techniques and Tactics.
[7] "4 Cloud Computing Security Policies You Must Know". CloudComputingSec. 2011. Retrieved 2011-12-13.
[8] "Gartner: Seven cloud-computing security risks". InfoWorld. 2008-07-02. Retrieved 2010-01-25.
[9] "Security Guidance for Critical Areas of Focus in Cloud Computing". Cloud Security Alliance. 2011. Retrieved 2011-05
[10] "Cloud Security Front and Center". Forrester Research. 2009-11-18. Retrieved 2010-01-25.
[11] M. Sudha , Dr.Bandaru Rama Krishna Rao , M. Monica―A Comprehensive Approach to Ensure Secure Data Communication in Cloud Environment in International Journal of Computer Applications (0975 – 8887) Volume 12– No.8,December 2010
[12] Ms.F.Margret Sharmila on Book Nest an Android Application in Seventh Sense Research Group pp.102-104, ISSN: 2348-8387 on April 2016

Key Words:

Infrastructure, Software, Algorithmic Program, Data Encryption and Secure Key