State of the Art in Some Cloud Security Through Data Tracking

State of the Art in Some Cloud Security Through Data Tracking

Today cloud computing helps small businesses and users who miss them powerful resources, a shared information system or data security, etc.Let's introduce through this article: cloud service models, cloud deployment models and essential features, computer security in general. The different solutions proposed in the field of cloud security.We finish with a conclusion and our proposal in this domain to strengthen the security of this new paradigm.

___

  • Z. Al Haddad,M. Hanoune,A. Mamouni, Sécurité de cloud computing : approches et solutions,REINNOVA Vol1 N1, pp.67-71,Mars 2016.
  • Qu'est-ce que le cloud computing ,https://azure.microsoft.com/fr-fr/overview/what-is-cloud-computing/Last accessed17/12/2018.
  • P. Pankaj and C. Inderveer, "A Secure Data Transfer Technique for Cloud Computing," THAPAR UNIVERSITY,August 2014, 2014.
  • C. Rong, S. T. Nguyen, and M. G. Jaatun, "Beyond lightning: A survey on security challenges in cloud computing,"Comput. Electr. Eng., vol. 39, no. 1, pp. 47-54, Jan. 2013.
  • K. Arjun, G. L. Byung, L. HoonJae, and K. Anu, "Secure Storage and Access of Data in Cloud," International-Conference on ICT Convergence (ICTC), 15-Oct-2012.
  • S. Maninder and S. Sarbjeet, "Design and Implementation of Multi -tier Authentication Scheme in Cloud,"IJCSIInt. J. Comput. Sci., vol. 9, no. 2.
  • K. Satish and G. Anita, "Multi-Authentication for Cloud Security: A Framework," Int. J. Comput. Sci.Eng.Technol. IJCSET, vol. 5, no. 04, Apr. 2014
  • A. S.Ezhil, G. B, and A. S, "Privacy -Preserving Public Auditing In Cloud Using HMAC Algorithm," Int. J.RecentTechnol. Eng. IJRTE, vol. 2, Mar. 2013.
  • P. Kalpana and S. Singaraju, "Data security in cloud computing using RSA algorithm,"IJRCCT, vol. 1, no. 4,pp. 143-146, 2012.
  • U. Somani, K. Lakhani, and M. Mundra, "Implementing digital signature with RSA encryption algorithm toenhance the Data Security of cloud in Cloud Computing,"2010, pp. 211-216.
  • V. R. Balasaraswathi and S. Manikandan, "Enhanced security for multi-cloud storage using cryptographic datasplitting with dynamic approach," in Advanced CommunicationControl and Computing Technologies (ICACCCT),2014International Conference on, 2014, pp. 1190-1194.
  • X. Zhang, J. Schiffman, S. Gibbs, A. Kunjithapatham, and S. Jeong, "Securing elastic applications on mobiledevices for cloud computing," 2009, p. 127
  • D. A. B. Fernandes, L. F. B. Soares, J. V. Gomes, M. M. Freire, and P. R. M. Inácio, "Security issues in cloudenvironments: a survey," Int. J. Inf. Secur., vol. 13, no. 2, pp. 113-170, Apr. 2014.
  • M. Ali, S. U. Khan, and A. V. Vasilakos, "Security in cloud computing: Opportunities and challenges," Inf. Sci.,vol. 305, pp. 357-383, Jun. 2015.
  • B.-H. CARINE, "Cloud computing, la sécurité en question."
  • J. Guillaume, "securite-des-donnees-5-points-averifier- avant-de-signer-son-contrat-de-cloud-computing," Sep-2014.
  • S. Pascal, "Cloud Computing et Sécurité, Cycle de conférences sur cloud computing et virtualisation, Sécurité dela Virtualisation et du Cloud Computing," Paris, 2010.
  • K. Karkouda, N. Harbi, J. Darmont, and G. Gavin, "Confidentialité et disponibilité des données entreposées dansles nuages," in 9ème atelier Fouille de données complexes (EGCFDC2012), 2012.
  • E. M. Mohamed, H. S. Abdelkader, and S. El-Etriby, "Enhanced data security model for cloud computing," inInformatics and Systems (INFOS), 2012 8th InternationalConference on, 2012, pp. CC-12.
  • Institute of Electrical and Electronics Engineers, Ed., "Enhancing Data Security during Transit in Public Cloud,"Int.J. Eng. Innov. Technol. IJEIT, vol. 3, Jul. 2013.
  • D. Chen and H. Zhao, "Data Security and Privacy Protection Issues in Cloud Computing," 2012, pp. 647-651.
  • Balakrishnan.S, Saranya.G, Shobana.S, and Karthikeyan.S, "Introducing Effective Third Party Auditing (TPA)for Data Storage Security in Cloud," Int. J. Comput. SciEnce Technol., vol. 2, Jun. 2011.
  • F. Aloul, S. Zahidi, and W. El-Hajj, "Two factor authentication using mobile phones," in Computer SystemsandApplications, 2009. AICCSA 2009. IEEE/ACS InternationalConference on, 2009, pp. 641-644.
  • Data security in cloud computing - Part 3: Cloud data protection methods,:https://www.eetimes.com/documentLast accessed 28/12/2018.
  • K.Boisaubert,P.Gérard:Protection des données et cloud computing,pp.38-48, 2017-2018

___

Bibtex @araştırma makalesi { ijiam589727, journal = {International Journal of Informatics and Applied Mathematics}, eissn = {2667-6990}, address = {}, publisher = {International Society of Academicians}, year = {2019}, volume = {2}, number = {2}, pages = {15 - 27}, title = {State of the Art in Some Cloud Security Through Data Tracking}, key = {cite}, author = {Dey, Mébarka Aya and Lokbanı, Ahmed Chaouki and Hamou, Reda Mohamed and Boudıa, Mohamed Amine and Amıne, Abdelmalek} }
APA Dey, M. A. , Lokbanı, A. C. , Hamou, R. M. , Boudıa, M. A. & Amıne, A. (2019). State of the Art in Some Cloud Security Through Data Tracking . International Journal of Informatics and Applied Mathematics , 2 (2) , 15-27 .
MLA Dey, M. A. , Lokbanı, A. C. , Hamou, R. M. , Boudıa, M. A. , Amıne, A. "State of the Art in Some Cloud Security Through Data Tracking" . International Journal of Informatics and Applied Mathematics 2 (2019 ): 15-27 <
Chicago Dey, M. A. , Lokbanı, A. C. , Hamou, R. M. , Boudıa, M. A. , Amıne, A. "State of the Art in Some Cloud Security Through Data Tracking". International Journal of Informatics and Applied Mathematics 2 (2019 ): 15-27
RIS TY - JOUR T1 - State of the Art in Some Cloud Security Through Data Tracking AU - Mébarka AyaDey, Ahmed ChaoukiLokbanı, Reda MohamedHamou, Mohamed AmineBoudıa, AbdelmalekAmıne Y1 - 2019 PY - 2019 N1 - DO - T2 - International Journal of Informatics and Applied Mathematics JF - Journal JO - JOR SP - 15 EP - 27 VL - 2 IS - 2 SN - -2667-6990 M3 - UR - Y2 - 2019 ER -
EndNote %0 International Journal of Informatics and Applied Mathematics State of the Art in Some Cloud Security Through Data Tracking %A Mébarka Aya Dey , Ahmed Chaouki Lokbanı , Reda Mohamed Hamou , Mohamed Amine Boudıa , Abdelmalek Amıne %T State of the Art in Some Cloud Security Through Data Tracking %D 2019 %J International Journal of Informatics and Applied Mathematics %P -2667-6990 %V 2 %N 2 %R %U
ISNAD Dey, Mébarka Aya , Lokbanı, Ahmed Chaouki , Hamou, Reda Mohamed , Boudıa, Mohamed Amine , Amıne, Abdelmalek . "State of the Art in Some Cloud Security Through Data Tracking". International Journal of Informatics and Applied Mathematics 2 / 2 (Aralık 2019): 15-27 .
AMA Dey M. A. , Lokbanı A. C. , Hamou R. M. , Boudıa M. A. , Amıne A. State of the Art in Some Cloud Security Through Data Tracking. IJIAM. 2019; 2(2): 15-27.
Vancouver Dey M. A. , Lokbanı A. C. , Hamou R. M. , Boudıa M. A. , Amıne A. State of the Art in Some Cloud Security Through Data Tracking. International Journal of Informatics and Applied Mathematics. 2019; 2(2): 15-27.
IEEE M. A. Dey , A. C. Lokbanı , R. M. Hamou , M. A. Boudıa ve A. Amıne , "State of the Art in Some Cloud Security Through Data Tracking", , c. 2, sayı. 2, ss. 15-27, Ara. 2019