A Meta-analysis on the Security Control Measures in Cloud Migration

Authors

  • Sreeja S.P. Sr. Asst. Professor, Department of MCA, New Horizon College of Engineering, Bangalore Author
  • Dr.B. Meenakshi Sundaram Assoc. Professor, Department of MCA, New Horizon College of Engineering, Bangalore Author

DOI:

https://doi.org/10.61841/66rmsf02

Keywords:

Security, Public Cloud, Insurance, Network, Users, Encryption, Descryption

Abstract

The data need to be shared on a cloud platform with high security and maintained in the cloud in a secure manner for any customer storing the information. There are various cloud providers who provide separate data centers and are present in different locations. This enables it to act as a backup for the customer, and it should be secured. This paper discusses the cloud computing security measures. 

Downloads

Download data is not yet available.

References

[1] Parsi Kalpana, Sudha Singaraju, “Data Security in Cloud Computing using RSA Algorithm,” IJRCCT, ISSN 2278-5841, Vol. 1, Issue 4, September 2012.

[2] Neha Jain, Gurpreet Kaur, „Implementing DES Algorithm in Cloud for Data Security,” VSRD International Journal of CS and IT, 2012.

[3] Akhil Behl, “Emerging Security Challenges in Cloud Computing,” IEEE 2011.

[4] Simarjeet Kaur, “Cryptography and Encryption in Cloud Computing,” VSRD International Journal of CS and IT, 2012.

[5] V. Sandhya, “A Study on Various Security Methods in Cloud Computing,” International Journal of

Advanced Research in Computer Science, Volume 2,o. 6, Nov-Dec 2011.

[6] Simarjeet Kaur, “Cryptography and Encryption in Cloud Computing,” VSRD International Journal of

Computer Science and Information Technology, Vol. 2(3), 242-249, 2012.

[7] Birendra Goswami, Dr. N. Singh, “Enhancing Security in Cloud computing using Public Key

Cryptography with Matrices,” International Journal of Engineering Research and Applications, Vol 2,

Issue 4, 339-344, July-Aug 2012.

[8] G. Jai Arul Jose, Sanjeev, Dr. C. Suyambulingom, “Implementation of Data Security in Cloud

Computing,” International Journal of P2P Network Trends and Technology, Vol. 1, Issue 1, 2011.

[9] William Stallings, “Network Security Essentials Applications and Standards,” Third Edition, Pearson

Education, 2007.

[10] Hassan Takabi and James B.D. Joshi. Policy Management as a Service: An Approach to Manage Policy

Heterogeneity in Cloud Computing Environment. 2012 45th Hawaii International Conference on System

Sciences. 2012 IEEE.

[11] Researcher Demonstrates Simple BitLocker Bypass. By SecurityWeek News on November 18, 2015, from

http://www.securityweek.com/researcherdemonstrates-simple-bitlockerbypass. Consulted MAR 10, 2016.

[12] Timothy Zhu, Alexey Tumanov, Michael A. Kozuch. Priority Meister: Tail Latency QoS for Shared Networked Storage. ACM 2014.

[13] Jens Myrup Pedersen, M. Tahir Riaz, Bozydar BozydarDubalski, Damian Ledzinski, Joaquim Celestino Jnior, and Ahmed Patel. Using latency as a QoS indicator for global cloud computing services. John Wiley& Son 2013.

[14] Iain Thomson. Microsoft researchers smash the homomorphic encryption speed barrier. From

http://www.theregister.co.uk/2016/02/09/researchers_break_homomorphic_encryption. The Register (Feb 9, 2016) consulted JUN 1, 2016.

[15] Nathan Dowlin, Ran Gilad-Bachrach, Kim Laine, Kristin Lauter, Michael Naehrig, and John Wernsing. CryptoNets: Applying Neural Networks to Encrypted Data with High Throughput and Accuracy. Microsoft Research (February 24, 2016).

[16] MahaTebba, Saïd Haji Abdellatif Ghazi, “Homomorphic Encryption Applied to the Cloud Computing Security”, World Congress on Engineering 2012

[17] Sandro Rafaeli, “Survey of key management for secure communication”, ACM Computing Surveys, 2013.

Downloads

Published

31.07.2020

How to Cite

S.P. , S., & B. , M. S. (2020). A Meta-analysis on the Security Control Measures in Cloud Migration. International Journal of Psychosocial Rehabilitation, 24(5), 6943-6947. https://doi.org/10.61841/66rmsf02