Analyze Threats in Cloud Computing
Journal of Electrical and Electronic Engineering
Volume 4, Issue 6, December 2016, Pages: 145-149
Received: Oct. 29, 2016; Accepted: Nov. 16, 2016; Published: Dec. 21, 2016
Views 2457      Downloads 97
Authors
Tashev Komil Akhmatovich, Information Security Department, Tashkent University of Information Technology, Tashkent, Uzbekistan
Islomov Shahboz Zokir Ugli, Cryptology and Discrete Mathematic Department, Tashkent University of Information Technology, Tashkent, Uzbekistan
Zokirov Odiljon, Information Security Department, Tashkent University of Information Technology, Tashkent, Uzbekistan
Article Tools
Follow on us
Abstract
In this work, we conduct an in-depth survey on cloud computing technologies, data storage and information security problems. After an overview of the cloud storage system and threats to them, we focus on four hot data protection topics. They are data integrity, data confidentiality, access control and data manipulation in the secure domain. Also, we describe main threats by services SaaS, PaaS and IaaS in the cloud computing systems.
Keywords
IaaS, PaaS, SaaS, SOAP, REST, Private, Public, Hybrid
To cite this article
Tashev Komil Akhmatovich, Islomov Shahboz Zokir Ugli, Zokirov Odiljon, Analyze Threats in Cloud Computing, Journal of Electrical and Electronic Engineering. Vol. 4, No. 6, 2016, pp. 145-149. doi: 10.11648/j.jeee.20160406.11
Copyright
Copyright © 2016 Authors retain the copyright of this article.
This article is an open access article distributed under the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0/) which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
References
[1]
Hassan, Qusay. “Demystifying Cloud Computing”. The Journal of Defense Software Engineering. CrossTalk. 2011 (Jan/Feb): 16–21. Retrieved 11 December 2014.
[2]
Vigya Dubey, Pranjal Agrawal. “Cloud Computing and Data Management”, Symposium on Colossal Data Analysis and Networking (CDAN). 2016.
[3]
W. Zeng, Y. Zhao, K. Ou, and W. Song, “Research on cloud storage architecture and key technologies" in Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, Culture and Human, Seoul, Korea, 2009, pp. 1044-1048.
[4]
Chun-Ting Huang, Zhongyuan Qin, Jay Kuo. “Multimedia Storage Security in Cloud Computing: An Overview”. MMSP 2011. IEEE. 2011.
[5]
Saakshi Narula, Arushi Jain, Ms. Prachi. “Cloud computing security: amazon web service”. 2015 Fifth International Conference on Advanced Computing & Communication Technologies.
[6]
Akanksha Singh, Smita Sharma, Shipra Ravi Kumar, Suman Avdesh Yadav. “Overview of PaaS and SaaS and its Application in Cloud Computing”. 2016 1st International Conference on Innovation and Challenges in Cyber Security (ICICCS 2016).
[7]
M. Armbrust, A. Fox, R. Griffith, A. D. Joseph, R. H. Katz, A. Konwinski, G. Lee, D. A. Patterson, A. Rabkin, I. Stoica, and M. Zaharia, “Above the clouds: a Berkeley view of cloud computing” Univ. of California, Berkeley, CA Technical Report No. UCB/EECS-2009-28, 2009.
[8]
Boritz, J. “IS Practitioners' Views on Core Concepts of Information Integrity”. International Journal of Accounting Information Systems. Elsevier. Retrieved 12 August 2011.
[9]
A. Yun, C. Shi, and Y. Kim, “On protecting integrity and confidentiality of cryptographic file system for outsourced storage” in Proceedings of the ACM workshop on Cloud computing security, Chicago, Illinois, USA, 2009, pp. 67-76.
[10]
“Micro Strategy’s office of the future includes mobile identity and cyber security”. Washington Post. 2014-04-14. Retrieved 2014-03-30.
ADDRESS
Science Publishing Group
1 Rockefeller Plaza,
10th and 11th Floors,
New York, NY 10020
U.S.A.
Tel: (001)347-983-5186