International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064




Downloads: 106 | Views: 202 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper | Computer Science & Engineering | India | Volume 3 Issue 6, June 2014 | Rating: 6.6 / 10


Investigation of Security in Cloud Computing

Annu Devi


Abstract: Cloud computing becomes more widely prevailed storage for outsourced data which may contain more sensitive information such as credit card numbers; passwords; e-mails; personal health records etc. As the data owners cannot risk their unencrypted outsourced data so as the cloud servers. The cloud server may fail to keep up the integrity of the cloud data due to hacking or entry of unauthorized entities. The increased attack surface in a in a Cloud environment allows for other vulnerabilities to be exploited; thereby increasing the organizations risk. While Cloud services offer flexibility; scalability and economies of scale; there have been commensurate concerns about security. As more data moves from centrally located server storage to the Cloud; the potential for personal and private data to be compromised will increase. Confidentiality; availability and integrity of data are at risk if appropriate measures are not put in place prior to selecting a Cloud vendor or implementing your own cloud and migrating to Cloud services. Cloud services such as Software as a service; Platform as a service or Infrastructure as a service will each have their own security concerns that need to be addressed. This paper reviews the best practices to secure Cloud services and data; including conventional security techniques and working with vendors to ensure proper Service Level Agreements exist.


Keywords: Cloud Computing, Encryption, Decryption, Threats, Public key, Private key, Cryptography


Edition: Volume 3 Issue 6, June 2014,


Pages: 2025 - 2029


How to Download this Article?

Type Your Valid Email Address below to Receive the Article PDF Link


Verification Code will appear in 2 Seconds ... Wait

Top