RTPL (2015) 1-6 © STM Journals 2015. All Rights Reserved Page 1
Recent Trends in Programming Languages
Volume 2, Issue 1
www.stmjournals.com
Comparative Study on Various Security Algorithms in
Cloud Computing
K. Santhisri*, P.R.S.M. Lakshmi
Department of MCA, Vignan’s University, Guntur, A.P., India
Abstract
Cloud computing is a model for enabling, convenient, network access to a shared pool of
configurable computing resources that can be rapidly provisioned and released with minimal
management effort or service provider interaction. It is often provided "as a service" over the
Internet, remote access server typically in the form of infrastructure as a service (IaaS),
platform as a service (PaaS), or software as a service (SaaS). This paper deals with a brief
study about various security algorithms, security issues and security attacks in cloud
computing.
Keywords: Cloud computing, service, security attacks, security algorithms
*Author for Correspondence E-mail: srisanthi@gmail.com
INTRODUCTION
Cloud computing is a colloquial expression
that keeps up its application by using central
remote servers [1].
Cloud computing relies on sharing of
resources to achieve coherence and economies
of scale similar to a utility (like the electricity
grid). At the initial stage of cloud computing it
is the broader concept of converged
infrastructure and shares services.
The term moving cloud also refers to an
organization moving away from a traditional
capex model (buy the dedicated hardware and
depreciate it over a period of time) to the opex
model (use a shared cloud infrastructure and
pay as you use it). And it is a new computing
paradigm with implications for greater
flexibility and availability and also available in
lower cost.
Because of this, cloud computing has been
receiving a good deal of attention lately.
There are four deployment models (Figure 1)
operated by cloud computing. They are:
(i) Community Cloud,
(ii) Private Cloud,
(iii) Public Cloud, and
(iv) Hybrid Cloud.
Fig. 1: Deployment Models.
Private Cloud
The cloud infrastructure is operated solely for
an enterprise. It may be managed by the
enterprise or a third party and may exist on
premise or off premise.
Community Cloud
The cloud infrastructure is shared by several
organizations and supports a specific
community that has shared concerns (e.g.,
mission, security requirements and compliance
considerations). Organizations can manage the
community cloud or a third party and may
exist on premise or off premise.
Public Cloud
The cloud infrastructure is made available to
the general public or a large industry group
and it is owned by an organization selling and