TS Report
TS Report
By
LAKSH
NAGAR
(PIET20CS102)
DEPARTMENT OF COMPUTER
ENGINEERING
POORNIMA INSTITUTE OF ENGINEERING &
1
Final Year Technical Report, Academic Year 2023-24, PIET, Jaipur
CERTIFICATE
Date: 21-11-2023
2
Final Year Technical Report, Academic Year 2023-24, PIET, Jaipur
DECLARATION
3
Final Year Technical Report, Academic Year 2023-24, PIET, Jaipur
ACKNOWLEDGEMENT
A project of such a vast coverage cannot be realized without help from numerous sources and
people in the organization. I am thankful to Mr. Shashikant Singhi, Chairman, PGC and
Dr. Dinesh Goyal, Director, PIET for providing me a platform to carry out such a technical
successfully.
I am also very grateful to Mr. Anil Kumar (HOD,CE) for his kind support.
I would like to take this opportunity to show my gratitude Ms. Saloni Jain and Mr.
Omprakash Sikhwal who helped me in successful completion of my Final Year Technical
Seminar. They have guided, motivated & were source of inspiration for me to carry out the
necessary proceedings for the technical to be completed successfully.
I am thankful to Dr. Shruti Thapar for her kind support and providing me expertise of the
domain to develop the project.
I am also privileged to have Ms. Jayshree Surolia who has flourished me with his valuable
facilities without which this work cannot be completed.
I would also like to express my hearts felt appreciation to all of my friends whose direct or
indirect suggestions help me to develop this project [and to entire team members for their
valuable suggestions.
Lastly, thanks to all faculty members of Computer Engineering department for their moral
support and guidance.
Submitted
by: Laksh
Nagar
4
Final Year Technical Report, Academic Year 2023-24, PIET, Jaipur
ABSTRACT
A popular paradigm for computing, cloud computing provides businesses and organizations
with an affordable and scalable means of accessing and utilizing computer resources.
Nonetheless, the intrinsic features of cloud computing, like its decentralized structure and
dependence on communal resources, present novel security obstacles. This paper offers a
thorough analysis of cloud computing security concerns and looks at different cloud computing
security algorithms that can be used to solve these problems.
The first section of the paper lists and discusses common security issues with cloud computing,
such as denial-of-service attacks, illegal access, and data breaches. After that, it compares and
contrasts several cloud computing security algorithms, such as Transport Layer Security (TLS),
Advanced Encryption Standard (AES), Intrusion Detection System (IDS), Role-Based Access
Control (RBAC), and Multi-Factor Authentication (MFA). Homomorphic encryption, Backup
and Recovery systems, and Data Loss Prevention (DLP) systems. The report goes over each
algorithm's features, advantages, and disadvantages.
5
Final Year Technical Report, Academic Year 2023-24, PIET, Jaipur
Table of Contents
6
Final Year Technical Report, Academic Year 2023-24, PIET, Jaipur
List of Figures
7
Final Year Technical Report, Academic Year 2023-24, PIET, Jaipur
CHAPTER 1
INTRODUCTION
1.1 Areas of Application
Cloud Computing it provides a scalable and affordable means of accessing and utilizing
computer resources, cloud computing has completely changed the way businesses and
organizations run. Organizations can now achieve greater agility, efficiency, and innovation
thanks to this paradigm, which has revolutionized a number of industries and domains. Here is
a thorough rundown of the domains in which cloud computing is applied:
2. Data Storage and Management: Cloud computing provides a safe and affordable way
to store and handle large volumes of data. Cloud storage services are being used by
organizations for:
● Data warehousing: Businesses can store, examine, and draw conclusions from
their sizable datasets thanks to cloud-based data warehouses.
● Big Data Analytics: Cloud platforms offer the scalability and processing power
needed for machine learning and big data analytics applications.
● Disaster Recovery and Data Backup: Cloud storage services offer a safe and
dependable backup option to guard vital data against loss or corruption.
8
Final Year Technical Report, Academic Year 2023-24, PIET, Jaipur
4. Internet of Things (IoT): Connecting, organizing, and interpreting data from IoT
devices is made possible in large part by cloud computing. Cloud platforms are being
utilized by organizations for the following purposes:
● Gather and Examine IoT Data: Real-time data from IoT devices can be gathered
and analyzed thanks to cloud infrastructure, which offers insightful information
about asset performance and operations.
● Manage IoT Devices: Centralized control over IoT device provisioning,
configuration, and security updates is made possible by cloud-based device
management platforms.
● Enable IoT-Powered Applications: Cloud services make it easier to create and
implement IoT-powered applications, like automated industrial processes, smart
cities, and connected cars.
9
Final Year Technical Report, Academic Year 2023-24, PIET, Jaipur
cutting expenses.
11
Final Year Technical Report, Academic Year 2023-24, PIET, Jaipur
1.2 History
From a theoretical concept to a widely used technology, cloud computing has changed how
individuals, companies, and organizations conduct business. Its origins can be found in the
time-sharing movement of the 1960s, which made it possible for several people to use a single
computer system at once. This innovative method demonstrated the possibility of effectively
sharing computing resources, laying the groundwork for cloud computing.
The advent of virtualization technology in the 1970s is regarded as a pivotal moment towards
the current state of cloud computing. A single physical machine could now run multiple
operating systems thanks to virtualization's ability to create virtual machines, or VMs. This
advanced the idea of cloud computing by creating the path for more effective resource sharing
and utilization.
Cloud computing begins to take form in the 1990s. They saw a dramatic change as cloud
computing started to take shape. The development of cloud-based applications, like email
and
12
Final Year Technical Report, Academic Year 2023-24, PIET, Jaipur
customer relationship management (CRM) systems, was spurred by the widespread adoption of
the internet.
A significant turning point in the development of cloud computing occurred with the entry of
cloud computing into the mainstream in the early 2000s. The emergence of the infrastructure as
a service (IaaS), platform as a service (PaaS), and software as a service (SaaS) models allowed
businesses to access platforms, software, and computer resources without having to buy and
maintain their own hardware and software. Cloud computing changed the IT landscape by
becoming a widely used technology.
Currently, cloud computing is defining the digital era. In the modern world, cloud computing
has become an essential component of the digital landscape, enabling both individuals and
enterprises. It has completely changed how we communicate, work together, and get
information. Cloud computing is positioned to have an even bigger impact on how technology
develops in the future and propels innovation across all industries.
A paradigm known as "cloud computing" allows for the pay-as-you-go delivery of on-demand
computing services, including applications, storage, and processing power, usually via the
internet. Businesses and individuals can access a variety of computing resources through cloud
computing, eliminating the need to buy and maintain their own hardware and software.
Significant cost savings, more agility, and enhanced performance are possible outcomes of this.
There are three primary methods for implementing cloud computing: hybrid, private, and
public clouds. Third-party providers own and run public clouds, which are open to the general
public. Private clouds are not open to the general public and are owned and run by a single
entity. Public and private clouds are combined in hybrid clouds.
13
Final Year Technical Report, Academic Year 2023-24, PIET, Jaipur
Many advantages come with cloud computing, such as lower costs, more agility, better
performance, better security, and more teamwork. Businesses of all sizes in a variety of
industries, such as media and entertainment, IoT, big data analytics and machine learning, web
and mobile application development, and business process management, use cloud computing.
The cloud computing industry is expanding quickly and is predicted to do so in the years to
come. The technology behind cloud computing will only grow stronger, more scalable, and
more secure as it develops. This will encourage even more companies and people to use cloud
computing.
Cloud computing has revolutionized the operational landscape for businesses and organizations
by offering a flexible and cost-effective avenue to access and utilize computer resources. This
paradigm shift has brought about profound changes across various fields and industries,
empowering organizations to enhance their innovation, efficiency, and agility. Below is a
comprehensive exploration of the significance of cloud computing in reshaping the way we
work and conduct business:
1. Lower Costs and Greater Efficiency: Businesses can switch from a capital
expenditure (CapEx) model to an operational expenditure (OpEx) model thanks to
cloud computing, which removes the upfront costs associated with buying and
maintaining hardware and software. With this change, organizations only pay for the
resources they actually use, which drastically lowers IT expenses. Furthermore, cloud
computing streamlines IT management, eliminating the need for internal IT personnel
and freeing up funds for more important projects.
2. Increased Agility and Scalability: Cloud computing gives companies the freedom to
quickly and simply scale their IT resources up or down in response to shifting demands.
This flexibility is essential in the fast-paced business climate of today, as companies
must quickly adjust to shifts in the market and client preferences. With cloud
infrastructure, businesses can quickly provision and scale it to meet demand spikes or
introduce new products and services without being constrained by infrastructure.
exchange information from any location in the globe. Workflows are streamlined,
productivity is increased, and teamwork is strengthened by this real-time collaboration.
Additionally, cloud computing makes it easier for teams to communicate and share
files, which fosters a more productive and cohesive work environment.
5. Worldwide Access and Availability: Businesses can reach a global audience with
cloud-based applications and services because they can be accessed from any location
with an internet connection. This worldwide reach can create remote workforces, open
up new markets, and make cross-border collaboration easier. High availability and
uptime are guaranteed by cloud infrastructure, which also minimizes downtime and
guarantees business continuity.
7. Levelling the Playing Field: The advent of cloud computing has made computing
resources more accessible to a wider range of companies, from start-ups to
multinational conglomerates, allowing them to compete on an even playing field. The
pay-as-you-go business model eliminates the financial obstacles that frequently prevent
small businesses from implementing cutting-edge technologies. By enabling companies
to concentrate on their core skills rather than maintaining IT infrastructure, cloud
computing enables them to effectively compete in the global market.
15
Final Year Technical Report, Academic Year 2023-24, PIET, Jaipur
Because it offers a revolutionary method for gaining access to, controlling, and using computer
resources, cloud computing has grown to be an essential tool for companies and organizations
in a variety of industries. Its capacity to lower expenses, boost agility, foster better teamwork,
fortify security, encourage innovation, and level the playing field makes it significant.
16
Final Year Technical Report, Academic Year 2023-24, PIET, Jaipur
CHAPTER 2
LITERATURE REVIEW
Cloud Computing provides an affordable and scalable way to access computer resources, it has
completely changed the way organization’s function. But this paradigm change has also raised
a number of security issues, highlighting the necessity for strong algorithmic solutions to
protect data and maintain system integrity. This review of the literature explores the
algorithmic difficulties and security concerns related to cloud computing in order to address
this challenge.
The access to and use of computing resources by organizations has been completely
transformed by cloud computing. A shared pool of reconfigurable computing resources (such
as networks, servers, storage, applications, and services) that can be quickly provisioned and
released with little management work or service provider interaction is what Mell and Grance
(2011) define as cloud computing.
Cloud computing's inherent distributed nature, shared infrastructure, and internet dependence
present a number of security risks. These weaknesses fall into a number of important
categories:
Protecting sensitive data transferred or stored in the cloud is essential to preventing data
breaches and unauthorized access, as Mell and Grance (2011) discuss in their discussion of the
issue of data confidentiality. To protect the privacy of user data, cloud providers need to use
strong encryption and access control systems.
17
Final Year Technical Report, Academic Year 2023-24, PIET, Jaipur
According to Pearson (2009), cloud computing is scalable, meaning that businesses can quickly
modify their computer resources to satisfy changing needs. Digital signatures, data provenance
tracking, and hashing algorithms can all be used to safeguard data integrity.
The adaptability of cloud computing, which enables businesses to access computer resources
from any location with an internet connection, is highlighted by Dwivedi (2010). He discusses
Identity and Access Management (IAM), which is essential for preventing unwanted access to
sensitive information and resources since it manages user identities and access privileges
effectively. Strong authentication procedures, role-based access control (RBAC), and
attribute-based access control (ABAC) should all be included in IAM systems.
Denial-of-service (DoS) attacks are a threat that can overwhelm cloud resources and cause
service disruptions, as discussed by Ganesan (2011). To lessen DoS attacks, cloud providers
need to put intrusion detection systems, load balancing strategies, and network traffic filtering
into place.
In order to control user access to cloud resources, Sandhu (2000) emphasizes the necessity of
access control mechanisms. models of access control, including attribute-based access control
(ABAC) and role-based access control (RBAC). These models guarantee that certain resources
and data are only accessible to authorized users.
The function of intrusion detection and prevention systems (IDS/IPS) in identifying and
preventing malicious intrusions is covered by Garcia-Teijeiro and Lopez-Ribeiro (2011).In
18
Final Year Technical Report, Academic Year 2023-24, PIET, Jaipur
order to identify anomalies and possible security breaches, these systems examine system
behavior and network traffic patterns.
The use of anomaly detection techniques, such as statistical analysis and machine learning, to
find unusual patterns or behaviors that might point to possible security breaches is stressed by
Deng and Yu (2011). Even in cases where the attack signature is unknown, these methods are
still able to identify minute departures from typical behavior.
The significance of data integrity verification techniques—like hashing and digital signatures
—is emphasized by Kaufman, Perlman, and Speciner (2020) in order to guarantee the veracity
and integrity of data transferred or stored in the cloud. These techniques guarantee that
information hasn't been changed or tampered with while being transmitted or stored. (Perlman,
Speciner, & Kaufman, 2020)
19
Final Year Technical Report, Academic Year 2023-24, PIET, Jaipur
CHAPTER
3 WORK
3.1 Methodology DESCRIPTION
A mixed-methods approach will be used for the research paper, combining quantitative and
qualitative data collection and analysis strategies.
1) Literature Evaluation:
● Goal: Perform a thorough analysis of the body of literature to build a strong
foundation of understanding regarding cloud computing security concerns and
the algorithmic solutions put forth in the fields of academia and business.
● Approach: A methodical examination of industry reports, conference
proceedings, and peer-reviewed publications. synthesis and classification of
pertinent research results to pinpoint algorithms and major security
vulnerabilities.
2) Issue Recognition:
● Goal: Clearly identify and group the security problems that are common in cloud
computing.
● Approach: Use the results of the literature review to categorize and identify the
most important security issues. In order to confirm and improve the issues
found, consult with specialists and professionals.
3) Algorithmic Solution Evaluation:
● Goal: Assess how well algorithmic solutions handle the detected security
vulnerabilities.
● Approach: Examine the literature to find the algorithms suggested for every
security concern. Provide a framework for assessing these algorithms'
scalability, performance, and flexibility.
4) Comparative Analysis:
● Goal: Evaluate the algorithmic fixes for the security flaws that have been found
in relation to one another.
● Approach: Create a well-organized framework for comparison, taking into
account aspects like adaptability, performance impact, scalability, and
practicality. Utilize the framework to evaluate each solution's advantages and
20
Final Year Technical Report, Academic Year 2023-24, PIET, Jaipur
disadvantages.
21
Final Year Technical Report, Academic Year 2023-24, PIET, Jaipur
22
Final Year Technical Report, Academic Year 2023-24, PIET, Jaipur
The landscape of organizational operations has been significantly reshaped by the advent of
cloud computing, introducing a cost-effective, scalable, and on-demand approach to delivering
computing resources. This transformative shift has impacted diverse industries and fields,
fostering improved agility, efficiency, and innovation. Nonetheless, the extensive integration of
cloud computing has raised numerous security issues. Hence, it is imperative to delve into
effective algorithmic solutions that can protect data and uphold the integrity of systems.
1) Cloud Data Security: This refers to safeguarding the availability, confidentiality, and
integrity of data that is transferred or stored in the cloud. This entails putting safeguards
in place to stop unwanted access to data, making sure the information is accurate and
23
Final Year Technical Report, Academic Year 2023-24, PIET, Jaipur
consistent, and making sure the information is available when needed. Major areas of
interest for cloud data security comprise:
● Data encryption: To prevent unwanted access, data is encrypted both in transit
and at rest using powerful encryption algorithms.
● Access control: To limit access to data based on user roles and attributes,
implement role-based access control (RBAC) and attribute-based access control
(ABAC) mechanisms.
4) Identity and Access Management (IAM): IAM is a framework for controlling user
identities and permissions inside the IT systems of an enterprise. By limiting
24
Final Year Technical Report, Academic Year 2023-24, PIET, Jaipur
unauthorized access and data breaches, it makes sure that only authorized users have
access to the resources they require to carry out their job responsibilities.
● Authorization: Limiting each user's access to resources to those necessary for
their job duties by determining their level of access based on their roles and
attributes.
● Access Auditing and Monitoring: Recording and keeping an eye on user access
behaviours to spot irregularities, spot possible security lapses, and ensure legal
compliance.
The IT landscape has undergone a significant transformation with the advent of cloud
computing, providing organizations with a flexible, budget-friendly, and on-demand approach
to accessing computing resources. Nevertheless, the surge in cloud adoption comes hand in
hand with heightened security concerns for organizations. While conventional security
practices can be adapted to cloud settings, it's crucial to tackle distinctive challenges to
maintain the security of data and applications hosted in the cloud..
1. Data Breaches: Since they entail the theft or unauthorized access to private information
transferred or stored in the cloud, data breaches are a big worry for cloud computing.
Many things, such as insufficient access controls, shoddy encryption, and weaknesses in
cloud applications or infrastructure, can lead to these breaches.
For organizations, data breaches can have serious repercussions, such as:
25
Final Year Technical Report, Academic Year 2023-24, PIET, Jaipur
2. Insecure Interfaces and APIs: To communicate with cloud services, cloud apps
frequently rely on Application Programming Interfaces, or APIs. Attackers may use
these poorly secured APIs to change application behavior, insert malicious code, or
obtain unauthorized access to data.
Numerous security risks can result from insecure interfaces and APIs, including:
● Unauthorized data access: By taking advantage of API security flaws, attackers
can obtain sensitive data kept in cloud applications without authorization.
● Malicious code injection: To alter application behavior, interfere with services,
or initiate additional attacks, attackers can inject malicious code into APIs.
4. System Vulnerabilities: Just like any other software, cloud systems can have security
holes that hackers can use to get illegal access, run malicious programs, or stop services
from operating. These vulnerabilities may be present in the software and operating
systems that run on cloud instances, the cloud provider's infrastructure, or the cloud
apps that are being used.
Numerous security risks, such as the following, can arise from system vulnerabilities:
26
Final Year Technical Report, Academic Year 2023-24, PIET, Jaipur
5. Account Hijacking: This is the illegal access to a user's cloud account that an attacker
obtains through phishing for login credentials or by taking advantage of weaknesses in
the account authentication procedure. Once an account has been taken over, hackers can
use it to access private information, alter programs, or even pretend to be the genuine
user in order to carry out more attacks.
Organizations may suffer serious repercussions from account hijacking, such as:.
● Manipulation of applications: To impede operations or initiate additional
attacks, attackers can manipulate cloud applications.
● Financial fraud: Assailants may steal money or carry out fraudulent transactions
using accounts they have taken control of.
7. Data Loss: Another significant issue with cloud computing is data loss. Malicious
attacks, software glitches, hardware malfunctions, and accidental deletion are some of
the possible causes. Organizations may suffer substantial financial losses, harm to their
reputation, and legal repercussions as a result of data loss. Reasons for Losing Data:
● Accidental deletion: Users may inadvertently, whether on purpose or by
accident, erase crucial data.
27
Final Year Technical Report, Academic Year 2023-24, PIET, Jaipur
● Hardware malfunctions: Data loss may result from hardware issues like hard
drive malfunctions.
8. Insecure Storage: If sensitive data in the cloud is not adequately encrypted or
safeguarded by access controls, it may be open to unwanted access. Unauthorized
access, data manipulation, and data breaches can all result from insecure storage.
The Dangers of Unsecured Storage:
● Data leakage: Unencrypted data transfers and unsafe file sharing practices can
both result in the disclosure of sensitive information.
● Data tampering: Sensitive information kept on cloud servers may be altered or
corrupted by hackers.
Cloud computing security algorithms are a set of cryptographic techniques and access control
protocols used to protect data and applications on the cloud. These algorithms help to keep
sensitive data out of the hands of unauthorized users, prevent data tampering, and ensure that
authorized users can quickly access cloud-based applications.
roles
29
Final Year Technical Report, Academic Year 2023-24, PIET, Jaipur
according to the duties and responsibilities of their jobs. By using this method, it is
possible to guarantee that users will only have access to the resources they require to do
their jobs.
7. Backup and Recovery Systems: These systems are necessary to safeguard data against
loss as a result of malicious attacks, software bugs, or hardware malfunctions. In the
event of data loss, backup systems generate copies of the original data that can be
30
Final Year Technical Report, Academic Year 2023-24, PIET, Jaipur
restored. Recovery systems offer the steps and resources required to recover data from
backups.
These security algorithms are essential for shielding cloud computing environments against
various types of attacks. Organizations can contribute to ensuring the availability,
confidentiality, and integrity of their data and applications by putting these algorithms into
practice.
Intrusion Detection
System (IDS) IPS actively blocks
3. Malware Infections malicious traffic, while IDS Intrusion
Intrusion Prevention monitors network traffic for Prevention System
Systems (IPS) suspicious activity. (IPS)
31
Final Year Technical Report, Academic Year 2023-24, PIET, Jaipur
CHAPTER
LIMITATION
1) Scope and Depth of Analysis: The paper mainly addresses a small number of security
vulnerabilities and algorithmic fixes, which might not adequately represent the depth and
complexity of the cloud computing security environment. Examining a larger range of
32
Final Year Technical Report, Academic Year 2023-24, PIET, Jaipur
security threats, vulnerabilities, and mitigation techniques would be part of a more thorough
analysis.
33
Final Year Technical Report, Academic Year 2023-24, PIET, Jaipur
2) Absence of Empirical Evaluation: The paper mostly discusses security concerns and
algorithmic solutions theoretically without offering any empirical data to back up its
assertions. Empirical research, like simulations or real-world implementations, would offer
more verifiable proof of the efficacy of the suggested algorithmic fixes.
3) Data Privacy Issues: Sensitive data is frequently stored on external servers when using
cloud computing. Data privacy is a concern because of the possibility of unwanted access.
It becomes essential to have strong encryption systems and strict access controls in place to
reduce these risks.
5) Vulnerabilities with Shared Resources: Since cloud services rely on shared resources, the
activities or weaknesses of other users may have an influence on the security of a single
user's data. Securing data from unauthorized access or leakage between tenants on the same
cloud infrastructure requires effective isolation mechanisms.
6) Limited Control and Visibility: Users frequently have little control over the infrastructure
and security measures put in place by the cloud service provider. It may be difficult for
organizations to evaluate and confirm the security measures in place due to this lack of
transparency.
7) Behavioural Aspects and Human Factors: Cloud security involves more than just
technical measures; behavioural and human factors are important as well. The majority of
current research ignores insider threats, social engineering assaults, and human error in
Favor of technological fixes. To address human-related security challenges, a more
comprehensive strategy should include organizational culture and behavioural science.
8) Requirements for Regulation and Compliance: Customers and cloud providers navigate
a complicated regulatory environment that includes industry standards, data privacy laws,
and contractual obligations. The current body of research frequently overlooks the changing
regulatory and compliance landscape in favor of technical security measures. It is essential
34
Final Year Technical Report, Academic Year 2023-24, PIET, Jaipur
9) Model of Shared Responsibility: Customers and cloud providers share accountability for
cloud security. Previous studies frequently overlook the role that customers play in
protecting their data and apps, instead emphasizing the obligations of cloud providers.
Comprehensive cloud security requires both levels to implement suitable security practices
and comprehend shared responsibilities.
10) Multi-Cloud Settings: Data portability, interoperability, and uniform security policies
across multiple cloud providers add more layers of complexity to security in multi-cloud
and hybrid cloud environments. Research that has already been done frequently
concentrates on single-cloud settings, ignoring the difficulties associated with multi-cloud
security management.
CHAPTER 5
35
Final Year Technical Report, Academic Year 2023-24, PIET, Jaipur
As cloud computing continues to change, new security threats will continue to pose serious
risks to the availability, confidentiality, and integrity of data. Future investigations ought to
concentrate on tackling these new dangers, such as:
1. Supply Chain Security: Cloud environments are more susceptible to supply chain
attacks due to the increasing complexity of cloud supply chains, which involve
numerous vendors and partners. Subsequent research endeavors ought to explore
techniques for safeguarding the supply chain and detecting and addressing supply chain
weaknesses.
2. Edge Computing Security: As edge computing becomes more widely used, more
security issues arise because edge devices are distributed and have limited security
features. Edge computing processes and analyzes data closer to its source. The
development of secure edge computing protocols and architectures should be the main
focus of future research.
3. IoT Security: As IoT devices are integrated into cloud environments, the attack surface
is increased and cloud-based systems are exposed to threats unique to IoT. Future
research should look into data transmission, access control methods, and secure IoT
device management.
4. Artificial Intelligence (AI) Security: Potential weaknesses like algorithmic bias, data
manipulation, and AI-powered attacks are introduced when AI is integrated into
cloud-based systems. The development of safe AI algorithms, the identification and
mitigation of AI-powered threats, and the promotion of equity and openness in
AI-driven decision-making should be the main areas of future research.
Although certain cloud security issues have been resolved by current algorithmic solutions,
further development and innovation are still required in this field. The following are areas
where algorithmic solutions should be improved in future research:
36
Final Year Technical Report, Academic Year 2023-24, PIET, Jaipur
37
Final Year Technical Report, Academic Year 2023-24, PIET, Jaipur
CHAPTER
REFRENCES
[1] Zhang, Xinmiao, and K. K. Parhi. "Exploring Strategies for Implementing the Advanced
Encryption Standard Algorithm," published in IEEE Circuits and Systems Magazine.
[2] Tabrizchi, Hamed, and Marjan Kuchaki Rafsanjani. "An Inquiry into Security Challenges in
Cloud Computing: Examining Issues, Threats, and Resolutions," featured in The Journal of
Supercomputing (Volume 76.12, 2020, Pages 9493-9532).
[3] Islam, Tariqul, D. Manivannan, and Sherali Zeadally. "Categorizing and Describing
Security Threats in Cloud Computing," found in the International Journal of
Next-Generation Computing (Volume 7.1, 2016, Pages 268-285).
[4] Faheem, Muhammad Rehan, et al. "Enhancing the Security of Web APIs in Cloud
Computing Environments."
[5] Mozumder, Deba Prasead, et al. "Analysis of Security Breaches and Threats in Cloud
Computing," published in the International Journal of Scientific & Engineering Research
(Volume 8.1, 2017, Pages 1287-1297).
[6] Khan, Salman H., and M. Ali Akbar. "Implementing Multi-factor Authentication in Cloud
Environments," presented at the 2015 International Conference on Digital Image
Computing: Techniques and Applications (DICTA), IEEE.
[7] Zhao, Feng, Chao Li, and Chun Feng Liu. "Introducing a Security Solution for Cloud
Computing Based on Fully Homomorphic Encryption," featured in the 16th International
Conference on Advanced Communication Technology (2014), IEEE.
[8] Singh, Kumar Pal, Vinay Rishiwal, and Pramod Kumar. "Data Classification for
Augmenting Data Security in Cloud Computing," presented at the 2018 3rd International
Conference on Internet of Things: Smart Innovation and Usages (IoT-SIU), IEEE.
[9] Santhisri, K., and P. R. S. M. Lakshmi. "A Comparative Exploration of Various Security
Algorithms in Cloud Computing," published in Recent Trends in Programming Languages
(Volume 2.1, 2015, Pages 1-6).
[10] Pant, Vinay Kumar, and Mr Anshuman Saurabh. "Understanding Cloud Security:
Unraveling Issues, Confrontations, and Optimal Solutions," published in the International
Journal of Engineering Research & Management Technology (Volume 2.3, 2015, Pages
41-50).
38