Cloud Computing: It’s Security and Introduction to Amazon Web Services

  • Utsa GhoshEmail author
  • Supriyo Dolui
Conference paper
Part of the Learning and Analytics in Intelligent Systems book series (LAIS, volume 12)


Cloud is a collection of computing and network resources served with an overlay of virtualization which provides one-stop solution for scalability, elasticity, security and agility for same. Virtualization layer allows the user to access these computing and networking power as infrastructure, platform, software and functionality served with an overlay. It also provides robustness and reliability and has on-demand access to compute and store resources lies within the cloud–service providers, but it has some disadvantageous too. Like all software, hardware and almost all application data are stored and deployed in the cloud platform, the distrust between cloud suppliers and users are often arrived. So, some enterprises do not support believing in cloud computing. Amazon Web Services (AWS) cloud computing is the trusted cloud service provider. It has benefits like easy to use, no capacity limits, reliable and provides speed. The main aim of this paper is to understand cloud computing, it’s security concerns and AWS.


Cloud Computing Data security Cloud storage Fault tolerance Trusted computing Amazon Web Services Cloud security levels AWS Cloud computing security Data storage 


  1. 1.
    Paxton, N.C.: Cloud security review of current issues and proposed solutions. In: 2016 IEEE 2nd International Conference on Collaboration and Internet Computing (2016)Google Scholar
  2. 2.
    Narula, S., Jain, A., Prachi: Cloud computing security. In: 2015 Fifth International Conference on Advanced Computing & Communication Technologies (2015)Google Scholar
  3. 3.
    Liu, W.: Research on cloud computing security problem and strategy (2012). (978-1-4577-1415-31121 ©2012 IEEE)Google Scholar
  4. 4.
    Zhang, Q., Cheng, L., Boutaba, R.: Cloud computing: state-of-the-art and research challenges. J. Internet Serv. Appl. 1(1), 7–18 (2010)CrossRefGoogle Scholar
  5. 5.
    Jensen, M., Schwenk, J., et al.: On technical security issues in cloud computing. In: IEEE International Conference on Cloud Computing, pp. 109–116, October 2009Google Scholar
  6. 6.
  7. 7.
  8. 8.
  9. 9.
  10. 10.
  11. 11.
  12. 12.
  13. 13.
  14. 14.
  15. 15.
  16. 16.
  17. 17.
  18. 18.
  19. 19.
    Wang, Q., Wang, C., Li, J., Ren, K., Lou, W.: Enabling public verifiability and data dynamics for storage security in cloud computing. In: Backes, M., Ning, P. (eds.) ESORICS 2009. LNCS, vol. 5789, pp. 355–370. Springer, Heidelberg (2009). Scholar
  20. 20.
    Markandey, A., Dhamdhere, P., Gajmal, Y.: Data access security in cloud computing: a review (2018)Google Scholar
  21. 21.
    Jhawar, R., Piuri, V., Santambrogio, M.D.: A comprehensive conceptual system level approach to fault tolerance in cloud computing. In: Proceedings of the IEEE International Systems Conference, pp. 1–5, March 2012Google Scholar
  22. 22.
    Castro, M., Liskov, B.: Practical Byzantine fault tolerance. In: Proceedings of the 3rd Symposium on Operating Systems and Design Implementation, pp. 173–186 (1999)Google Scholar
  23. 23.
    Gai, K., Qiu, M.: An optimal fully homomorphic encryption scheme. In: IEEE 3rd International Conference on Big Data Security on Cloud, Beijing, China, pp. 101–106. IEEE (2017)Google Scholar
  24. 24.
    Bala, A., Chana, I.: Fault tolerance-challenges,techniques and implementation in cloud computing. IJCSI Int. J. Comput. Sci. Issues 9(1) (2012). ISSN 1694-0814,
  25. 25.
    Banyal, R., Jain, P., Jain, V.: Multi-factor authentication framework for cloud computing. In: The Proceedings of the Fifth International Conference on Computational Intelligence, Modeling and Simulation. IEEE (2013)Google Scholar
  26. 26.
    Ma, J.: Top 10 Security Concerns for Cloud-Based Services, December 2015Google Scholar
  27. 27.
    Jivanadham, L., Katayam, Y.: Cloud Cognitive Authenticator (CCA) a public cloud computing authentication mechanism (2013)Google Scholar
  28. 28.
    Lee, S., Ong, I., Lim, H.T., Lee, H.J.: Two factor authentication for cloud computing. In: The Proceedings of the International Journal of KIMICS, August 2010Google Scholar
  29. 29.
    Rashida, F.Y.: Introducing the Treacherous 12. InfoWorld, March 2016Google Scholar

Copyright information

© Springer Nature Switzerland AG 2020

Authors and Affiliations

  1. 1.Department of Electronics and Communication EngineeringSiliguri Institute of TechnologySiliguriIndia
  2. 2.Department of Civil EngineeringSiliguri Institute of TechnologySiliguriIndia

Personalised recommendations