International Journal of Scientific & Technology Research

Home About Us Scope Editorial Board Contact Us

IJSTR >> Volume 3- Issue 5, May 2014 Edition

International Journal of Scientific & Technology Research  
International Journal of Scientific & Technology Research

Website: http://www.ijstr.org

ISSN 2277-8616

A Study On Data Security Issues In Public Cloud

[Full Text]



Alycia Sebastian, Dr. L. Arockiam



Keyword: data security, encryption, Key management, public cloud.



Abstract: The cloud computing concept has been evolving for more than 40 years. Cloud computing is an on demand computing in which dynamically scalable and often virtualized resources are provided as a service over the Internet. The cloud computing services are delivered through software as service (SaaS), platform as service (PaaS) and Infrastructure as service (IaaS). Cloud Computing moves the application software and databases to the large data centers, where the management of the data and services are provided by cloud service providers. The common data security concerns are securing data in transit and at rest, access control and data separation. In this survey paper, we review the data in public cloud, identify and discuss the security risks associated with it and analyze its solution strategies.



[1]. Peter Mell and Tim Grance. “The NIST Definition of Cloud Computing.” National Institute of Standards and Technology, Information Technology Laboratory, September 2011. http://csrc.nist.gov/groups/SNS/cloud-computing/cloud-def-v15.doc

[2]. http://searchcloudcomputing.techtarget.com/definition/cloud-computing

[3]. http://computer.howstuffworks.com/cloud-computing-crash-course.htm

[4]. 9 May 2011, http://elastic-security.com/2011/05/09/cloud-security-who-is-responsible/

[5]. http://en.wikipedia.org/wiki/Key_size,http://www.nsa.gov/business/programs/elliptic_curve.shtml

[6]. Krunal Suthar, Parmalik Kumar, Hitesh Gupta, Hiren Patel, “Analytical Comparison of Symmetric Encryption and Encoding Techniques for Cloud Environment”, International Journal of Computer Applications (0975 – 8887), Volume 60– No.19, December 2012

[7]. Hirani, “Energy Consumption of Encryption schemes in wireless device” Thesis, university of Pittsburgh, Retrieved Oct.1, 2008.

[8]. http://en.wikipedia.org/wiki/Public-key_cryptography#Weaknesses

[9]. Craig Gentry ,”A Fully Homomorphic Encryption scheme”, A dissertation submitted to the department of computer science and the committee on graduate studies of stanford university in partial fulfillment of the requirements for the degree of doctor of philosophy, September 2009.

[10]. Zvika Brakerski, Vinod Vaikuntanathany,”Efficient Fully Homomorphic Encryption from (Standard) LWE” , FOCS 2011.

[11]. Lee Badger, Cloud Computing: Some Implications for Key Management, http://csrc.nist.gov/groups/ST/key_mgmt/index.html, June 2009

[12]. Todd Thieman ,”https://blog.cloudsecurityalliance.org/2012/03/12/lock-box-where-should-you-store-cloud-encryption-keys/, March 12, 2012

[13]. Elaine Barker,Dennis Branstad ,Santosh Chokhani ,Miles Smid, Cryptographic Key Management Workshop Summary – June 8-9, 2009

[14]. http://en.wikipedia.org/wiki/Transport_Layer_Security

[15]. Michael A. Davis, 2012 Data Encryption Survey: Progress And Pain http://www.informationweek.com/security/encryption/2012-data-encryption-survey-progress-and/232500062, January 30, 2012

[16]. http://www.icann.org/en/about/learning/factsheets/dnssec-qaa-09oct08-en.htm

[17]. http://www.symantec.com/connect/blogs/dnssec-and-ssl-better-together

[18]. Sean Ludwig, cloudbeat2012, 28 November 2012, http://venturebeat.com/2012/11/28/cloud-security-cloudbeat-2012

[19]. http://www.onelogin.com/product/strong-authentication/two-factor-authentication/

[20]. http://www.computerweekly.com/news/2240148943/Investigation-reveals-serious-cloud-computing-data-security-flaws

[21]. http://www.webopedia.com/TERM/C/cloud_database.html

[22]. http://en.wikipedia.org/wiki/Cloud_database