Logo PTI
Polish Information Processing Society
Logo RICE

Annals of Computer Science and Information Systems, Volume 10

Proceedings of the Second International Conference on Research in Intelligent and Computing in Engineering

A Review Paper on Cloud Computing and Its Security Concerns

, , ,

DOI: http://dx.doi.org/10.15439/2017R70

Citation: Proceedings of the Second International Conference on Research in Intelligent and Computing in Engineering, Vijender Kumar Solanki, Vijay Bhasker Semwal, Rubén González Crespo, Vishwanath Bijalwan (eds). ACSIS, Vol. 10, pages 245250 ()

Full text

Abstract. Cloud computing in the present scenario is a developing and fast growing technology that is being widely used around the globe. It utilizes the power of Internet based computing and here the data, information and other resources are provided to the user via computer or device on-demand. It's a new conception that uses virtual resources for sharing data has evolved. Yahoo or Gmail are some suitable examples of cloud computing. Various industries that include health care, banking and education are drifting towards this technology, all because of the efficiency provided by the system which is powered by pay as you use model and hence it takes care of the bandwidth, data movement, transactions and storage information.

References

  1. Azura Che Soh, Mohd Khair Hassan and Li Hong Fey 2004. “Intelligent movement control for robots using fuzzy logic”, Conference Artificial Intelligence in Engineering and Technology (ICAET-2004), Sabah, Malaysia.
  2. A. C. Nearchou, "Adaptive navigation of autonomous vehicles using evolutionary algorithms," Artificial Intelligence in Engineering, vol. 13, 1999, pp. 159-173.
  3. J. C. Latombe, Robot Motion Planning, Norwell, MA: Kluwer, 1991. Fuzzy Logic Reasoning to Control Mobile Robot on Pre-defined Strip Path.
  4. Satveer Kaur and Amanpreet Singh “The concept of Cloud Computing and Issues regarding its Privacy and Security” International Journal of Engineering Research & Technology (IJERT), Vol 1 Issue 3, May 2012.
  5. Farzad Sabahi “Cloud Computing Security threats and Responses”, 2011 IEEE 3rd International Conference on Communication Software and Network (ICCSN), pp. 245-249, May 2011.
  6. Chen, D. and Zhao, H. (2012). Data Security and Privacy Protection Issues in Cloud Computing. International Conference on Computer Science and Electronics Engineering, 647-651. http://dx.doi.org/10.1109/ICCSEE.2012.193
  7. Hamlen, K., Kantarcioglu, M., Khan, L. and Thuraisingham, V. (2010). Security Issues for Cloud Computing. International Journal of Information Security and Privacy, 4(2), 39-51. http://dx.doi.org/10.4018/jisp.2010040103
  8. Kuyoro, S.O., Ibikunle, F. and Awodele, O. (2011). Cloud Computing Security Issues and Challenges. International Journal of Computer Networks, 3(5), 247-255.
  9. Aman Bakshi, Yogesh B. Dujodwala, “Securing cloud from DDoS Attacks using Intrusion Detection System in Virtual Machine,” ICCSN’10 Proceeding of the 2010 Second International Conference on Communication Software and networks, pp. 260-264, 2010, IEEE Computer Society, USA, 2010. ISBN: 978-0-7695-3961-4.
  10. V. Krishna Reddy, B. Thirumal Rao, Dr. L.S.S. Reddy, P.Sai Kiran “Research Issues in Cloud Computing “ Global Journal of Computer Science and Technology, Volume 11, Issue 11, July 2011.
  11. Lee, K. (2012). Security Threats in Cloud Computing Environments. International Journal of Security and Its Application, 6(4), 25-32.
  12. Agarwal, A. and Agarwal, A. (2011). The Security Risks Associated with Cloud Computing. International Journal of Computer Applications in Engineering Sciences, 1 (Special Issue on CNS), 257- 259.
  13. Hashizume et al. (2013). An analysis of security issues for cloud computing. Journal of Internet Services and Applications, 4(5), 1-13.
  14. www.springer.com/engineering/mechanical+eng/journal/163