INTERNATIONAL RESEARCH JOURNAL OF SCIENCE ENGINEERING AND TECHNOLOGY

( Online- ISSN 2454 -3195 ) New DOI : 10.32804/RJSET

Impact Factor* - 6.2311


**Need Help in Content editing, Data Analysis.

Research Gateway

Adv For Editing Content

   No of Download : 74    Submit Your Rating     Cite This   Download        Certificate

INFORMATION SECURITY AND PRIVACY IN CLOUD COMPUTING

    2 Author(s):  YASHIKA CHAWLA , ASST.PROF. RAHUL KUMAR CHAWDA

Vol -  10, Issue- 3 ,         Page(s) : 11 - 22  (2020 ) DOI : https://doi.org/10.32804/RJSET

Abstract

Information security has reliably been a significant issue in data innovation. In the distributed computing condition, it becomes especially genuine on the grounds that the information is situated in better places even in all the globe. Information security and security insurance are the two fundamental components of client's interests about the cloud innovation. In spite of the fact that numerous procedures on the points in distributed computing have been explored in the two scholastics and ventures, information security and security insurance are becoming more significant for the future advancement of distributed computing innovation in government, industry, and business. Information security and security insurance issues are applicable to both equipment and programming in the cloud design. This examination is to survey diverse security methods and challenges from both programming and equipment angles for ensuring information in the cloud and targets improving the information security and security assurance for the dependable cloud condition. In this paper, we make a relative exploration examination of the current research work with respect to the information security and security insurance procedures utilized in the distributed computing.

[1] N. Leavitt, “Is cloud computing really ready for prime time?”
Computer, vol. 42, no. 1, pp. 15–25, 2009.
[2] P.Mell and T. Grance, “The nist definition of cloud computing,”
National Institute of Standards and Technology, vol. 53, no. 6,
article 50, 2009.
[3] F. Berman,G.Fox, andA. J. G. Hey, Grid Computing:Making the
Global Infrastructure a Reality, Volume 2, JohnWiley and sons,
2003.
[4] M. A. Shah, R. Swaminathan, and M. Baker, “Privacy-preserving
audit and extraction of digital contents,” IACR Cryptology
EPrint Archive, vol. 186, 2008.
[5] Z. Xiao andY.Xiao, “Security and privacy in cloud computing,”
IEEE Communications Surveys & Tutorials, vol. 15, no. 2, pp.
843–859, 2013.
[6] N. Kshetri, “Privacy and security issues in cloud computing: the
role of institutions and institutional evolution,” Telecommunications
Policy, vol. 37, no. 4-5, pp. 372–386, 2013.
[7] R. Latif, H. Abbas, S. Assar, and Q. Ali, “Cloud computing risk
assessment: a systematic literature review,” in Future Information
Technology, pp. 285–295, Springer, Berlin, Germany, 2014.
[8] A. Aviˇzienis, J. Laprie, B. Randell, and C. Landwehr, “Basic
concepts and taxonomy of dependable and secure computing,”
IEEE Transactions on Dependable and Secure Computing, vol. 1,
no. 1, pp. 11–33, 2004.
[9] Z. Mahmood, “Data location and security issues in cloud
computing,” in Proceedings of the 2nd International Conference
on Emerging Intelligent Data andWeb Technologies (EIDWT ’11),
pp. 49–54, IEEE, September 2011.
[10] D. Sun, G. Chang, L. Sun, and X. Wang, “Surveying and analyzing
security, privacy and trust issues in cloud computing
environments,” in Proceedings of the International Conference on
Advanced in Control Engineering and Information Science (CEIS

*Contents are provided by Authors of articles. Please contact us if you having any query.






Bank Details