State of the Art in Some Cloud Security Through Data Tracking

State of the Art in Some Cloud Security Through Data Tracking

Today cloud computing helps small businesses and users who miss them powerful resources, a shared information system or data security, etc.Let's introduce through this article: cloud service models, cloud deployment models and essential features, computer security in general. The different solutions proposed in the field of cloud security.We finish with a conclusion and our proposal in this domain to strengthen the security of this new paradigm.

___

  • Z. Al Haddad,M. Hanoune,A. Mamouni, Sécurité de cloud computing : approches et solutions,REINNOVA Vol1 N1, pp.67-71,Mars 2016.
  • Qu'est-ce que le cloud computing ,https://azure.microsoft.com/fr-fr/overview/what-is-cloud-computing/Last accessed17/12/2018.
  • P. Pankaj and C. Inderveer, "A Secure Data Transfer Technique for Cloud Computing," THAPAR UNIVERSITY,August 2014, 2014.
  • C. Rong, S. T. Nguyen, and M. G. Jaatun, "Beyond lightning: A survey on security challenges in cloud computing,"Comput. Electr. Eng., vol. 39, no. 1, pp. 47-54, Jan. 2013.
  • K. Arjun, G. L. Byung, L. HoonJae, and K. Anu, "Secure Storage and Access of Data in Cloud," International-Conference on ICT Convergence (ICTC), 15-Oct-2012.
  • S. Maninder and S. Sarbjeet, "Design and Implementation of Multi -tier Authentication Scheme in Cloud,"IJCSIInt. J. Comput. Sci., vol. 9, no. 2.
  • K. Satish and G. Anita, "Multi-Authentication for Cloud Security: A Framework," Int. J. Comput. Sci.Eng.Technol. IJCSET, vol. 5, no. 04, Apr. 2014
  • A. S.Ezhil, G. B, and A. S, "Privacy -Preserving Public Auditing In Cloud Using HMAC Algorithm," Int. J.RecentTechnol. Eng. IJRTE, vol. 2, Mar. 2013.
  • P. Kalpana and S. Singaraju, "Data security in cloud computing using RSA algorithm,"IJRCCT, vol. 1, no. 4,pp. 143-146, 2012.
  • U. Somani, K. Lakhani, and M. Mundra, "Implementing digital signature with RSA encryption algorithm toenhance the Data Security of cloud in Cloud Computing,"2010, pp. 211-216.
  • V. R. Balasaraswathi and S. Manikandan, "Enhanced security for multi-cloud storage using cryptographic datasplitting with dynamic approach," in Advanced CommunicationControl and Computing Technologies (ICACCCT),2014International Conference on, 2014, pp. 1190-1194.
  • X. Zhang, J. Schiffman, S. Gibbs, A. Kunjithapatham, and S. Jeong, "Securing elastic applications on mobiledevices for cloud computing," 2009, p. 127
  • D. A. B. Fernandes, L. F. B. Soares, J. V. Gomes, M. M. Freire, and P. R. M. Inácio, "Security issues in cloudenvironments: a survey," Int. J. Inf. Secur., vol. 13, no. 2, pp. 113-170, Apr. 2014.
  • M. Ali, S. U. Khan, and A. V. Vasilakos, "Security in cloud computing: Opportunities and challenges," Inf. Sci.,vol. 305, pp. 357-383, Jun. 2015.
  • B.-H. CARINE, "Cloud computing, la sécurité en question."
  • J. Guillaume, "securite-des-donnees-5-points-averifier- avant-de-signer-son-contrat-de-cloud-computing," Sep-2014.
  • S. Pascal, "Cloud Computing et Sécurité, Cycle de conférences sur cloud computing et virtualisation, Sécurité dela Virtualisation et du Cloud Computing," Paris, 2010.
  • K. Karkouda, N. Harbi, J. Darmont, and G. Gavin, "Confidentialité et disponibilité des données entreposées dansles nuages," in 9ème atelier Fouille de données complexes (EGCFDC2012), 2012.
  • E. M. Mohamed, H. S. Abdelkader, and S. El-Etriby, "Enhanced data security model for cloud computing," inInformatics and Systems (INFOS), 2012 8th InternationalConference on, 2012, pp. CC-12.
  • Institute of Electrical and Electronics Engineers, Ed., "Enhancing Data Security during Transit in Public Cloud,"Int.J. Eng. Innov. Technol. IJEIT, vol. 3, Jul. 2013.
  • D. Chen and H. Zhao, "Data Security and Privacy Protection Issues in Cloud Computing," 2012, pp. 647-651.
  • Balakrishnan.S, Saranya.G, Shobana.S, and Karthikeyan.S, "Introducing Effective Third Party Auditing (TPA)for Data Storage Security in Cloud," Int. J. Comput. SciEnce Technol., vol. 2, Jun. 2011.
  • F. Aloul, S. Zahidi, and W. El-Hajj, "Two factor authentication using mobile phones," in Computer SystemsandApplications, 2009. AICCSA 2009. IEEE/ACS InternationalConference on, 2009, pp. 641-644.
  • Data security in cloud computing - Part 3: Cloud data protection methods,:https://www.eetimes.com/documentLast accessed 28/12/2018.
  • K.Boisaubert,P.Gérard:Protection des données et cloud computing,pp.38-48, 2017-2018