In this work, we conduct an in-depth survey on cloud computing technologies, data storage and information security problems. After an overview of the cloud storage system and threats to them, we focus on four hot data protection topics. They are data integrity, data confidentiality, access control and data manipulation in the secure domain. Also, we describe main threats by services SaaS, PaaS and IaaS in the cloud computing systems.
Published in | Journal of Electrical and Electronic Engineering (Volume 4, Issue 6) |
DOI | 10.11648/j.jeee.20160406.11 |
Page(s) | 145-149 |
Creative Commons |
This is an Open Access article, distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution and reproduction in any medium or format, provided the original work is properly cited. |
Copyright |
Copyright © The Author(s), 2016. Published by Science Publishing Group |
IaaS, PaaS, SaaS, SOAP, REST, Private, Public, Hybrid
[1] | Hassan, Qusay. “Demystifying Cloud Computing”. The Journal of Defense Software Engineering. CrossTalk. 2011 (Jan/Feb): 16–21. Retrieved 11 December 2014. |
[2] | Vigya Dubey, Pranjal Agrawal. “Cloud Computing and Data Management”, Symposium on Colossal Data Analysis and Networking (CDAN). 2016. |
[3] | W. Zeng, Y. Zhao, K. Ou, and W. Song, “Research on cloud storage architecture and key technologies" in Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, Culture and Human, Seoul, Korea, 2009, pp. 1044-1048. |
[4] | Chun-Ting Huang, Zhongyuan Qin, Jay Kuo. “Multimedia Storage Security in Cloud Computing: An Overview”. MMSP 2011. IEEE. 2011. |
[5] | Saakshi Narula, Arushi Jain, Ms. Prachi. “Cloud computing security: amazon web service”. 2015 Fifth International Conference on Advanced Computing & Communication Technologies. |
[6] | Akanksha Singh, Smita Sharma, Shipra Ravi Kumar, Suman Avdesh Yadav. “Overview of PaaS and SaaS and its Application in Cloud Computing”. 2016 1st International Conference on Innovation and Challenges in Cyber Security (ICICCS 2016). |
[7] | M. Armbrust, A. Fox, R. Griffith, A. D. Joseph, R. H. Katz, A. Konwinski, G. Lee, D. A. Patterson, A. Rabkin, I. Stoica, and M. Zaharia, “Above the clouds: a Berkeley view of cloud computing” Univ. of California, Berkeley, CA Technical Report No. UCB/EECS-2009-28, 2009. |
[8] | Boritz, J. “IS Practitioners' Views on Core Concepts of Information Integrity”. International Journal of Accounting Information Systems. Elsevier. Retrieved 12 August 2011. |
[9] | A. Yun, C. Shi, and Y. Kim, “On protecting integrity and confidentiality of cryptographic file system for outsourced storage” in Proceedings of the ACM workshop on Cloud computing security, Chicago, Illinois, USA, 2009, pp. 67-76. |
[10] | “Micro Strategy’s office of the future includes mobile identity and cyber security”. Washington Post. 2014-04-14. Retrieved 2014-03-30. |
APA Style
Tashev Komil Akhmatovich, Islomov Shahboz Zokir Ugli, Zokirov Odiljon. (2016). Analyze Threats in Cloud Computing. Journal of Electrical and Electronic Engineering, 4(6), 145-149. https://doi.org/10.11648/j.jeee.20160406.11
ACS Style
Tashev Komil Akhmatovich; Islomov Shahboz Zokir Ugli; Zokirov Odiljon. Analyze Threats in Cloud Computing. J. Electr. Electron. Eng. 2016, 4(6), 145-149. doi: 10.11648/j.jeee.20160406.11
@article{10.11648/j.jeee.20160406.11, author = {Tashev Komil Akhmatovich and Islomov Shahboz Zokir Ugli and Zokirov Odiljon}, title = {Analyze Threats in Cloud Computing}, journal = {Journal of Electrical and Electronic Engineering}, volume = {4}, number = {6}, pages = {145-149}, doi = {10.11648/j.jeee.20160406.11}, url = {https://doi.org/10.11648/j.jeee.20160406.11}, eprint = {https://article.sciencepublishinggroup.com/pdf/10.11648.j.jeee.20160406.11}, abstract = {In this work, we conduct an in-depth survey on cloud computing technologies, data storage and information security problems. After an overview of the cloud storage system and threats to them, we focus on four hot data protection topics. They are data integrity, data confidentiality, access control and data manipulation in the secure domain. Also, we describe main threats by services SaaS, PaaS and IaaS in the cloud computing systems.}, year = {2016} }
TY - JOUR T1 - Analyze Threats in Cloud Computing AU - Tashev Komil Akhmatovich AU - Islomov Shahboz Zokir Ugli AU - Zokirov Odiljon Y1 - 2016/12/21 PY - 2016 N1 - https://doi.org/10.11648/j.jeee.20160406.11 DO - 10.11648/j.jeee.20160406.11 T2 - Journal of Electrical and Electronic Engineering JF - Journal of Electrical and Electronic Engineering JO - Journal of Electrical and Electronic Engineering SP - 145 EP - 149 PB - Science Publishing Group SN - 2329-1605 UR - https://doi.org/10.11648/j.jeee.20160406.11 AB - In this work, we conduct an in-depth survey on cloud computing technologies, data storage and information security problems. After an overview of the cloud storage system and threats to them, we focus on four hot data protection topics. They are data integrity, data confidentiality, access control and data manipulation in the secure domain. Also, we describe main threats by services SaaS, PaaS and IaaS in the cloud computing systems. VL - 4 IS - 6 ER -