Journal of Electrical and Electronic Engineering

| Peer-Reviewed |

Analyze Threats in Cloud Computing

Received: 29 October 2016    Accepted: 16 November 2016    Published: 21 December 2016
Views:       Downloads:

Share This Article

Abstract

In this work, we conduct an in-depth survey on cloud computing technologies, data storage and information security problems. After an overview of the cloud storage system and threats to them, we focus on four hot data protection topics. They are data integrity, data confidentiality, access control and data manipulation in the secure domain. Also, we describe main threats by services SaaS, PaaS and IaaS in the cloud computing systems.

DOI 10.11648/j.jeee.20160406.11
Published in Journal of Electrical and Electronic Engineering (Volume 4, Issue 6, December 2016)
Page(s) 145-149
Creative Commons

This is an Open Access article, distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution and reproduction in any medium or format, provided the original work is properly cited.

Copyright

Copyright © The Author(s), 2024. Published by Science Publishing Group

Keywords

IaaS, PaaS, SaaS, SOAP, REST, Private, Public, Hybrid

References
[1] Hassan, Qusay. “Demystifying Cloud Computing”. The Journal of Defense Software Engineering. CrossTalk. 2011 (Jan/Feb): 16–21. Retrieved 11 December 2014.
[2] Vigya Dubey, Pranjal Agrawal. “Cloud Computing and Data Management”, Symposium on Colossal Data Analysis and Networking (CDAN). 2016.
[3] W. Zeng, Y. Zhao, K. Ou, and W. Song, “Research on cloud storage architecture and key technologies" in Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, Culture and Human, Seoul, Korea, 2009, pp. 1044-1048.
[4] Chun-Ting Huang, Zhongyuan Qin, Jay Kuo. “Multimedia Storage Security in Cloud Computing: An Overview”. MMSP 2011. IEEE. 2011.
[5] Saakshi Narula, Arushi Jain, Ms. Prachi. “Cloud computing security: amazon web service”. 2015 Fifth International Conference on Advanced Computing & Communication Technologies.
[6] Akanksha Singh, Smita Sharma, Shipra Ravi Kumar, Suman Avdesh Yadav. “Overview of PaaS and SaaS and its Application in Cloud Computing”. 2016 1st International Conference on Innovation and Challenges in Cyber Security (ICICCS 2016).
[7] M. Armbrust, A. Fox, R. Griffith, A. D. Joseph, R. H. Katz, A. Konwinski, G. Lee, D. A. Patterson, A. Rabkin, I. Stoica, and M. Zaharia, “Above the clouds: a Berkeley view of cloud computing” Univ. of California, Berkeley, CA Technical Report No. UCB/EECS-2009-28, 2009.
[8] Boritz, J. “IS Practitioners' Views on Core Concepts of Information Integrity”. International Journal of Accounting Information Systems. Elsevier. Retrieved 12 August 2011.
[9] A. Yun, C. Shi, and Y. Kim, “On protecting integrity and confidentiality of cryptographic file system for outsourced storage” in Proceedings of the ACM workshop on Cloud computing security, Chicago, Illinois, USA, 2009, pp. 67-76.
[10] “Micro Strategy’s office of the future includes mobile identity and cyber security”. Washington Post. 2014-04-14. Retrieved 2014-03-30.
Author Information
  • Information Security Department, Tashkent University of Information Technology, Tashkent, Uzbekistan

  • Cryptology and Discrete Mathematic Department, Tashkent University of Information Technology, Tashkent, Uzbekistan

  • Information Security Department, Tashkent University of Information Technology, Tashkent, Uzbekistan

Cite This Article
  • APA Style

    Tashev Komil Akhmatovich, Islomov Shahboz Zokir Ugli, Zokirov Odiljon. (2016). Analyze Threats in Cloud Computing. Journal of Electrical and Electronic Engineering, 4(6), 145-149. https://doi.org/10.11648/j.jeee.20160406.11

    Copy | Download

    ACS Style

    Tashev Komil Akhmatovich; Islomov Shahboz Zokir Ugli; Zokirov Odiljon. Analyze Threats in Cloud Computing. J. Electr. Electron. Eng. 2016, 4(6), 145-149. doi: 10.11648/j.jeee.20160406.11

    Copy | Download

    AMA Style

    Tashev Komil Akhmatovich, Islomov Shahboz Zokir Ugli, Zokirov Odiljon. Analyze Threats in Cloud Computing. J Electr Electron Eng. 2016;4(6):145-149. doi: 10.11648/j.jeee.20160406.11

    Copy | Download

  • @article{10.11648/j.jeee.20160406.11,
      author = {Tashev Komil Akhmatovich and Islomov Shahboz Zokir Ugli and Zokirov Odiljon},
      title = {Analyze Threats in Cloud Computing},
      journal = {Journal of Electrical and Electronic Engineering},
      volume = {4},
      number = {6},
      pages = {145-149},
      doi = {10.11648/j.jeee.20160406.11},
      url = {https://doi.org/10.11648/j.jeee.20160406.11},
      eprint = {https://download.sciencepg.com/pdf/10.11648.j.jeee.20160406.11},
      abstract = {In this work, we conduct an in-depth survey on cloud computing technologies, data storage and information security problems. After an overview of the cloud storage system and threats to them, we focus on four hot data protection topics. They are data integrity, data confidentiality, access control and data manipulation in the secure domain. Also, we describe main threats by services SaaS, PaaS and IaaS in the cloud computing systems.},
     year = {2016}
    }
    

    Copy | Download

  • TY  - JOUR
    T1  - Analyze Threats in Cloud Computing
    AU  - Tashev Komil Akhmatovich
    AU  - Islomov Shahboz Zokir Ugli
    AU  - Zokirov Odiljon
    Y1  - 2016/12/21
    PY  - 2016
    N1  - https://doi.org/10.11648/j.jeee.20160406.11
    DO  - 10.11648/j.jeee.20160406.11
    T2  - Journal of Electrical and Electronic Engineering
    JF  - Journal of Electrical and Electronic Engineering
    JO  - Journal of Electrical and Electronic Engineering
    SP  - 145
    EP  - 149
    PB  - Science Publishing Group
    SN  - 2329-1605
    UR  - https://doi.org/10.11648/j.jeee.20160406.11
    AB  - In this work, we conduct an in-depth survey on cloud computing technologies, data storage and information security problems. After an overview of the cloud storage system and threats to them, we focus on four hot data protection topics. They are data integrity, data confidentiality, access control and data manipulation in the secure domain. Also, we describe main threats by services SaaS, PaaS and IaaS in the cloud computing systems.
    VL  - 4
    IS  - 6
    ER  - 

    Copy | Download

  • Sections