Skip to main content

Survey on Implementation of Security in Cloud

  • Conference paper
  • First Online:
Intelligent Communication, Control and Devices

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 624))

  • 3135 Accesses

Abstract

Cloud computing has emerged as one of the next generation computer technologies. It is a model wherein storage, computing facilities, and applications are provided as services on the top of Internet. It permits associations to decrease capital costs, in administration costs, and improve unwavering quality and accessibility by getting administrations and infrastructural assets momentarily in a flexible way utilizing pay-as-you-go demonstrates. These services are provided on resources located at diverse geographical location beneath various service providers. The adjustment of cloud has exchange control of physical assets from potential clients to specialist organizations. This change has offered mount to security dangers and concerns which comes about into absence of certainty of potential clients on distributed computing. The paper displays a short explanatory review on different security issues in distributed computing. It presents a distinct view on classifying various security risks and concerns in cloud computing. A different method of classification varies security frameworks, models, and techniques—selected from latest literature on resources of repute. The paper concludes on realization of some unique cloud security objectives and challenges.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

References

  1. Shu, J., Shen, Z., Xue, W.: Shield A stackable secure storage system for file sharing in public storage. Journal of Parallel and Distributed Computing, 74(9), 2872–2883 (2014)

    Google Scholar 

  2. Sookhak, M., Gani, A., Khan, M. K., Buyya, R.: Dynamic remote data auditing for securing big data storage in cloud computing. Information Sciences, 380, 101–116 (2017)

    Google Scholar 

  3. Vaezpour, S. Y., Zhang, R., Wu, K., Wang, J., Shoja, G. C.: A new approach to mitigating security risks of phone clone co-location over mobile clouds. Journal of Network and Computer Applications, 62, 171–184 (2016)

    Google Scholar 

  4. Yang, L. T., Huang, G., Feng, J., Xu, L.: Parallel GNFS algorithm integrated with parallel block Wiedemann algorithm for RSA security in cloud computing. Information Sciences, 387, 254–265 (2016)

    Google Scholar 

  5. Usman, M., Jan, M. A., He, X.: Cryptography-based Secure Data Storage and Sharing Using HEVC and Public Clouds. Information Sciences, 387, 90–102 (2016)

    Google Scholar 

  6. Dai, H., Zhao, S., Chen, K.: A chaos-oriented prediction and suppression model to enhance the security for cyber physical power systems. Journal of Parallel and Distributed Computing, 103, 87–95 (2016)

    Google Scholar 

  7. Peng, Y., Cui, J., Li, H., Ma, J.: A reusable and single-interactive model for secure approximate k-nearest neighbor query in cloud. Information Sciences, 387, 147–164 (2016)

    Google Scholar 

  8. Li, Y., Gai, K., Qiu, L., Qiu, M., Zhao, H.: Intelligent cryptography approach for secure distributed big data storage in cloud computing. Information Sciences, 387, 103–115 (2016)

    Google Scholar 

  9. Xiang, T., Li, X., Chen, F., Guo, S., Yang, Y.: Processing secure, verifiable and efficient SQL over outsourced database. Information Sciences, 348, 163–178 (2016)

    Google Scholar 

  10. Zhu, Y., Huang, Z., Takagi, T.: Secure and controllable k-nn query over encrypted cloud data with key confidentiality. Journal of Parallel and Distributed Computing, 89, 1–12 (2016)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Deepak Garg .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Garg, D., Sidhu, J. (2018). Survey on Implementation of Security in Cloud. In: Singh, R., Choudhury, S., Gehlot, A. (eds) Intelligent Communication, Control and Devices. Advances in Intelligent Systems and Computing, vol 624. Springer, Singapore. https://doi.org/10.1007/978-981-10-5903-2_164

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-5903-2_164

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-5902-5

  • Online ISBN: 978-981-10-5903-2

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics