Cloud Security Requirements

Poonam Rawat*, Neha Rawat**, Shikha singh***, Awantika****
*-**** Students, Govind Ballabh Pant University of Agriculture and Technology, Pantnagar.
Periodicity:November - January'2014
DOI : https://doi.org/10.26634/jcc.1.1.2797

Abstract

Cloud computing brings new opportunity and challenges for IT industry. Basically, Cloud computing provides you to access your information from anywhere at any time. So, Cloud computing security is a major concern for cloud service providers, developers and also for users who are using this technology everyday. And ensuring cloud security has become a burning topic in IT industry and research era. The goal of this paper is to provide all the cloud security requirements which should be properly understood for giving cloud its full potential. Taking those requirements, cloud service providers will be able to deliver an efficient and secure service on cloud to individual customers and enterprise. This will encourage the adoption of cloud computing not only on small enterprises, but all over the world on large scales also.

Keywords

Cloud computing, security requirements.

How to Cite this Article?

Rawat, P., Rawat ,N., Singh, S., and Awantika (2014). Cloud Security Requirements. i-manager’s Journal on Cloud Computing, 1(1), 1-5. https://doi.org/10.26634/jcc.1.1.2797

References

[1]. Dimitrios Zissis, Dimitrios Lekkas (2012). “Addressing cloud computing security issues”, Future Generation Computer Systems. pp.28 583–592.
[2]. S. Subashini and V. Kavitha (2011). “A survey on security issues in service delivery models of cloud computing”, Journal of Network and Computer Applications. pp.34, 1–11.
[3]. Su Qinggang, Wang Fu and Hang Qiangwei (2012). “Study of Cloud Computing Security Service Model”, IEEE 978-1-4577-1964-6/12,
[4]. Mutum Zico Meetei and Anita Goel (2012). “Security Issues in Cloud Computing”, 5th International Conference on BioMedical Engineering and Informatics. BMEI .
[5]. Patrick Höner (2013). ”Cloud Computing Security Requirements and Solutions: a Systematic Literature Review”,19thTwente Student Conference on IT, June 24th.
[6]. Ramgovind S, Eloff MM, Smith E (2010). ”The Management of Security in Cloud Computing”, IEEE. pp.978-1-4244-5495-2/10 .
[7]. Peter Mell, and Tim Grance (2010). “The NIST Definition of Cloud Computing , "Retrieve from http://www.wheresmyserver.co.nz/storage/media/faqfiles/ clouddef-v15.pdf, Accessed April .
[8]. Cloud Security Alliance (2009). “Security guidance for critical areas of focus in cloud computing” ,V2.1.
[9]. Michel Miller. “Cloud computing web-based applications that change the way you work and collaborate online”, Indianapolis, Indiana
[10]. A. Priyadharshini (2013). “A Survey on security issues and countermeasures in cloud computing storage and a tour towards multi-cloud”. International Journal of Research in Engineering and Technology (IJRET). Vol. 1, Issue 2, July . 4
If you have access to this article please login to view the article or kindly login to purchase the article

Purchase Instant Access

Single Article

North Americas,UK,
Middle East,Europe
India Rest of world
USD EUR INR USD-ROW
Pdf 35 35 200 20
Online 35 35 200 15
Pdf & Online 35 35 400 25

Options for accessing this content:
  • If you would like institutional access to this content, please recommend the title to your librarian.
    Library Recommendation Form
  • If you already have i-manager's user account: Login above and proceed to purchase the article.
  • New Users: Please register, then proceed to purchase the article.