Security and privacy in cloud computing

@article{Soni2016SecurityAP,
  title={Security and privacy in cloud computing},
  author={Rajat Soni and Smrutee Ambalkar and Pratosh Bansal},
  journal={2016 Symposium on Colossal Data Analysis and Networking (CDAN)},
  year={2016},
  pages={1-6},
  url={https://api.semanticscholar.org/CorpusID:206583820}
}
What cloud computing is, services it provides, it's various types, principles of security and green data centers are outlined, to serve server providers and enterprises in the best way possible.

Analytical Assessment of Security Mechanisms of Cloud Environment

This paper aims to study several key concepts, namely Cloud characteristics, delivery models, deployment models, and security issues, and discusses the work done on Cloud security and privacy issues.

A REVIEW ON VARIOUS DATA SECURITY ISSUES IN CLOUD COMPUTING ENVIRONMENT AND ITS SOLUTIONS

A survey of the various cloud computing models, different security risks that affects the cloud environment in the area of confidentiality, integrity and computing on data is thoroughly investigated and the solutions for the different security issues due to the cloud service delivery models are provided.

Survey On Security Threats In Data Storing & Sharing In Cloud Environment

An analytical study of cloud computing model is presented and light is thrown on various services provided by cloud to throw light on major issues of concerns.

Framework modeling for User privacy in cloud computing

A user privacy framework based upon on emerging security model that includes access control, encryption and protection monitor schemas in the cloud environment is developed.

Secure Sharing of Data in Cloud Computing

A framework and methodology for sharing data over untrusted cloud, using proxy re-encryption based on elliptic curve discrete logarithm problem is proposed, preventing the cloud storage providers from unauthorized access and illegal authorization to access the data.

A Survey on Cloud Computing

The aim of this chapter is to giving the researchers a clear vision about this technology and the information security requirements for private and public cloud as well as the main security issues for future researches.

Data Privacy and Security in the Cloud

The aim of this paper is to improve security in the cloud because the uses of cloud services has been more increasing and in the next few years would be likely the cloud services will be a big driving force, better to be prepare and develop majors to encounter and security loophole that may arise in the near future.

Modeling and Analysis of Cloud Computing Security

A mathematical model by adopting the concept of Markov chain to measure threat arise in cloud computing is proposed and some of the mathematical models approach for cloud computing security are studied and proposed.

Securing Data Transfer in Cloud Environment

Data security and access control is one of the most challenging ongoing research work in cloud computing, due to users outsourcing their sensitive data to cloud providers. The various existing…
...

Improving security issues and security attacks in cloud computing

The solution for various security issues and security attacks are analyzed to secure cloud and the benefits of less hardware maintenance and reduced expenditure start-up cost are highlighted.

Identity Management issues in Cloud Computing

The privacy issue is discussed and different kind of identity management technique that are used for preserving the privacy are discussed.

Cloud Computing and Security Issues in the Cloud

A review on the cloud computing concepts as well as security issues inherent within the context of cloud computing and cloud infrastructure is presented.

Security and Privacy Challenges in Cloud Computing Environments

This article explores the roadblocks and solutions to providing a trustworthy cloud computing environment and suggests a number of approaches that could be considered.

Cloud computing

The time is right for the members of the emerging cloud computing community to come together around the notion of an open cloud, and these core principles are rooted in the belief that cloud computing should be as open as all other IT technologies.

INTRUSION DETECTION SYSTEM FOR CLOUD COMPUTING

This work proposes a new multi-threaded distributed cloud IDS model that handles large flow of data packets, analyze them and generate reports efficiently by integrating knowledge and behavior analysis to detect intrusions.

Secure Cloud Storage