Survey on Implementation of Security in Cloud

  • Deepak Garg
  • Jagpreet Sidhu
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 624)


Cloud computing has emerged as one of the next generation computer technologies. It is a model wherein storage, computing facilities, and applications are provided as services on the top of Internet. It permits associations to decrease capital costs, in administration costs, and improve unwavering quality and accessibility by getting administrations and infrastructural assets momentarily in a flexible way utilizing pay-as-you-go demonstrates. These services are provided on resources located at diverse geographical location beneath various service providers. The adjustment of cloud has exchange control of physical assets from potential clients to specialist organizations. This change has offered mount to security dangers and concerns which comes about into absence of certainty of potential clients on distributed computing. The paper displays a short explanatory review on different security issues in distributed computing. It presents a distinct view on classifying various security risks and concerns in cloud computing. A different method of classification varies security frameworks, models, and techniques—selected from latest literature on resources of repute. The paper concludes on realization of some unique cloud security objectives and challenges.


Cloud Security Cloud platforms Effective citations 


  1. 1.
    Shu, J., Shen, Z., Xue, W.: Shield A stackable secure storage system for file sharing in public storage. Journal of Parallel and Distributed Computing, 74(9), 2872–2883 (2014)Google Scholar
  2. 2.
    Sookhak, M., Gani, A., Khan, M. K., Buyya, R.: Dynamic remote data auditing for securing big data storage in cloud computing. Information Sciences, 380, 101–116 (2017)Google Scholar
  3. 3.
    Vaezpour, S. Y., Zhang, R., Wu, K., Wang, J., Shoja, G. C.: A new approach to mitigating security risks of phone clone co-location over mobile clouds. Journal of Network and Computer Applications, 62, 171–184 (2016)Google Scholar
  4. 4.
    Yang, L. T., Huang, G., Feng, J., Xu, L.: Parallel GNFS algorithm integrated with parallel block Wiedemann algorithm for RSA security in cloud computing. Information Sciences, 387, 254–265 (2016)Google Scholar
  5. 5.
    Usman, M., Jan, M. A., He, X.: Cryptography-based Secure Data Storage and Sharing Using HEVC and Public Clouds. Information Sciences, 387, 90–102 (2016)Google Scholar
  6. 6.
    Dai, H., Zhao, S., Chen, K.: A chaos-oriented prediction and suppression model to enhance the security for cyber physical power systems. Journal of Parallel and Distributed Computing, 103, 87–95 (2016)Google Scholar
  7. 7.
    Peng, Y., Cui, J., Li, H., Ma, J.: A reusable and single-interactive model for secure approximate k-nearest neighbor query in cloud. Information Sciences, 387, 147–164 (2016)Google Scholar
  8. 8.
    Li, Y., Gai, K., Qiu, L., Qiu, M., Zhao, H.: Intelligent cryptography approach for secure distributed big data storage in cloud computing. Information Sciences, 387, 103–115 (2016)Google Scholar
  9. 9.
    Xiang, T., Li, X., Chen, F., Guo, S., Yang, Y.: Processing secure, verifiable and efficient SQL over outsourced database. Information Sciences, 348, 163–178 (2016)Google Scholar
  10. 10.
    Zhu, Y., Huang, Z., Takagi, T.: Secure and controllable k-nn query over encrypted cloud data with key confidentiality. Journal of Parallel and Distributed Computing, 89, 1–12 (2016)Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2018

Authors and Affiliations

  1. 1.Department of Computer Science and Engineering, Chitkara University Institute of Engineering and TechnologyChitkara UniversityPatialaIndia

Personalised recommendations