Skip to main content

Cloud Computing: Security Issues and Challenges

  • Conference paper
  • First Online:
Nanoelectronics, Circuits and Communication Systems

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 692))

Abstract

Cloud computing has become a vital piece of suggestions; nowadays, as a result of the advantages it offers to the reasonably connected world. Cloud computing has expedited suggestions in additional than one approach; from inserting the in-depth tools to upscaling and downscaling at no matter purpose needed, transferral concerning in-depth assets of the suggestions. Cloud computing market has become exponentially throughout the years and is trusty upon to develop at a lot of faster pace. One different purpose for the accomplishment of cloud computing is the flexibility it proposals like infrastructure as associate degree support.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 259.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 329.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 329.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Popović K, Hocenski Ž (2010) Cloud computing security issues and challenges. In: The 33rd international convention mipro. IEEE, pp 344–349

    Google Scholar 

  2. Kuyoro SO, Ibikunle F, Awodele O (2011) Cloud computing security issues and challenges. Int J Comput Netw IJCN 3(5):247–255

    Google Scholar 

  3. Priyadarshi R, Soni SK, Sharma P (2019) An enhanced GEAR protocol for wireless sensor networks. In: Lecture notes in electrical engineering. https://doi.org/10.1007/978-981-13-0776-8_27

  4. Priyadarshi R, Rawat P, Nath V (2018) Energy dependent cluster formation in heterogeneous wireless sensor network. Microsyst Technol. https://doi.org/10.1007/s00542-018-4116-7

  5. Yang J, Chen Z (2010) Cloud computing research and security issues. In: 2010 international conference on computational intelligence and software engineering, IEEE, pp 1–3

    Google Scholar 

  6. Priyadarshi R, Soni SK, Nath V (2018) Energy efficient cluster head formation in wireless sensor network. Microsyst Technol 24(12):4775–4784. https://doi.org/10.1007/s00542-018-3873-7

    Article  Google Scholar 

  7. Rawat P, Chauhan S, Priyadarshi R (2020) Energy-efficient clusterhead selection scheme in heterogeneous wireless sensor network. J Circ Syst Comput. https://doi.org/10.1142/S0218126620502047

  8. Priyadarshi R, Rawat P, Nath V, Acharya B, Shylashree N (2020) Three level heterogeneous clustering protocol for wireless sensor network. Microsyst Technol. https://doi.org/10.1007/s00542-020-04874-x

  9. Dillon T, Wu C, Chang E (2010, April) Cloud computing: issues and challenges. In 2010 24th IEEE international conference on advanced information networking and applications, IEEE, pp 27–33

    Google Scholar 

  10. Soni SK, Kumar S, Priyadarshi R (2020) Energy-aware clustering in wireless sensor networks. In: Lecture notes in electrical engineering. https://doi.org/10.1007/978-981-15-2854-5_39

  11. Kumar S, Soni SK, Randheer, Priyadarshi R (2020) Performance analysis of novel energy aware routing in wireless sensor network. In: Lecture notes in electrical engineering. https://doi.org/10.1007/978-981-15-2854-5_44

  12. Priyadarshi R, Singh L, Randheer, Singh A (2018) A novel HEED protocol for wireless sensor networks. In: 2018 5th international conference on signal processing and integrated networks, SPIN 2018. https://doi.org/10.1109/SPIN.2018.8474286

  13. Harfoushi O, Alfawwaz B, Ghatasheh NA, Obiedat R, Mua’ad M, Faris H (2014) Data Security issues and challenges in cloud computing: a conceptual analysis and review. Commun Netw

    Google Scholar 

  14. Priyadarshi R, Singh L, Singh A, Thakur A (2018) SEEN: stable energy efficient network for wireless sensor network. In: 2018 5th international conference on signal processing and integrated networks, SPIN 2018. https://doi.org/10.1109/SPIN.2018.8474228

  15. Priyadarshi R, Yadav S, Bilyan D (2019) Performance and comparison analysis of MIEEP routing protocol over adapted LEACH protocol. In: Luhach AK, Hawari KBG, Mihai IC, Hsiung PA, Mishra RB (eds) Smart computational strategies: theoretical and practical aspects. Springer, Singapore, pp 237–245. https://doi.org/10.1007/978-981-13-6295-8_20

  16. Gou Z, Yamaguchi S, Gupta BB (2017). Analysis of various security issues and challenges in cloud computing environment: a survey. In: Identity theft: breakthroughs in research and practice. IGI Global, pp 221–247

    Google Scholar 

  17. Priyadarshi R, Yadav S, Bilyan D (2019). Performance analysis of adapted selection based protocol over LEACH protocol. In: Luhach AK, Hawari KBG, Mihai IC, Hsiung, Mishra RB (eds) Smart computational strategies: theoretical and practical aspects. Springer, Singapore, pp 247–256. https://doi.org/10.1007/978-981-13-6295-8_21

  18. Priyadarshi R, Gupta B, Anurag A (2020) Deployment techniques in wireless sensor networks: a survey, classification, challenges, and future research issues. J Supercomput. https://doi.org/10.1007/s11227-020-03166-5

  19. Zissis D, Lekkas D (2012) Addressing cloud computing security issues. Future Gener Comput Syst 28(3):583–592

    Article  Google Scholar 

  20. Priyadarshi R, Gupta B, Anurag A (2020) Wireless sensor networks deployment: a result oriented analysis wireless. Pers Commun. https://doi.org/10.1007/s11277-020-07255-9

  21. Morin JH, Aubert J, Gateau B (2012, January) Towards cloud computing SLA risk management: issues and challenges. In 2012 45th Hawaii international conference on system sciences. IEEE, pp 5509–5514

    Google Scholar 

  22. Priyadarshi R Gupta B (2019) Coverage area enhancement in wireless sensor network. Microsyst Technol. https://doi.org/10.1007/s00542-019-04674-y

  23. Chen Y, Paxson V, Katz RH (2010) What’s new about cloud computing security. University of California, Berkeley Report No. UCB/EECS-2010-5, pp 2010–201, 20 Jan 2010

    Google Scholar 

  24. Anurag A, Priyadarshi R, Goel A, Gupta B (2020) 2-D coverage optimization in WSN using a novel variant of particle swarm optimisation. In 2020 7th international conference on signal processing and integrated networks, SPIN 2020. https://doi.org/10.1109/SPIN48934.2020.9070978

  25. Priyadarshi R, Tripathi H, Bhardwaj A, Thakur A (2018) Performance metric analysis of modified LEACH routing protocol in wireless sensor network. Int J Eng Technol. https://doi.org/10.14419/ijet.v7i1.5.9146

  26. Wang Y, Uehara T, Sasaki R (2015) Fog computing: Issues and challenges in security and forensics. In: 2015 IEEE 39th annual computer software and applications conference, vol 3. IEEE, pp 53–59

    Google Scholar 

  27. Priyadarshi R, Singh L, Sharma I, Kumar S (2018) Energy efficient leach routing in wireless sensor network. Int J Pure Appl Math 118(20):135–142

    Google Scholar 

  28. Priyadarshi R, Singh L, Kumar S, Sharma I (2018) A hexagonal network division approach for reducing energy hole issue in WSN. Eur J Pure Appl Math 118

    Google Scholar 

  29. Attab A, Saleh B, Fadewar HS (2014) Security issues and challenges in cloud computing. Int J Emerg Sci Eng 2(7): 22–26

    Google Scholar 

  30. Aery MK (2016) Mobile cloud computing: security issues and challenges. Int J Adv Res Comput Sci 7(3)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Madhuwesh Kumar Sharma .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Sutradhar, N., Sharma, M.K., Sai Krishna, G. (2021). Cloud Computing: Security Issues and Challenges. In: Nath, V., Mandal, J. (eds) Nanoelectronics, Circuits and Communication Systems. Lecture Notes in Electrical Engineering, vol 692. Springer, Singapore. https://doi.org/10.1007/978-981-15-7486-3_4

Download citation

  • DOI: https://doi.org/10.1007/978-981-15-7486-3_4

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-15-7485-6

  • Online ISBN: 978-981-15-7486-3

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics