Research Papers and Journals

Only available on StudyMode
  • Download(s) : 41
  • Published : December 28, 2012
Open Document
Text Preview
Systematic Literature Review

Groups
Security in Cloud Computing
The area of research discussed in this paper is about security challenges in cloud computing. I reviewed five papers, which are mentioned in this paper. First paper is about “emerging security challenges in cloud computing,” An insight to cloud security challenges and their mitigation”. It was presented by Akhil Behl [1] and it was published by IEEE on 2011 World Congress on Information Security and Communication Technologies. Second paper is about “Information Security Risk Management Framework for the Cloud Computing Environments”. It was presented by Xuan Zhang et al.[2], School of Information and Software, Yunnan University china and it was published by IEEE on 2010 10th International Conference on Computer and Information Technology. Third paper is about “MCDB: Using Multi-Clouds to ensure Security in Cloud Computing”. It was presented by Mohammad A. AlZain, et al.[3], Department of Computer Science and Computer Engineering, La Trobe University, Bundoora 3086, Australia and it was published by IEEE on 2011 9th International Conference on Dependable, Autonomic and Secure Computing. Fourth paper is about “attack sequence detection in Cloud using Hidden Markov Model” and it is presented by Chia-Mei Chen, et al. [4], and published on IEEE on 2012 seventh Asia Joint Conference on Information Security. Fifth paper is about “A novel Approach for Security in Cloud Computing using Hidden Markov Model and Clustering” and it was presented by Pardeep Kumar et al. [5]. It was published on IEEE on 2011 World Congress on Information and Communication Technologies.

Description
In first paper, “emerging security challenges in cloud computing,” some existing security challenges such as Insider threats, outsider malicious attacks, Data loss, Service Disruption, Multi-tenancy issues and loss of control have been discussed to secure the cloud infrastructure and their applications and their drawbacks...
tracking img