Abstract
Cloud computing has become a vital piece of suggestions; nowadays, as a result of the advantages it offers to the reasonably connected world. Cloud computing has expedited suggestions in additional than one approach; from inserting the in-depth tools to upscaling and downscaling at no matter purpose needed, transferral concerning in-depth assets of the suggestions. Cloud computing market has become exponentially throughout the years and is trusty upon to develop at a lot of faster pace. One different purpose for the accomplishment of cloud computing is the flexibility it proposals like infrastructure as associate degree support.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Popović K, Hocenski Ž (2010) Cloud computing security issues and challenges. In: The 33rd international convention mipro. IEEE, pp 344–349
Kuyoro SO, Ibikunle F, Awodele O (2011) Cloud computing security issues and challenges. Int J Comput Netw IJCN 3(5):247–255
Priyadarshi R, Soni SK, Sharma P (2019) An enhanced GEAR protocol for wireless sensor networks. In: Lecture notes in electrical engineering. https://doi.org/10.1007/978-981-13-0776-8_27
Priyadarshi R, Rawat P, Nath V (2018) Energy dependent cluster formation in heterogeneous wireless sensor network. Microsyst Technol. https://doi.org/10.1007/s00542-018-4116-7
Yang J, Chen Z (2010) Cloud computing research and security issues. In: 2010 international conference on computational intelligence and software engineering, IEEE, pp 1–3
Priyadarshi R, Soni SK, Nath V (2018) Energy efficient cluster head formation in wireless sensor network. Microsyst Technol 24(12):4775–4784. https://doi.org/10.1007/s00542-018-3873-7
Rawat P, Chauhan S, Priyadarshi R (2020) Energy-efficient clusterhead selection scheme in heterogeneous wireless sensor network. J Circ Syst Comput. https://doi.org/10.1142/S0218126620502047
Priyadarshi R, Rawat P, Nath V, Acharya B, Shylashree N (2020) Three level heterogeneous clustering protocol for wireless sensor network. Microsyst Technol. https://doi.org/10.1007/s00542-020-04874-x
Dillon T, Wu C, Chang E (2010, April) Cloud computing: issues and challenges. In 2010 24th IEEE international conference on advanced information networking and applications, IEEE, pp 27–33
Soni SK, Kumar S, Priyadarshi R (2020) Energy-aware clustering in wireless sensor networks. In: Lecture notes in electrical engineering. https://doi.org/10.1007/978-981-15-2854-5_39
Kumar S, Soni SK, Randheer, Priyadarshi R (2020) Performance analysis of novel energy aware routing in wireless sensor network. In: Lecture notes in electrical engineering. https://doi.org/10.1007/978-981-15-2854-5_44
Priyadarshi R, Singh L, Randheer, Singh A (2018) A novel HEED protocol for wireless sensor networks. In: 2018 5th international conference on signal processing and integrated networks, SPIN 2018. https://doi.org/10.1109/SPIN.2018.8474286
Harfoushi O, Alfawwaz B, Ghatasheh NA, Obiedat R, Mua’ad M, Faris H (2014) Data Security issues and challenges in cloud computing: a conceptual analysis and review. Commun Netw
Priyadarshi R, Singh L, Singh A, Thakur A (2018) SEEN: stable energy efficient network for wireless sensor network. In: 2018 5th international conference on signal processing and integrated networks, SPIN 2018. https://doi.org/10.1109/SPIN.2018.8474228
Priyadarshi R, Yadav S, Bilyan D (2019) Performance and comparison analysis of MIEEP routing protocol over adapted LEACH protocol. In: Luhach AK, Hawari KBG, Mihai IC, Hsiung PA, Mishra RB (eds) Smart computational strategies: theoretical and practical aspects. Springer, Singapore, pp 237–245. https://doi.org/10.1007/978-981-13-6295-8_20
Gou Z, Yamaguchi S, Gupta BB (2017). Analysis of various security issues and challenges in cloud computing environment: a survey. In: Identity theft: breakthroughs in research and practice. IGI Global, pp 221–247
Priyadarshi R, Yadav S, Bilyan D (2019). Performance analysis of adapted selection based protocol over LEACH protocol. In: Luhach AK, Hawari KBG, Mihai IC, Hsiung, Mishra RB (eds) Smart computational strategies: theoretical and practical aspects. Springer, Singapore, pp 247–256. https://doi.org/10.1007/978-981-13-6295-8_21
Priyadarshi R, Gupta B, Anurag A (2020) Deployment techniques in wireless sensor networks: a survey, classification, challenges, and future research issues. J Supercomput. https://doi.org/10.1007/s11227-020-03166-5
Zissis D, Lekkas D (2012) Addressing cloud computing security issues. Future Gener Comput Syst 28(3):583–592
Priyadarshi R, Gupta B, Anurag A (2020) Wireless sensor networks deployment: a result oriented analysis wireless. Pers Commun. https://doi.org/10.1007/s11277-020-07255-9
Morin JH, Aubert J, Gateau B (2012, January) Towards cloud computing SLA risk management: issues and challenges. In 2012 45th Hawaii international conference on system sciences. IEEE, pp 5509–5514
Priyadarshi R Gupta B (2019) Coverage area enhancement in wireless sensor network. Microsyst Technol. https://doi.org/10.1007/s00542-019-04674-y
Chen Y, Paxson V, Katz RH (2010) What’s new about cloud computing security. University of California, Berkeley Report No. UCB/EECS-2010-5, pp 2010–201, 20 Jan 2010
Anurag A, Priyadarshi R, Goel A, Gupta B (2020) 2-D coverage optimization in WSN using a novel variant of particle swarm optimisation. In 2020 7th international conference on signal processing and integrated networks, SPIN 2020. https://doi.org/10.1109/SPIN48934.2020.9070978
Priyadarshi R, Tripathi H, Bhardwaj A, Thakur A (2018) Performance metric analysis of modified LEACH routing protocol in wireless sensor network. Int J Eng Technol. https://doi.org/10.14419/ijet.v7i1.5.9146
Wang Y, Uehara T, Sasaki R (2015) Fog computing: Issues and challenges in security and forensics. In: 2015 IEEE 39th annual computer software and applications conference, vol 3. IEEE, pp 53–59
Priyadarshi R, Singh L, Sharma I, Kumar S (2018) Energy efficient leach routing in wireless sensor network. Int J Pure Appl Math 118(20):135–142
Priyadarshi R, Singh L, Kumar S, Sharma I (2018) A hexagonal network division approach for reducing energy hole issue in WSN. Eur J Pure Appl Math 118
Attab A, Saleh B, Fadewar HS (2014) Security issues and challenges in cloud computing. Int J Emerg Sci Eng 2(7): 22–26
Aery MK (2016) Mobile cloud computing: security issues and challenges. Int J Adv Res Comput Sci 7(3)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Sutradhar, N., Sharma, M.K., Sai Krishna, G. (2021). Cloud Computing: Security Issues and Challenges. In: Nath, V., Mandal, J. (eds) Nanoelectronics, Circuits and Communication Systems. Lecture Notes in Electrical Engineering, vol 692. Springer, Singapore. https://doi.org/10.1007/978-981-15-7486-3_4
Download citation
DOI: https://doi.org/10.1007/978-981-15-7486-3_4
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-15-7485-6
Online ISBN: 978-981-15-7486-3
eBook Packages: EngineeringEngineering (R0)