A new perspective on cloud computing



EOI: 10.11242/viva-tech.01.05.001

Download Full Text here



Citation

Himanshu Dhande, Divya Karwande, Atharv Kadam, Akshata Raut, "A new perspective on cloud computing", VIVA-IJRI Volume 1, Issue 5, Article 65, pp. 1-10, 2022. Published by Computer Engineering Department, VIVA Institute of Technology, Virar, India.

Abstract

Cloud computing has become a widely exploited research area in academia and industry. Cloud computing benefits both cloud service providers (CSPs) and consumers. The security challenges associated with Cloud computing have been widely studied in the literature. This systematic literature review (SLR) is aimed at reviewing the existing research studies on cloud computing security, threats, and challenges. This SLR examined the research studies published between 2010 and 2020 within the popular digital libraries. We selected 80 papers after a meticulous screening of published works to answer the proposed research questions The outcome of this SLR reported seven major security threats to cloud computing services. The results showed that data tampering and leakage were among the most discussed topics in the chosen literature. Other identified security risks were associated with data intrusion and data storage in the cloud computing environment. These SLR's results also indicated that consumers' data outsourcing remains This is a challenge for both CSPs and cloud users. Our survey paper identified the blockchain as a partner. technology to alleviate security concerns. The SLR findings reveal some suggestions to be carried out in future work to bring data confidentiality, data integrity, and availability.

Keywords

Auditing, cloud computing, cloud models, decryption, encryption, intrusion, malicious behavior, secured communication

References

  1. Afgan E. et al., “The Galaxy platform for accessible, reproducible and collaborative biomedical analyses: 2016 update,” Nucleic Acids Res.,vol. 44, no. W1, pp. W3–W10, 2016
  2. Weinstein J. N. et al. (2013) The Cancer Genome Atlas Pan-Cancer analysis project. Nat. Genet. 45, 1113–1120(2015)
  3. Merkel, D.: Docker: lightweight Linux containers for consistent development and deployment. Linux J. 2014 (239), 2 (2014)
  4. H. A. Khalid, A. Erradi, S. Abdelwahed, and F. Baiardi, ‘‘Cui Lin,’’ Computing, vol. 98, no. 11, pp. 1111–1135, Nov. 2016.
  5. C.-J. Chung, P. Khatkar, T. Xing, J. Lee, and D. Huang, ‘‘NICE: Network intrusion detection and countermeasure selection in virtual network systems,’’ IEEE Trans. Dependable Secure Comput., vol. 10, no. 4, pp. 198–211, Jul. 2013.
  6. J.-Y. Park, S.-H. Na, and E.-N. Huh, ‘‘An optimal investment scheme based on ATM considering cloud security environment,’’ in Proc. 11th Int. Conf. Ubiquitous Inf. Manage. Commun., Jan. 2017, pp. 1–7.
  7. P. A. Boampong and L. A. Wahsheh, ‘‘Different facets of security in the cloud,’’ in Proc. 15th Commun. Netw. Simulation Symp., 2012, pp. 1–7.
  8. K. James, Cloud Computing: SaaS, PaaS, IaaS, Virtualization, Business Models, Mobile, Security, and More. Burlington, MA, USA: Jones & Bartlett, 2012.
  9. Wong, Wai Kit, et al. "Security in outsourcing of association rule mining." Proceedings of the 33rd international conference on Very large data bases. VLDB Endowment, 2007.
  10. Giannotti, Fosca, et al. "Privacy-preserving mining of association rules from outsourced transaction databases." IEEE Systems Journal 7.3 (2013): 385-395.
  11. Yi, Xun, et al. "Privacy-preserving association rule mining in cloud computing." Proceedings of the 10th ACM symposium on information, computer and communications security. ACM,2015.
  12. Agrawal, Rakesh, and Ramakrishnan Srikant. "Fast algorithms formining association rules." Proc. 20th int. conf. very large data bases,VLDB. Vol. 1215. 1994.
  13. Kim, Hyeong-Jin, Hyeong-Il Kim, and Jae-Woo Chang. "A Privacy-Preserving kN Classification Algorithm Using Yao' Garbled Circuit on Cloud Computing." Cloud Computing (CLOUD), 2017 IEEE 10th International Conference on. IEEE, 2017.
  14. Jakobson, Markus, and Ari Juels. "Mix and match: Secure function evaluation via ciphertexts." International Conference on the Theory and Application of Cryptology and Information Security. Springer, Berlin, Heidelberg, 2000.
  15. Brijs, Tom. "Retail market basket data set." Workshop on Frequent Itemset Mining Implementations (FIMI'03). 2003.