Open Access Open Access  Restricted Access Subscription Access

A Study of Data Storage Security Issues in Cloud Computing


Affiliations
1 Department of Computer Science and Engineering, Noorul Islam University, Kumaracoil,Kanyakumari- 629180, Tamil Nadu, India
2 Department of Information Technology, Noorul Islam University, Kumaracoil, Kanyakumari- 629180, Tamil Nadu, India
 

Cloud Computing is defined as an environment in which users can share their resources with others in pay per use model. The resources are stored centrally and can access from anywhere. Despite these advantages, there still exist significant issues that need to be considered before shifting into cloud. Security stands as major obstacle in cloud computing. This paper gives an overview of the security issues on data storage along with its possible solutions. It also gives a brief description about the encryption techniques and auditing mechanisms.

Keywords

Confidentiality, Encryption, Integrity, Privacy, Security
User

Abstract Views: 169

PDF Views: 0




  • A Study of Data Storage Security Issues in Cloud Computing

Abstract Views: 169  |  PDF Views: 0

Authors

M. B. Jayalekshmi
Department of Computer Science and Engineering, Noorul Islam University, Kumaracoil,Kanyakumari- 629180, Tamil Nadu, India
S. H. Krishnaveni
Department of Information Technology, Noorul Islam University, Kumaracoil, Kanyakumari- 629180, Tamil Nadu, India

Abstract


Cloud Computing is defined as an environment in which users can share their resources with others in pay per use model. The resources are stored centrally and can access from anywhere. Despite these advantages, there still exist significant issues that need to be considered before shifting into cloud. Security stands as major obstacle in cloud computing. This paper gives an overview of the security issues on data storage along with its possible solutions. It also gives a brief description about the encryption techniques and auditing mechanisms.

Keywords


Confidentiality, Encryption, Integrity, Privacy, Security



DOI: https://doi.org/10.17485/ijst%2F2015%2Fv8i24%2F141622