A review of security models in cloud computing and an Innovative approach
||International Journal of Computer Trends and Technology (IJCTT)||
|© 2015 by IJCTT Journal|
|Year of Publication : 2015|
|Authors : Dr. Amit Chaturvedi, Sajad Ahmad Zarger|
|DOI : 10.14445/22312803/IJCTT-V30P115|
Dr. Amit Chaturvedi, Sajad Ahmad Zarger "A review of security models in cloud computing and an Innovative approach". International Journal of Computer Trends and Technology (IJCTT) V30(2):87-92, December 2015. ISSN:2231-2803. www.ijcttjournal.org. Published by Seventh Sense Research Group.
Cloud computing is introducing many huge changes to world of computing and working pattern recently for its multitudinous benefits. However, the security of cloud computing is always the focus of numerous potential cloud customers, and a big barrier for its widespread applications. Actually data security is the main concern. Because of diversity in service models proposed for cloud computing, providing acceptable level of security is main concern. In this paper, we have surveyed several security models and proposed a data security model for cloud computing based on separation of security in different category layers. The proposed model certifies that our method can improve security levels in service oriented systems, especially in cloud computing applications.
 Takabi H, Joshi J B D, Ahn G. Security a nd privacy challenges in cloud computing environments. IEEE Security & Privacy;2010;
 Monjur Ahmed1 and Mohammad Ashraf HossainCloud computing and security issues in cloud computing in 2014International Journal of Network Security & Its Applications (IJNSA) 2014
 Top threats to cloud computing prepared by security alliance 2010 http://www. cloudsecurityalliance.org/ topthreats
 Agarwal, A. and Agarwal, A. . The Security Risks Associated with Cloud Computing, International Journal of Computer Applications in Engineering Sciences,2011
 VMware. Inc. Understanding full virtualization, Para virtualization and hardware assist. Technical report, VMware, 2007.www.elsevier.com
 Patrick Nicolas, ”Multi tenant deployment model for SaaS”, White paper , 2006.
 Yichuan Zhang, Bin Zhang, Ying Liu, “A Method of SaaS Multi-Tenant Model Recommendation Based on Graph Matching”.
 S. Subashini n, V.Kavitha A survey on security issues in service delivery models of cloud computing 2010 Journal of Network and Computer Applications
 . Jansen W, GranceT Guidelines on Security and privacy in public Cloud Computing. NIST, Special Publication 800– 144, Gaithersburg, MD 2011
 Varia, J., Mathew, S..Overview of amazon web services. http://aws.amazon.com/ whitepapers; 2013
Agarwal, A. and Agarwal, A. (2011). The Security Risks Associated with Cloud Computing, International Journal of Computer Applications in Engineering Sciences, 1 (Special Issue on CNS),
 jerichoforum Cloud cube model v.1 2009 http://www.opengroup.org/jericho/publications.htm, ww.jerichoforum.org
 Security guidance for critical areas of focus in cloud computing v2.1 by cloud security alliance 2009
 Heiser J. What you need to know about cloud computing security and compliance, Gartner, Research, ID Number:G00168345, 2009.
 JianhuaChea*, YaminDuanb, Tao Zhanga, JieFanaStudy on security models and strategies of cloud computing 2011 www.elesevier.com
 Wayne J. Brown, Vince Anderson, Qing Tan “Multitenancy - Security Risks and Countermeasures”, 2012 15th International Conference on Network-Based Information Systems, IEEE
Data security, Cloud computing, cloud service, cloud security, SSL, TSL, security model..