ACCENTS Transactions on Information Security, Vol 3(12)
ISSN (Online): 2455-7196
http://dx.doi.org/10.19101/TIS.2018.311002
36
Cloud computing security: a review
Mahale Rahul Bhaskar
1*
, Kailash Patidar
2
, Rishi Kushwah
3
and Sudeesh Chouhan
3
M.Tech Scholar, Department of Computer Science, School of Engineering, Sri Satya Sai University of Technology
& Medical Sciences, Sehore, Madhya Pradesh, India
1
Professor and HOD, Department of Computer Science, School of Engineering, Sri Satya Sai University of
Technology & Medical Sciences, Sehore, Madhya Pradesh, India
2
Assistant Professor, Department of Computer Science, School of Engineering, Sri Satya Sai University of
Technology & Medical Sciences, Sehore, Madhya Pradesh, India
3
©2018 ACCENTS
1.Introduction
In the current business arena cloud computing is very
helpful and cost effective for small business as well
as for the larger business [1−5]. In the today’s world
the use of cloud computing is spreading in different
areas. It includes the university, business enterprise,
IT industry, Health sector etc. The security concern is
the major concern these days. There are several
literature which discussed this type of issues like
[6−10]. Virtualization, dominating enlisting is
additionally the more obvious office parts of passed
on preparing. In any case, to satisfy the execution on
the parallel framework and keeping up the decency is
convincing [11]. In every single one of these works,
stunning attempts are made to plan strategies that
meet assorted fundamentals: high game plan
feasibility, stateless check, unbounded use of request
and wretchedness of information, and so forth.
Thinking about the piece of the verifier in the model,
every last one of the plans showed before fall into
two classes: private auditability and open auditability
[5]. Despite the manner in which that orchestrates
with private auditability can play out the plans
enough, yet it is attempting circumstance if the
information is anchoring quietly [5].
*Author for correspondence
Virtualization is the key fragments of scattered
figuring by which information sharing is conceivable
between various machines of virtual closeness from
the server develop [12]. Virtualization draws in the
live relocation [9] of virtual machines which helps in
keeping up the guaranteed SLA to the cloud client
other than to change stack crosswise over physical
servers in the information centres [12, 13].
In the cloud provider market the main providers are
Google, Microsoft, Amazon and Salesforce.com. The
appropriated figuring advantage show relies upon the
data correspondence layer. The whole
correspondence is relies upon three layers. The layers
of the cloud computing are: Software as a Service
(SaaS) which is for the software based application.
Customer relationship organization (CRM) is the
example [14]. Platform as a Service (PaaS) is fior the
platform based application for he different
deployment services. Infrastructure as a Service
(IaaS) by and large joins virtualization conditions as
got associations rather than physical or submitted PC
gear.
In the standard method for figuring the advantages
are picked up locally which are incidentally higher in
expense and not sensible. This compels the courses in
which a client could take an interest with the thing in
Review Article
Abstract
In the current scenario the emerging world demands of clod computing services is increasing day by day. This increasing
demand is due to the on demand service with cost effective approach. The increasing trend as several advantages offered
through cloud computing. But the negative side is the security issues. Due to the huge use and data communication
through data transfer on demand there is several possibility of security breach. So in this paper the main aim is to discus
and provides the analysis based on the previous method in the direction of data security in the cloud computing
environment. This analysis provides the security analysis in terms of public and private clouds.
Keywords
Cloud computing, Security breaches, Public cloud, Private cloud.