S. Rajakumar, A. S. Anakath, R. Naresh, S. Senthilkmar
{"title":"云环境下安全服务的详细研究","authors":"S. Rajakumar, A. S. Anakath, R. Naresh, S. Senthilkmar","doi":"10.1109/ICRTCCM.2017.24","DOIUrl":null,"url":null,"abstract":"Cloud computing is a powerful service that allows the cloud users to utilize the resources located in the cloud servers by pay-per-use or charge-per-use mode through the internet. The cloud users are enjoying the on-demand services provided by the cloud computing environment without maintaining the data in a local system. Even though the service is offered to cloud users in an efficient way, there are some serious security issues to be considered very much for maintaining and accessing the data in a secure way from the Cloud Service Provider (CSP). On the data placed in the cloud servers located in any part of the world, various security attacks might be performed by both the internal and external attackers to break the security services like confidentiality on data, user and server authentication, data integrity, and access control of data. This survey provides a detailed study of the recent security issues existing in the cloud environment. This study shows communication architecture of cloud computing and exhibits the security services data confidentiality, data integrity, user privacy, authentication and access control. There are five security services that need to be provided in the cloud network to make it a safe one in real time environment. This paper discusses about various existing works that are used to provide the five security services. For each security service, we have given a short description of the existing works and evaluated the efficiency of each existing works individually. Finally, based on the summary of the existing works, we have also proposed new solutions to mitigate the computation cost and to improve communication efficiency for providing the security services of the data stored in CSP.","PeriodicalId":134897,"journal":{"name":"2017 Second International Conference on Recent Trends and Challenges in Computational Models (ICRTCCM)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"A Detailed Study on Security Services in Cloud Environment\",\"authors\":\"S. Rajakumar, A. S. Anakath, R. Naresh, S. Senthilkmar\",\"doi\":\"10.1109/ICRTCCM.2017.24\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Cloud computing is a powerful service that allows the cloud users to utilize the resources located in the cloud servers by pay-per-use or charge-per-use mode through the internet. The cloud users are enjoying the on-demand services provided by the cloud computing environment without maintaining the data in a local system. Even though the service is offered to cloud users in an efficient way, there are some serious security issues to be considered very much for maintaining and accessing the data in a secure way from the Cloud Service Provider (CSP). On the data placed in the cloud servers located in any part of the world, various security attacks might be performed by both the internal and external attackers to break the security services like confidentiality on data, user and server authentication, data integrity, and access control of data. This survey provides a detailed study of the recent security issues existing in the cloud environment. This study shows communication architecture of cloud computing and exhibits the security services data confidentiality, data integrity, user privacy, authentication and access control. There are five security services that need to be provided in the cloud network to make it a safe one in real time environment. This paper discusses about various existing works that are used to provide the five security services. For each security service, we have given a short description of the existing works and evaluated the efficiency of each existing works individually. Finally, based on the summary of the existing works, we have also proposed new solutions to mitigate the computation cost and to improve communication efficiency for providing the security services of the data stored in CSP.\",\"PeriodicalId\":134897,\"journal\":{\"name\":\"2017 Second International Conference on Recent Trends and Challenges in Computational Models (ICRTCCM)\",\"volume\":\"44 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2017-02-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2017 Second International Conference on Recent Trends and Challenges in Computational Models (ICRTCCM)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICRTCCM.2017.24\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 Second International Conference on Recent Trends and Challenges in Computational Models (ICRTCCM)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICRTCCM.2017.24","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A Detailed Study on Security Services in Cloud Environment
Cloud computing is a powerful service that allows the cloud users to utilize the resources located in the cloud servers by pay-per-use or charge-per-use mode through the internet. The cloud users are enjoying the on-demand services provided by the cloud computing environment without maintaining the data in a local system. Even though the service is offered to cloud users in an efficient way, there are some serious security issues to be considered very much for maintaining and accessing the data in a secure way from the Cloud Service Provider (CSP). On the data placed in the cloud servers located in any part of the world, various security attacks might be performed by both the internal and external attackers to break the security services like confidentiality on data, user and server authentication, data integrity, and access control of data. This survey provides a detailed study of the recent security issues existing in the cloud environment. This study shows communication architecture of cloud computing and exhibits the security services data confidentiality, data integrity, user privacy, authentication and access control. There are five security services that need to be provided in the cloud network to make it a safe one in real time environment. This paper discusses about various existing works that are used to provide the five security services. For each security service, we have given a short description of the existing works and evaluated the efficiency of each existing works individually. Finally, based on the summary of the existing works, we have also proposed new solutions to mitigate the computation cost and to improve communication efficiency for providing the security services of the data stored in CSP.