A Detailed Study on Security Services in Cloud Environment

S. Rajakumar, A. S. Anakath, R. Naresh, S. Senthilkmar
{"title":"A Detailed Study on Security Services in Cloud Environment","authors":"S. Rajakumar, A. S. Anakath, R. Naresh, S. Senthilkmar","doi":"10.1109/ICRTCCM.2017.24","DOIUrl":null,"url":null,"abstract":"Cloud computing is a powerful service that allows the cloud users to utilize the resources located in the cloud servers by pay-per-use or charge-per-use mode through the internet. The cloud users are enjoying the on-demand services provided by the cloud computing environment without maintaining the data in a local system. Even though the service is offered to cloud users in an efficient way, there are some serious security issues to be considered very much for maintaining and accessing the data in a secure way from the Cloud Service Provider (CSP). On the data placed in the cloud servers located in any part of the world, various security attacks might be performed by both the internal and external attackers to break the security services like confidentiality on data, user and server authentication, data integrity, and access control of data. This survey provides a detailed study of the recent security issues existing in the cloud environment. This study shows communication architecture of cloud computing and exhibits the security services data confidentiality, data integrity, user privacy, authentication and access control. There are five security services that need to be provided in the cloud network to make it a safe one in real time environment. This paper discusses about various existing works that are used to provide the five security services. For each security service, we have given a short description of the existing works and evaluated the efficiency of each existing works individually. Finally, based on the summary of the existing works, we have also proposed new solutions to mitigate the computation cost and to improve communication efficiency for providing the security services of the data stored in CSP.","PeriodicalId":134897,"journal":{"name":"2017 Second International Conference on Recent Trends and Challenges in Computational Models (ICRTCCM)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 Second International Conference on Recent Trends and Challenges in Computational Models (ICRTCCM)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICRTCCM.2017.24","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2

Abstract

Cloud computing is a powerful service that allows the cloud users to utilize the resources located in the cloud servers by pay-per-use or charge-per-use mode through the internet. The cloud users are enjoying the on-demand services provided by the cloud computing environment without maintaining the data in a local system. Even though the service is offered to cloud users in an efficient way, there are some serious security issues to be considered very much for maintaining and accessing the data in a secure way from the Cloud Service Provider (CSP). On the data placed in the cloud servers located in any part of the world, various security attacks might be performed by both the internal and external attackers to break the security services like confidentiality on data, user and server authentication, data integrity, and access control of data. This survey provides a detailed study of the recent security issues existing in the cloud environment. This study shows communication architecture of cloud computing and exhibits the security services data confidentiality, data integrity, user privacy, authentication and access control. There are five security services that need to be provided in the cloud network to make it a safe one in real time environment. This paper discusses about various existing works that are used to provide the five security services. For each security service, we have given a short description of the existing works and evaluated the efficiency of each existing works individually. Finally, based on the summary of the existing works, we have also proposed new solutions to mitigate the computation cost and to improve communication efficiency for providing the security services of the data stored in CSP.
云环境下安全服务的详细研究
云计算是一项功能强大的服务,它允许云用户通过互联网以按使用付费或按使用收费的方式利用位于云服务器中的资源。云用户无需在本地系统中维护数据,即可享受云计算环境提供的按需服务。尽管以一种有效的方式向云用户提供服务,但要从云服务提供商(CSP)以安全的方式维护和访问数据,仍然需要考虑一些严重的安全问题。对于放置在世界任何地方的云服务器上的数据,内部和外部攻击者可能会执行各种安全攻击,以破坏数据机密性、用户和服务器身份验证、数据完整性和数据访问控制等安全服务。该调查提供了对云环境中存在的最新安全问题的详细研究。本研究展示了云计算的通信架构,并展示了安全服务的数据机密性、数据完整性、用户隐私、认证和访问控制。云网络需要提供五大安全服务,使其成为一个安全的实时环境。本文讨论了现有的用于提供五种安全服务的各种工作。对于每一项保安服务,我们都对现有的工作进行了简短的描述,并分别评估了每一项现有工作的效率。最后,在总结现有工作的基础上,我们还提出了新的解决方案,以降低计算成本,提高通信效率,为存储在CSP中的数据提供安全服务。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信