Abstract
Cloud computing has emerged as one of the next generation computer technologies. It is a model wherein storage, computing facilities, and applications are provided as services on the top of Internet. It permits associations to decrease capital costs, in administration costs, and improve unwavering quality and accessibility by getting administrations and infrastructural assets momentarily in a flexible way utilizing pay-as-you-go demonstrates. These services are provided on resources located at diverse geographical location beneath various service providers. The adjustment of cloud has exchange control of physical assets from potential clients to specialist organizations. This change has offered mount to security dangers and concerns which comes about into absence of certainty of potential clients on distributed computing. The paper displays a short explanatory review on different security issues in distributed computing. It presents a distinct view on classifying various security risks and concerns in cloud computing. A different method of classification varies security frameworks, models, and techniques—selected from latest literature on resources of repute. The paper concludes on realization of some unique cloud security objectives and challenges.
References
Shu, J., Shen, Z., Xue, W.: Shield A stackable secure storage system for file sharing in public storage. Journal of Parallel and Distributed Computing, 74(9), 2872–2883 (2014)
Sookhak, M., Gani, A., Khan, M. K., Buyya, R.: Dynamic remote data auditing for securing big data storage in cloud computing. Information Sciences, 380, 101–116 (2017)
Vaezpour, S. Y., Zhang, R., Wu, K., Wang, J., Shoja, G. C.: A new approach to mitigating security risks of phone clone co-location over mobile clouds. Journal of Network and Computer Applications, 62, 171–184 (2016)
Yang, L. T., Huang, G., Feng, J., Xu, L.: Parallel GNFS algorithm integrated with parallel block Wiedemann algorithm for RSA security in cloud computing. Information Sciences, 387, 254–265 (2016)
Usman, M., Jan, M. A., He, X.: Cryptography-based Secure Data Storage and Sharing Using HEVC and Public Clouds. Information Sciences, 387, 90–102 (2016)
Dai, H., Zhao, S., Chen, K.: A chaos-oriented prediction and suppression model to enhance the security for cyber physical power systems. Journal of Parallel and Distributed Computing, 103, 87–95 (2016)
Peng, Y., Cui, J., Li, H., Ma, J.: A reusable and single-interactive model for secure approximate k-nearest neighbor query in cloud. Information Sciences, 387, 147–164 (2016)
Li, Y., Gai, K., Qiu, L., Qiu, M., Zhao, H.: Intelligent cryptography approach for secure distributed big data storage in cloud computing. Information Sciences, 387, 103–115 (2016)
Xiang, T., Li, X., Chen, F., Guo, S., Yang, Y.: Processing secure, verifiable and efficient SQL over outsourced database. Information Sciences, 348, 163–178 (2016)
Zhu, Y., Huang, Z., Takagi, T.: Secure and controllable k-nn query over encrypted cloud data with key confidentiality. Journal of Parallel and Distributed Computing, 89, 1–12 (2016)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Garg, D., Sidhu, J. (2018). Survey on Implementation of Security in Cloud. In: Singh, R., Choudhury, S., Gehlot, A. (eds) Intelligent Communication, Control and Devices. Advances in Intelligent Systems and Computing, vol 624. Springer, Singapore. https://doi.org/10.1007/978-981-10-5903-2_164
Download citation
DOI: https://doi.org/10.1007/978-981-10-5903-2_164
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-5902-5
Online ISBN: 978-981-10-5903-2
eBook Packages: EngineeringEngineering (R0)