Archives


Rate this Article: (0) Votes

Review Article

Year : 2015 | Volume: 1 | Issue: 2 | Pages: 12-23

Cloud Computing: Characteristics, Issues and Possible Security Solutions -A Review

M Julie Emerald Jiju1*, E Arun2

http://dx.doi.org/doi:10.18831/djece.org/12015021002

Corresponding author

M Julie Emerald Jiju*

Assistant Professor, Department of MCA, CSI Institute of Technology, Thovalai, Kanyakumari, Tamil Nadu, India.

  • 1. Assistant Professor, Department of MCA, CSI Institute of Technology, Thovalai, Kanyakumari, Tamil Nadu, India.

Received on: 2015/10/07

Revised on: 2015/11/05

Accepted on: 2015/11/25

Published on: 2015/11/28

  • Cloud Computing: Characteristics, Issues and Possible Security Solutions -A Review, M Julie Emerald Jiju, E Arun 2015/11/28, DJ Journal of Advances in Electronics and Communication Engineering, 1(2), 12-23, http://dx.doi.org/10.18831/djece.org/12015021002.

    Published on: 2015/11/28

Abstract

Cloud computing is one of the research areas where a large amount of studies and investigations are going on. With the advent of technology the security concerns and issues related to cloud computing are on the rise and thus they require a serious attention. In this article we have attempted a review of the cloud computing scenario; their characteristics, issues and possible solutions. The types of cloud computing can be classified as public, private and hybrid cloud computing. The services and characteristics of cloud computing are presented with a special mention to resource pooling, flexibility, accessibility, measurability and on demand cell service. The issues in cloud computing are provided with emphasis on storage security and distributed denial of service. Three methods viz data classification, layered frame work and Attribute Based Encryption (ABE) have been presented as the viable methods for improved security in cloud computing. Next the usage of cloud computing in malware detection is outlined. Finally general measures for improving security in cloud computing is discussed.

Keywords

Resource Pooling, Storage Security, Data classification, Layered frame work, Attribute based encryption.