{"title":"A review on contemporary security issues of cloud computing","authors":"Tejashri A. Patil, S. Pandey, A. T. Bhole","doi":"10.1109/ICISIM.2017.8122170","DOIUrl":null,"url":null,"abstract":"In cloud computing environment various forms of services allows users to store the information at remote location. But, there are many drawbacks as well because of the remote storage. However, it is plagued by security issues despite its numerous advantages. The paper presents a review of the current security issues in cloud computing environment like lack of control of data, lack of trust and multi-tenancy. Ensuring cloud data integrity is to be the big issue. To overcome unauthorized access of data users by Cloud Service Provider, integrity verification is done through Trusted Third Party Auditor. The proposed algorithm handles encrypted data and performs auditing without decrypting data. The algorithm performs auditing over encrypted data. As data is not decrypted by auditors during auditing process, proposed algorithm becomes more secure than existing algorithm. Third party auditing process removes auditing overhead of data owner.","PeriodicalId":139000,"journal":{"name":"2017 1st International Conference on Intelligent Systems and Information Management (ICISIM)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 1st International Conference on Intelligent Systems and Information Management (ICISIM)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICISIM.2017.8122170","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 5
Abstract
In cloud computing environment various forms of services allows users to store the information at remote location. But, there are many drawbacks as well because of the remote storage. However, it is plagued by security issues despite its numerous advantages. The paper presents a review of the current security issues in cloud computing environment like lack of control of data, lack of trust and multi-tenancy. Ensuring cloud data integrity is to be the big issue. To overcome unauthorized access of data users by Cloud Service Provider, integrity verification is done through Trusted Third Party Auditor. The proposed algorithm handles encrypted data and performs auditing without decrypting data. The algorithm performs auditing over encrypted data. As data is not decrypted by auditors during auditing process, proposed algorithm becomes more secure than existing algorithm. Third party auditing process removes auditing overhead of data owner.