Abstract
Cloud computing is a powerful service that allows the cloud users to utilize the resources located in the cloud servers by pay-per-use or charge-per-use mode through the internet. The cloud users are enjoying the on-demand services provided by the cloud computing environment without maintaining the data in a local system. Even though the service is offered to cloud users in an efficient way, there are some serious security issues to be considered very much for maintaining and accessing the data in a secure way from the Cloud Service Provider (CSP). On the data placed in the cloud servers located in any part of the world, various security attacks might be performed by both the internal and external attackers to break the security services like confidentiality on data, user and server authentication, data integrity, and access control of data. This survey provides a detailed study of the recent security issues existing in the cloud environment. This study shows communication architecture of cloud computing and exhibits the security services data confidentiality, data integrity, user privacy, authentication and access control. There are five security services that need to be provided in the cloud network to make it a safe one in real time environment. This paper discusses about various existing works that are used to provide the five security services. For each security service, we have given a short description of the existing works and evaluated the efficiency of each existing works individually. Finally, based on the summary of the existing works, we have also proposed new solutions to mitigate the computation cost and to improve communication efficiency for providing the security services of the data stored in CSP.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.