Cloud Computing Security and Privacy Issues: Comparative Study

  IJCTT-book-cover
 
International Journal of Computer Trends and Technology (IJCTT)          
 
© 2018 by IJCTT Journal
Volume-61 Number-1
Year of Publication : 2018
Authors : Y. M. Wazery, A. H. Fawzy, H. Meldeen
DOI :  10.14445/22312803/IJCTT-V61P110

MLA

MLA Style: Y. M. Wazery, A. H. Fawzy, H. Meldeen "Cloud Computing Security and Privacy Issues: Comparative Study" International Journal of Computer Trends and Technology 61.1 (2018): 53-57.

APA Style:Y. M. Wazery, A. H. Fawzy, H. Meldeen (2018). Cloud Computing Security and Privacy Issues: Comparative Study. International Journal of Computer Trends and Technology, 61(1), 53-57.

Abstract
Cloud computing is an important technology that transform centralized resources to shared resources ,it is a collection of IT resources including hardware and software serving multiple consumer which becomes essential process to organizations , business and operations , so cloud computing added many features such as the elimination of expenses associated with IT infrastructure management, space and energy. Cloud computing enables access to resources from any end device anywhere via the internet, it also provides high storage and computing services and facilitates innovation, this paper discuss security issues and different challenges that faced cloud computing such as privacy preserving issues and their solutions.

Reference
[1] “Privacy Preserving Issues and their Solutions in Cloud Computing: Survey”MTech(CSE), BMSCE, Bangalore, India. And Prof. Dept. of CSE, BMSCE, Bangalore, India
[2] “A Survey of Security and Privacy Challenges in Cloud Computing: Solutions and Future Directions” Yuhong Liu et al.
[3] ”Security and Privacy in Cloud Computing: A Survey”Naixue Xiong is the corresponding author.
[4] “Security, privacy and trust in cloud computing: A comparative study”Meryeme Alouane and Hanan El Bakkali.
[5] “Cloud Storage Privacy and Security User Awareness: A Comparative Analysis between Dutch and Macedonian Users”. Adriana Mijuskovic, South East European University,Tetovo, Macedonia Mexhid Ferati, Oslo and Akershus University College of Applied Sciences, Oslo,Norway.
[6] “Data security and privacy in E-health Cloud: Comparative study”.
[7] Hanafy, I.M., Salama, A.A., Abdelfattah, M. and Wazery, Y., 2012. Security in Mant based on Pki using fuzzy function. IOSR Journal of Computer Engineering, 6(3), pp.54-60.
[8] Hanafy, I.M., Salama, A.A., Abdelfattah, M. and Wazery, Y.M., 2013. AIS Model For Botnet Detection In MANET Using Fuzzy Function. International Journal of Computer Networking, Wireless and Mobile Communications (IJCNWMC), 3(1), pp.95-102.
[9] Houssein, E.H. and Wazery, Y.M., Vortex Search Topology Control Algorithm for Wireless Sensor Networks.
[10] Y.M.Wazery Survey on Wireless Sensor Network Current Security issues, international journal for research & development in technology, Volume-6,Issue-5(Dec-16)

Keywords
cloud computing, cloud computing service models, security issues and privacy issues