Citations


Contact Us

For Marketing, Sales and Subscriptions Inquiries
2637 E Atlantic Blvd #43110
Pompano Beach, FL 33062
USA

Conference List

Review of Computer Engineering Research

June 2020, Volume 7, 1, pp 12-19

Cloud Security Vulnerabilities and Solution Model

Shouket Ahmad Kouchay

Shouket Ahmad Kouchay 1


  1. Faculty, King Saud University, KSA. 1

on Google Scholar
on PubMed

Pages: 12-19

DOI: 10.18488/journal.76.2020.71.12.19

Share :

Article History:

Received: 28 October, 2019
Revised: 03 December, 2019
Accepted: 06 January, 2020
Published: 13 February, 2020


Abstract:

Cloud computing is the revolution and solution to the computing world which has paid further attention as an emerging network storage technology. Cloud computing has enormous adaptability in terms of demand or availability of resources. The organization prefers cloud storage services to reduce the overhead of storing data locally. Yet, Data security and privacy are the major issues in cloud computing. Although security is still one of the critical challenges in the world of cloud computing. The security concerns comprise the loss of vital information and privacy loss of any individual who uses cloud networking. This research reviews the cloud Security, its vulnerabilities and proposes a three-layer model of AES encryption for Cloud Computing Security and RSA is used to hide the key of the AES. According to our research, this model is one of the most compact encryption which consumes less storage space with short calculation time. A detailed review of cloud security concerns and resolutions has been discussed in this paper.
Contribution/ Originality
This research reviews the cloud Security, its vulnerabilities and proposes a three-layer model of AES encryption for Cloud Computing Security and RSA is used to hide the key of the AES.

Keywords:

Cloud security vulnerabilities, Advanced encryption standard, IAAS, SAAS, PAAS, Cloud computing security technique.

Reference:

[1]          Cloud Vulnerabilities Working Group, "Cloud vulnerabilities research program." Retrieved: https://www.vulnerability-lab.com/ . [Accessed Dec 2019], 2016.

[2]          G. Calvary, Computer science and ambient intelligence, 1st ed. London: Iste, 2013.

[3]          Z. Fu, X. Sun, N. Linge, and L. Zhou, "Achieving effective cloud search services: Multi-keyword ranked search over encrypted cloud data supporting synonym query," IEEE Transactions on Consumer Electronics, vol. 60, pp. 164-172, 2014.Available at: https://doi.org/10.1109/tce.2014.6780939.

[4]          S. O. Kuyoro, F. Ibikunle, and O. Awodele, "Cloud computing security issues and challenges," International Journal of Computer Networks, vol. 3, pp. 247-255, 2011.

[5]          L. Allen, T. Heriyanto, and S. Ali, Kali linux - assuring security by penetration testing, 1st ed. Birmingham, UK: Packt Publication, 2014.

[6]          A. K. Shouket, "Secured architecture strategy for fighting against bots," Computer Science & Telecommunications, vol. 40, pp. 16-23, 2013.

[7]          B. M. Salih and H. A. Edreis, "Comparison between virtualization and cloud computing," International Journal of Science and Research, vol. 5, pp. 195-199, 2016.Available at: https://doi.org/10.21275/v5i6.nov164128.

[8]          S. Singh, Y. S. Jeong, and J. H. Park, "A survey on cloud computing security: Issues, threats, and solutions," Journal of Network and Computer Applications, vol. 75, pp. 200-222, 2016.

[9]          K. Kumar and P. Kaur, "Road traffic control system in cloud computing: A review," International Journal of Grid and Distributed Computing, vol. 8, pp. 201-206, 2015.Available at: https://doi.org/10.14257/ijgdc.2015.8.3.20.

[10]        T. Erl, R. Puttini, and Z. Mahmood, Cloud computing: Concepts, technology & architecture: Pearson Education, 2013.

[11]        M. Loudini, S. Rezig, and Y. Salhi, "Incorporate intelligence into the differentiated services strategies of a Web server: An advanced feedback control approach," Journal of Internet Services and Applications, vol. 1, pp. 1-16, 2013.

[12]        S. Rajasekhar, E. Murali, and G. Nagalakshm, "Efficient architecture cloud computing confidentiality," International Journal of Research Studies in Computer Science and Engineering, vol. 3, pp. 12-16, 2016.

[13]        C. Esposito, A. Castiglione, B. Martini, and K. Choo, "Cloud manufacturing: Security, privacy, and forensic concerns," IEEE Cloud Computing, vol. 3, pp. 16-22, 2016.Available at: https://doi.org/10.1109/mcc.2016.79.

[14]        N. Huansheng, Unit and ubiquitous internet of things: CRC Press, 2016.

[15]        S. Pearson and G. Yee, Privacy and security for cloud computing, 1st ed. London: Springer, 2013.

[16]        L. Zhang, "Software architecture evaluation," Journal of Software, vol. 19, pp. 1328-1339, 2008.Available at: https://doi.org/10.3724/sp.j.1001.2008.01328.

[17]        R. Samani, B. Honan, J. Reavis, and V. Jirasek, CSA guide to cloud computing, 1st ed. Waltham, MA: Syngress, 2015.

[18]        H. Takabi, J. Joshi, and G. Ahn, "Security and privacy challenges in cloud computing environments," IEEE Security & Privacy Magazine, vol. 8, pp. 24-31, 2010.Available at: https://doi.org/10.1109/msp.2010.186.

[19]        S. Sherin, S., "Security and privacy issues of cloud computing; Solutions and secure framework," IOSR Journal of Computer Engineering, vol. 10, pp. 33-37, 2013.Available at: https://doi.org/10.9790/0661-01043337.

[20]        A. Gouri, K. Karthik, G. Arpita, and G. Priya, "Review on security management in cloud computing," International Journal of Engineering and Computer Science, vol. 5, pp. 18897-18906, 2016.

[21]        Z. Tari, "Security and privacy in cloud computing," IEEE Cloud Computing, vol. 1, pp. 54-57, 2014.

[22]        M. ZekriyapanahGashti, "Scrutiny new framework in integrated distributed reliable systems," International Journal of Distributed and Parallel Systems, vol. 3, pp. 13-20, 2012.Available at: https://doi.org/10.5121/ijdps.2012.3502.

[23]        R. Minni, K. Sultania, S. Mishra, and D. R. Vincent, "An algorithm to enhance security in RSA," presented at the 2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT). IEEE, 2013.

Statistics:

Google Scholor ideas Microsoft Academic Search bing Google Scholor

Funding:

This study received no specific financial support.

Competing Interests:

The author declares that there are no conflicts of interests regarding the publication of this paper.

Acknowledgement:


Related Article