Abstract
Cloud computing has emerged as one of the next generation computer technologies. It is a model wherein storage, computing facilities, and applications are provided as services on the top of Internet. It permits associations to decrease capital costs, in administration costs, and improve unwavering quality and accessibility by getting administrations and infrastructural assets momentarily in a flexible way utilizing pay-as-you-go demonstrates. These services are provided on resources located at diverse geographical location beneath various service providers. The adjustment of cloud has exchange control of physical assets from potential clients to specialist organizations. This change has offered mount to security dangers and concerns which comes about into absence of certainty of potential clients on distributed computing. The paper displays a short explanatory review on different security issues in distributed computing. It presents a distinct view on classifying various security risks and concerns in cloud computing. A different method of classification varies security frameworks, models, and techniques—selected from latest literature on resources of repute. The paper concludes on realization of some unique cloud security objectives and challenges.
Access provided by CONRICYT-eBooks. Download conference paper PDF
Similar content being viewed by others
Keywords
1 Introduction
The cloud computing worldview has turned into a standard answer for the arrangement of business procedures and applications, and it is quickly developing. It is giving people in general cloud vision, framework, stage, and programming administrations to clients and specialist co-ops on a compensation as-you-go premise. It is also modeled for enabling ever-present, suitable, on-demand network accessibility to a pool of configurable computing resources that are sharable and that can be swiftly provisioned and unrestricted by means of least management effort or service contributor interface. But, security is the major thing where we have to look onto it. Cloud Architecture: Depend on client–server services, we can divide cloud computing into three types: First, Platform-as-a-Service (PaaS): Cloud providers provide a platform where clients can run the applications means cloud providers are delivered the applications to the client that they are able to run the application on their own platform. Platforms are managed by the cloud providers. Second, Software-as-a-Service (SaaS): This service includes computing which is provided by cloud servers, consists of OS, coding language, database management, environment of the platform, etc. Without buying the hardware, customers can run the applications by using the resources. Third, Infrastructure-as-a-Service (IaaS): This is a tune-up of pay-as-you-go same as PaaS and SaaS including resources, storage, etc. (Fig. 1).
Cloud computing can be differentiated into four categories, and in all different categories, there are different security issues. Private cloud: Private cloud is used by a big institutes or societies. But this cloud will be restricted only in that organization means others organization can’t share that cloud. Public cloud: This cloud is owned by an organization but other organization also can share that cloud. Hybrid cloud: An organization buys a cloud from another cloud services and uses that cloud. After buying the cloud, only the people of those organizations can only access that cloud. So, hybrid cloud consists of personal cloud and open cloud. The public cloud: This cloud is used by other organization (Fig. 2).
Various security dangers are related with cloud information administrations, such as network eavesdropping, side channel attacks, illegal invasion, virtualization vulnerabilities, abuse of cloud, and denial of service attacks. Security issues in cloud computing: The security issues we face in cloud computing can be categorized into three types:
-
Conventional security issues
-
Availability issues
-
Third-party control-related issues.
2 Literature Review
This paper analyzes the previous works of authors done between 2014 and 2016 in order to critically summarize the current knowledge in the area of security, and new algorithms are developed using some important techniques, and also, various outcomes are discussed. Figure 3 represents the different types of techniques used for evaluating or developing new security models.
However, Table 1 describes what type of dataset, Simulators, Parameters has been used to implement various new applications for security. Dataset is corpus on which the developed algorithm is implemented, and the results are observed. Simulator is software that provides a platform to execute an algorithm developed for various security issues or it is software in which algorithm designed to provide a realistic imitation of operation can be implemented. Constraints are boundaries which define the reach of a particular method or algorithm.
3 Findings
In Table 2, we have calculated the effective citations in security domain of cloud computing by using the formula
where in Eq. (1)
- ECsdj(y):
-
signifies effective citations in specific domain (i.e., cloud security) journal of year y. Table 2 represents data.
- P sdj(y) :
-
signifies total number of publications in specific domain (i.e., cloud security) journal of year y. Table 3 represents data.
- P j(y) :
-
implies Total Publications in journal of repute. Table 4 represents the data.
- C j(y) :
-
depicts Total Citations in journal of repute. Table 5 represents data.
In Table 6, we have calculated the percentage of publications in security domain of cloud computing.
Percentage for calculating is
- #:
-
The term EC means Effective Citations in security field of cloud computing in the journal of repute.
- $:
-
The term TC means Total Number of Effective Citations in security domain of cloud computing in the journal of repute.
4 Results
Figure 4 depicts a number of researchers who are citing the works published by Future Generation Computer System journal as it is the prestigious journal in the area of cloud computing.
5 Conclusion
From the above survey, we can conclude that there are various techniques that can be deployed to analyze the results for secured cloud data. Also, to verify results, various datasets are used that are related to user concerns, and security algorithms are proved using that. Before implementing the algorithms onto the data, data cleansing is performed, and this refines the data and makes it ready for analysis. There are also some authors who have not discussed their few parameters. On the basis of this analysis, the above-stated interpretations of result are done. This interpretation of results further provides the outcome of the analysis performed on the gathered data. Graph depicts the number of effective citations to the proportion of total number of citations in relation to a journal of repute.
6 Future Work
We will analyze some more areas where security has to be implemented that are in electronic health records and will be developing some dynamic algorithms that may work at any of the models and also at any of the platform services provided by the cloud providers. Also, we will be using static dataset to prove the results of our developed algorithms.
References
Shu, J., Shen, Z., Xue, W.: Shield A stackable secure storage system for file sharing in public storage. Journal of Parallel and Distributed Computing, 74(9), 2872–2883 (2014)
Sookhak, M., Gani, A., Khan, M. K., Buyya, R.: Dynamic remote data auditing for securing big data storage in cloud computing. Information Sciences, 380, 101–116 (2017)
Vaezpour, S. Y., Zhang, R., Wu, K., Wang, J., Shoja, G. C.: A new approach to mitigating security risks of phone clone co-location over mobile clouds. Journal of Network and Computer Applications, 62, 171–184 (2016)
Yang, L. T., Huang, G., Feng, J., Xu, L.: Parallel GNFS algorithm integrated with parallel block Wiedemann algorithm for RSA security in cloud computing. Information Sciences, 387, 254–265 (2016)
Usman, M., Jan, M. A., He, X.: Cryptography-based Secure Data Storage and Sharing Using HEVC and Public Clouds. Information Sciences, 387, 90–102 (2016)
Dai, H., Zhao, S., Chen, K.: A chaos-oriented prediction and suppression model to enhance the security for cyber physical power systems. Journal of Parallel and Distributed Computing, 103, 87–95 (2016)
Peng, Y., Cui, J., Li, H., Ma, J.: A reusable and single-interactive model for secure approximate k-nearest neighbor query in cloud. Information Sciences, 387, 147–164 (2016)
Li, Y., Gai, K., Qiu, L., Qiu, M., Zhao, H.: Intelligent cryptography approach for secure distributed big data storage in cloud computing. Information Sciences, 387, 103–115 (2016)
Xiang, T., Li, X., Chen, F., Guo, S., Yang, Y.: Processing secure, verifiable and efficient SQL over outsourced database. Information Sciences, 348, 163–178 (2016)
Zhu, Y., Huang, Z., Takagi, T.: Secure and controllable k-nn query over encrypted cloud data with key confidentiality. Journal of Parallel and Distributed Computing, 89, 1–12 (2016)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Garg, D., Sidhu, J. (2018). Survey on Implementation of Security in Cloud. In: Singh, R., Choudhury, S., Gehlot, A. (eds) Intelligent Communication, Control and Devices. Advances in Intelligent Systems and Computing, vol 624. Springer, Singapore. https://doi.org/10.1007/978-981-10-5903-2_164
Download citation
DOI: https://doi.org/10.1007/978-981-10-5903-2_164
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-5902-5
Online ISBN: 978-981-10-5903-2
eBook Packages: EngineeringEngineering (R0)