Abstract
Cloud computing is an amalgamation of resources over the Internet which dynamically allocates capacity and resources without setting up a new physical environment. Enterprises understand the convincing monetary and operational profits provided by cloud computing. Virtualization and usage of pooled IT resources in the cloud environment, provided to the organizations, makes them realize noteworthy cost savings and speeds up deployment of new applications. On the contrary, the valuable benefits of business cannot ajar without comprehending the challenges of data security. This work emphasis on the practices that can be incorporated into the cloud environment to provide enhanced security. It highlights a set of control-based technologies and protocols to provide regulatory consent and protect information, infrastructure, and data applications associated with the use of cloud. This work proposes a design which can be used to control the data, authenticity, and security at all the levels to solve the problem of security in cloud computing environment.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
IDC (2009) An IDC. Update.slideshare.net/JorFigOr/cloud-computing-2010-an-idc-update
HP’s (2009) Hurd dings cloud computing, IBM, CNET news
Catteddu D, Hogben G (2009) Technical report. European network and information security agency, benefits, risks and recommendations for information security, Enisa
Security Guidance for Critical Areas of Focus in Cloud Computing (2009) Technical report, Cloud Security Alliance
Rimal BP, Choi E, Lumb I (2009) A taxonomy and, survey of cloud computing systems. In: Fifth international joint conference on INC, IMS and IDC, NCM
Mohamed EM, Abdelkader HS, EI-Etriby S (2012) Enhanced data security model for cloud computing. In: 8th international conference on INFOrmatics and Systems (INFOS2012)
Mohamed EM, Abdelkader HS, EI-Etriby S (2011) A quantitative analysis of current security concerns and solutions for cloud computing
Mahalle VS, Shahade AK (2014) Power, automation and communication (INPAC): enhancing the data security in cloud by implementing hybrid encryption algorithm (Rsa&Aes). In: 2014 international conference on encryption algorithm
Ficco M, Tasquier L, Aversa R (2013) Security issues in cloud computing. In: Eighth international conference on P2P, parallel, grid, cloud and internet
Ibrahim AS, Hamlyn-Harris J, Grundy J (2010) Emerging security challenges of cloud virtual infrastructure. In: Proceedings of APSEC 2010, cloud workshop, Sydney, Australia
Tompkins D (2009) Security for cloud-based enterprise applications
Jensen M, Schwenk J, Gruschka N, Iacono LL (2009) Technical security issues in cloud computing. In: IEEE international conference on cloud computing
Muttik I, Barton C (2009) Cloud security technologies. Elsevier, Amsterdam
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Majumdar, R., Gupta, H., Goel, S., Srivastava, A. (2018). Paradigmatic Approach to Cloud Security: Challenges and Remedies. In: Bokhari, M., Agrawal, N., Saini, D. (eds) Cyber Security. Advances in Intelligent Systems and Computing, vol 729. Springer, Singapore. https://doi.org/10.1007/978-981-10-8536-9_46
Download citation
DOI: https://doi.org/10.1007/978-981-10-8536-9_46
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-8535-2
Online ISBN: 978-981-10-8536-9
eBook Packages: EngineeringEngineering (R0)