Research Article
BibTex RIS Cite
Year 2019, Volume: 2 Issue: 2, 15 - 27, 30.12.2019

Abstract

References

  • Z. Al Haddad,M. Hanoune,A. Mamouni, Sécurité de cloud computing : approches et solutions,REINNOVA Vol1 N1, pp.67-71,Mars 2016.
  • Qu'est-ce que le cloud computing ,https://azure.microsoft.com/fr-fr/overview/what-is-cloud-computing/Last accessed17/12/2018.
  • P. Pankaj and C. Inderveer, "A Secure Data Transfer Technique for Cloud Computing," THAPAR UNIVERSITY,August 2014, 2014.
  • C. Rong, S. T. Nguyen, and M. G. Jaatun, "Beyond lightning: A survey on security challenges in cloud computing,"Comput. Electr. Eng., vol. 39, no. 1, pp. 47-54, Jan. 2013.
  • K. Arjun, G. L. Byung, L. HoonJae, and K. Anu, "Secure Storage and Access of Data in Cloud," International-Conference on ICT Convergence (ICTC), 15-Oct-2012.
  • S. Maninder and S. Sarbjeet, "Design and Implementation of Multi -tier Authentication Scheme in Cloud,"IJCSIInt. J. Comput. Sci., vol. 9, no. 2.
  • K. Satish and G. Anita, "Multi-Authentication for Cloud Security: A Framework," Int. J. Comput. Sci.Eng.Technol. IJCSET, vol. 5, no. 04, Apr. 2014
  • A. S.Ezhil, G. B, and A. S, "Privacy -Preserving Public Auditing In Cloud Using HMAC Algorithm," Int. J.RecentTechnol. Eng. IJRTE, vol. 2, Mar. 2013.
  • P. Kalpana and S. Singaraju, "Data security in cloud computing using RSA algorithm,"IJRCCT, vol. 1, no. 4,pp. 143-146, 2012.
  • U. Somani, K. Lakhani, and M. Mundra, "Implementing digital signature with RSA encryption algorithm toenhance the Data Security of cloud in Cloud Computing,"2010, pp. 211-216.
  • V. R. Balasaraswathi and S. Manikandan, "Enhanced security for multi-cloud storage using cryptographic datasplitting with dynamic approach," in Advanced CommunicationControl and Computing Technologies (ICACCCT),2014International Conference on, 2014, pp. 1190-1194.
  • X. Zhang, J. Schiffman, S. Gibbs, A. Kunjithapatham, and S. Jeong, "Securing elastic applications on mobiledevices for cloud computing," 2009, p. 127
  • D. A. B. Fernandes, L. F. B. Soares, J. V. Gomes, M. M. Freire, and P. R. M. Inácio, "Security issues in cloudenvironments: a survey," Int. J. Inf. Secur., vol. 13, no. 2, pp. 113-170, Apr. 2014.
  • M. Ali, S. U. Khan, and A. V. Vasilakos, "Security in cloud computing: Opportunities and challenges," Inf. Sci.,vol. 305, pp. 357-383, Jun. 2015.
  • B.-H. CARINE, "Cloud computing, la sécurité en question."
  • J. Guillaume, "securite-des-donnees-5-points-averifier- avant-de-signer-son-contrat-de-cloud-computing," Sep-2014.
  • S. Pascal, "Cloud Computing et Sécurité, Cycle de conférences sur cloud computing et virtualisation, Sécurité dela Virtualisation et du Cloud Computing," Paris, 2010.
  • K. Karkouda, N. Harbi, J. Darmont, and G. Gavin, "Confidentialité et disponibilité des données entreposées dansles nuages," in 9ème atelier Fouille de données complexes (EGCFDC2012), 2012.
  • E. M. Mohamed, H. S. Abdelkader, and S. El-Etriby, "Enhanced data security model for cloud computing," inInformatics and Systems (INFOS), 2012 8th InternationalConference on, 2012, pp. CC-12.
  • Institute of Electrical and Electronics Engineers, Ed., "Enhancing Data Security during Transit in Public Cloud,"Int.J. Eng. Innov. Technol. IJEIT, vol. 3, Jul. 2013.
  • D. Chen and H. Zhao, "Data Security and Privacy Protection Issues in Cloud Computing," 2012, pp. 647-651.
  • Balakrishnan.S, Saranya.G, Shobana.S, and Karthikeyan.S, "Introducing Effective Third Party Auditing (TPA)for Data Storage Security in Cloud," Int. J. Comput. SciEnce Technol., vol. 2, Jun. 2011.
  • F. Aloul, S. Zahidi, and W. El-Hajj, "Two factor authentication using mobile phones," in Computer SystemsandApplications, 2009. AICCSA 2009. IEEE/ACS InternationalConference on, 2009, pp. 641-644.
  • Data security in cloud computing - Part 3: Cloud data protection methods,:https://www.eetimes.com/documentLast accessed 28/12/2018.
  • K.Boisaubert,P.Gérard:Protection des données et cloud computing,pp.38-48, 2017-2018

State of the Art in Some Cloud Security Through Data Tracking

Year 2019, Volume: 2 Issue: 2, 15 - 27, 30.12.2019

Abstract

Today cloud computing helps small businesses and users who miss them powerful resources, a shared information system or data security, etc.Let's introduce through this article: cloud service models, cloud deployment models and essential features, computer security in general. The different solutions proposed in the field of cloud security.We finish with a conclusion and our proposal in this domain to strengthen the security of this new paradigm.

References

  • Z. Al Haddad,M. Hanoune,A. Mamouni, Sécurité de cloud computing : approches et solutions,REINNOVA Vol1 N1, pp.67-71,Mars 2016.
  • Qu'est-ce que le cloud computing ,https://azure.microsoft.com/fr-fr/overview/what-is-cloud-computing/Last accessed17/12/2018.
  • P. Pankaj and C. Inderveer, "A Secure Data Transfer Technique for Cloud Computing," THAPAR UNIVERSITY,August 2014, 2014.
  • C. Rong, S. T. Nguyen, and M. G. Jaatun, "Beyond lightning: A survey on security challenges in cloud computing,"Comput. Electr. Eng., vol. 39, no. 1, pp. 47-54, Jan. 2013.
  • K. Arjun, G. L. Byung, L. HoonJae, and K. Anu, "Secure Storage and Access of Data in Cloud," International-Conference on ICT Convergence (ICTC), 15-Oct-2012.
  • S. Maninder and S. Sarbjeet, "Design and Implementation of Multi -tier Authentication Scheme in Cloud,"IJCSIInt. J. Comput. Sci., vol. 9, no. 2.
  • K. Satish and G. Anita, "Multi-Authentication for Cloud Security: A Framework," Int. J. Comput. Sci.Eng.Technol. IJCSET, vol. 5, no. 04, Apr. 2014
  • A. S.Ezhil, G. B, and A. S, "Privacy -Preserving Public Auditing In Cloud Using HMAC Algorithm," Int. J.RecentTechnol. Eng. IJRTE, vol. 2, Mar. 2013.
  • P. Kalpana and S. Singaraju, "Data security in cloud computing using RSA algorithm,"IJRCCT, vol. 1, no. 4,pp. 143-146, 2012.
  • U. Somani, K. Lakhani, and M. Mundra, "Implementing digital signature with RSA encryption algorithm toenhance the Data Security of cloud in Cloud Computing,"2010, pp. 211-216.
  • V. R. Balasaraswathi and S. Manikandan, "Enhanced security for multi-cloud storage using cryptographic datasplitting with dynamic approach," in Advanced CommunicationControl and Computing Technologies (ICACCCT),2014International Conference on, 2014, pp. 1190-1194.
  • X. Zhang, J. Schiffman, S. Gibbs, A. Kunjithapatham, and S. Jeong, "Securing elastic applications on mobiledevices for cloud computing," 2009, p. 127
  • D. A. B. Fernandes, L. F. B. Soares, J. V. Gomes, M. M. Freire, and P. R. M. Inácio, "Security issues in cloudenvironments: a survey," Int. J. Inf. Secur., vol. 13, no. 2, pp. 113-170, Apr. 2014.
  • M. Ali, S. U. Khan, and A. V. Vasilakos, "Security in cloud computing: Opportunities and challenges," Inf. Sci.,vol. 305, pp. 357-383, Jun. 2015.
  • B.-H. CARINE, "Cloud computing, la sécurité en question."
  • J. Guillaume, "securite-des-donnees-5-points-averifier- avant-de-signer-son-contrat-de-cloud-computing," Sep-2014.
  • S. Pascal, "Cloud Computing et Sécurité, Cycle de conférences sur cloud computing et virtualisation, Sécurité dela Virtualisation et du Cloud Computing," Paris, 2010.
  • K. Karkouda, N. Harbi, J. Darmont, and G. Gavin, "Confidentialité et disponibilité des données entreposées dansles nuages," in 9ème atelier Fouille de données complexes (EGCFDC2012), 2012.
  • E. M. Mohamed, H. S. Abdelkader, and S. El-Etriby, "Enhanced data security model for cloud computing," inInformatics and Systems (INFOS), 2012 8th InternationalConference on, 2012, pp. CC-12.
  • Institute of Electrical and Electronics Engineers, Ed., "Enhancing Data Security during Transit in Public Cloud,"Int.J. Eng. Innov. Technol. IJEIT, vol. 3, Jul. 2013.
  • D. Chen and H. Zhao, "Data Security and Privacy Protection Issues in Cloud Computing," 2012, pp. 647-651.
  • Balakrishnan.S, Saranya.G, Shobana.S, and Karthikeyan.S, "Introducing Effective Third Party Auditing (TPA)for Data Storage Security in Cloud," Int. J. Comput. SciEnce Technol., vol. 2, Jun. 2011.
  • F. Aloul, S. Zahidi, and W. El-Hajj, "Two factor authentication using mobile phones," in Computer SystemsandApplications, 2009. AICCSA 2009. IEEE/ACS InternationalConference on, 2009, pp. 641-644.
  • Data security in cloud computing - Part 3: Cloud data protection methods,:https://www.eetimes.com/documentLast accessed 28/12/2018.
  • K.Boisaubert,P.Gérard:Protection des données et cloud computing,pp.38-48, 2017-2018
There are 25 citations in total.

Details

Primary Language English
Subjects Software Engineering (Other)
Journal Section Articles
Authors

Mébarka Aya Dey 0000-0003-4723-6363

Ahmed Chaouki Lokbanı This is me

Reda Mohamed Hamou This is me

Mohamed Amine Boudıa This is me

Abdelmalek Amıne This is me

Publication Date December 30, 2019
Acceptance Date December 30, 2019
Published in Issue Year 2019 Volume: 2 Issue: 2

Cite

APA Dey, M. A., Lokbanı, A. C., Hamou, R. M., Boudıa, M. A., et al. (2019). State of the Art in Some Cloud Security Through Data Tracking. International Journal of Informatics and Applied Mathematics, 2(2), 15-27.
AMA Dey MA, Lokbanı AC, Hamou RM, Boudıa MA, Amıne A. State of the Art in Some Cloud Security Through Data Tracking. IJIAM. December 2019;2(2):15-27.
Chicago Dey, Mébarka Aya, Ahmed Chaouki Lokbanı, Reda Mohamed Hamou, Mohamed Amine Boudıa, and Abdelmalek Amıne. “State of the Art in Some Cloud Security Through Data Tracking”. International Journal of Informatics and Applied Mathematics 2, no. 2 (December 2019): 15-27.
EndNote Dey MA, Lokbanı AC, Hamou RM, Boudıa MA, Amıne A (December 1, 2019) State of the Art in Some Cloud Security Through Data Tracking. International Journal of Informatics and Applied Mathematics 2 2 15–27.
IEEE M. A. Dey, A. C. Lokbanı, R. M. Hamou, M. A. Boudıa, and A. Amıne, “State of the Art in Some Cloud Security Through Data Tracking”, IJIAM, vol. 2, no. 2, pp. 15–27, 2019.
ISNAD Dey, Mébarka Aya et al. “State of the Art in Some Cloud Security Through Data Tracking”. International Journal of Informatics and Applied Mathematics 2/2 (December 2019), 15-27.
JAMA Dey MA, Lokbanı AC, Hamou RM, Boudıa MA, Amıne A. State of the Art in Some Cloud Security Through Data Tracking. IJIAM. 2019;2:15–27.
MLA Dey, Mébarka Aya et al. “State of the Art in Some Cloud Security Through Data Tracking”. International Journal of Informatics and Applied Mathematics, vol. 2, no. 2, 2019, pp. 15-27.
Vancouver Dey MA, Lokbanı AC, Hamou RM, Boudıa MA, Amıne A. State of the Art in Some Cloud Security Through Data Tracking. IJIAM. 2019;2(2):15-27.

International Journal of Informatics and Applied Mathematics