A Survey Paper on Security in Cloud Computing

137 downloads 179228 Views 772KB Size Report
To understand cloud security, there are referred high level publisher's papers. For this review total. 122 research paper of security issues in cloud computing till.
Circulation in Computer Science Vol.1, No.2, pp: (19-23), Dec 2016 www.ccsarchive.org

A Survey Paper on Security in Cloud Computing: A Bibliographic Analysis Krutika K. Shah

Vahida U. Vadiya

Rutvij H. Jhaveri

Department of Computer Engineering Shri S’ad Vidya Mandal Institute of Technology, Bharuch Gujarat, India

Department of Computer Engineering Shri S’ad Vidya Mandal Institute of Technology, Bharuch Gujarat, India

Department of Computer and Information Technology Shri S’ad Vidya Mandal Institute of Technology, Bharuch Gujarat, India

ABSTRACT Cloud Computing uses a network of remote servers hosted on the internet to store, manage and process data, rather than a local server or a personal computer. Cloud computing provides services on demand. In the recent time, Cloud Computing is highly demanded service because of the advantages like high computing power, less cost of services, high performance, scalability, reliability, accessibility as well as availability. To understand cloud security, there are referred high level publisher’s papers. For this review total 122 research paper of security issues in cloud computing till May 2016. For this paper included studied graphical and systematic review of various research work carried out on cloud computing. These findings show that the research in Cloud Computing received more attention over the past few years. There are referred high level publisher’s paper for better understanding about the security issues in cloud computing. This analysis would provide insights for researches, students, publishers, experts to study current research trend in cloud computing, helps to peoples for any issues about cloud computing.

Keywords Cloud Computing; Trend Analysis; Graphical Interpretation.

1. INTRODUCTION

From Observations of the research paper, leads to Security level and most famous issues for cloud computing. Security is the most problematic issues in Cloud. Security of cloud is in terms of threats, vulnerabilities and impact. That is show that improving security of cloud will increase accuracy, prevention of data loss and improve privacy, which has very less papers to give the solution about this type of security. There are try to cover mostly security level related research papers as our primary objective. Organization of research paper is included following things: in section II we considered graphical representation of this trend analysis. At last section III which comprise theoretical portion of cloud computing.

2. GRAPH INTER-REPRESENTATION In this paper, there are referred papers on security issues on cloud based on it we do some analysis which are shown below.

2.1 Simulations v/s Real-world Implementation In this portion, there are distributed every research papers related to their implementation. This works are distributed either in real-world or on a simulator. Show the Figure 1 which is shows the graphical representation of it.

Cloud computing is the next natural step in the evolution of On-Demand information technology services and products [1]. Cloud Computing provides three types of services SaaS (Software as a Service), PaaS (Platform as a Service) and IaaS (Infrastructure as a Service). Based on past data, Bibliography analysis is an aspect of Technical analysis to predict movement of particular research area in future. In this analysis there are found, in which particular field ‘what’ and ‘how much’ work has been done. During trend analysis we shows high improvement about security in cloud computing. In this paper there are try to make a trend analysis on Cloud computing showing the current trend till year 2016. There are referred research papers of different well known journals and Conferences of high level publishers. During the trend analysis there are found many issues and the security level’s problems and solutions for that. Different types of attack which is performed on the private cloud also important issues and problems for organizers and companies. In this paper referred DDos attack in cloud and prevention techniques for that. Copyright © 2016 Shah et al. This is an open-access article distributed under the terms of the Creative Commons Attribution License 4.0, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.

Simulation 34%

Real-world 66%

Figure 1: Real-world v/s Simulation Implementations As shown in Figure 1, most of research papers referred as Real-world implementations. Till 2016 there were 66% papers implemented in Real-world, other 34% papers implemented on Simulations scenario.

Circulation in Computer Science, Vol.1, No.2, pp: (19-23), Dec 2016 www.ccsarchive.org

2.2 Percentage of Papers Published by Countries

Tatlor & Francis ACM 5% 3% Atlantis Press 1% arXiv 4%

As discuss above, now a day cloud computing is most on demand topic. Different authors from different countries are trying to research on this topic.

Springer 20%

No of Papers

There are referred 122 journals and conference papers from different publishers at different countries. Publishers such as IEEE, Springer, Elsevier, Taylor & Francis from June 2014 to May 2016.

Elsevier 32%

40 35 30 25 20

IEEE 33% Hindawi 2%

15 10 5 0

Figure 4: Percentage of Publishers shown in Figure 4, this is the accurate distribution of No ofAsPapers different publishers. In our case, most of IEEE and Elsevier which is high level publisher we referred. Also other publishers show in figure.

Country

Figure 2: Papers published by Countries

This graph was implemented from our data information we fetched from our analysis. From our data information IEEE 33% which is highly referred by us. Then Elsevier 32%, Springer 20%, Taylor & Francis 5%,arXiv 4%, ACM 3%, Hindawi 2% and Atlantis Press 1%.

2.4 Citation per Publishers This analysis is about Publishers v/s Citations. This analysis of representing the citations of every publisher shows the superiority of complete work carried out by well recognized publisher. The higher the citation the better superiority of paper is published.

18 16 14 No of Papers

12

Tatlor & Francis

10

Springer

8

IEEE

6

Publishers

No. of Papers

4 2 0

Hindawi Elsevier Atlantis Press

arXiv ACM Country

Figure 3: Papers published by Countries As shown in Figure 2 & Figure 3, different countries contribute the papers to different publishers. In our case, maximum contribution came from China & USA. Other countries like India, UK, Malaysia, Korea etc gives good enough contribution for related research papers.

2.3 Percentage of Publishers For accurate and proper analysis, it is necessary to refer high level or high quality literatures as resource.

0

200

400

600

800

1000

Citations

Figure 5: Citations per Publishers As shown in Figure 5, the record shows that it should comprise every well familiar publisher and cite completely. The maximum number of citations more accurate or recognized publisher. In this case, ACM has the minimum number of citations (7) till May 2016, Taylor & Francis has 16 then Hindawi and Atlantis Press have 27 citation. The well known publishers has maximum number of citations such as Springer has 186, Elsevier 808 and IEEE has 3144 highest number of citation which is shown in figure with graphical view.

20

Circulation in Computer Science, Vol.1, No.2, pp: (19-23), Dec 2016 www.ccsarchive.org

2.5 Conference Papers v/s Journals

2.7 Objective wise Percentage of Citations

Journals serve as forums for the introduction and presentation for scrutiny of new research, and the critique of existing research where as Conference papers can be effective way to try out new ideas, introduce our works to our community and colleagues, and work on research questions.

Citation are considered as a mathematical value that acknowledge the quality of work in such given research paper for students, publishers.

120 Citations

110

100 No of Papers

80

60 40

450 400 350 300 250 200 150 100 50 0

387

307 212

162

156 24

54

41

30

28

69

20 12

0

Conference

Journal Conference or Journal

Figure 6: Conference Papers v/s Journal Counts As shown in Figure 6, the difference between number of conference and journal. As per our research, in our case maximum numbers of journals are referred by publishers. In our case study total number of journals are 110 where as conference are 12. There is huge gap between the no of papers of conference and the journal. This difference shows that most of works are done to be published in journals as per our study.

2.6 Frequency of Number of Authors Cloud computing is the most on-demand resource in the computer environment. Well, it’s next to impossible for particular researcher to survey the whole topic by themselves. In this case there are one or more than one authors or researchers in any research and it will vary from one to many researcher. 40

Objectives

Figure 8: Objective wise percentage of Citations As shown in Figure 8, graph is about objectives v/s citations. Citations are considered in each case of objective of given research paper. Here in case study, security in networking has the average number of citations which is around 307 after that security in data storage is considered which have 69 citations, cloud computing related and some other objective papers has 387 numbers of citations. As shown in graph cloud services having 212, privacy related having 156, then Protect data of cloud containing 162 numbers of citations. After that DoS and DDoS attack, Reduce time and reduce cost etc have minimum number of citations.

2.8 Objective wise Frequency Objective wise frequency represents the most trending objective which is followed by other respectively. 35

35

30

25 20

No of Papers

15

No of Authors

No of Papers

30

21

15 14

10

0

5

27

20

5

10

30

25

7

7 2

4

3

5

2

0 1

2

3

4

5

6

7

8

9

10

Figure 7: Frequency of Number of Authors As shown in Figure 7, this graph shows number of authors for particular research paper. It represents that how many authors have worked on individual research paper. The graph shows maximum paper written by or published by 4 authors in each paper. There were 35 papers published by 4 authors, 25 papers were published by 3 authors. In this case there was also having papers which is published by 10 or more then 10 authors. There was one paper which published by 9, 13 and 16 authors which is working on same topic.

Objectives

Figure 9: Objective wise Frequency As shown in Figure 9, the graph shows the frequency related to objective. Security in network is the highest 30 count in our case study. Then security in data storage has 21 counts, many objectives which are related to cloud computing and others. While reduce time and reduce cost 5 and protected data counted as 14, others objective counted as 27. Cloud services,

21

Circulation in Computer Science, Vol.1, No.2, pp: (19-23), Dec 2016 www.ccsarchive.org

DoS & DDoS attack, Energy Consumption, Enhance performance, privacy etc having minimum number of papers.

2.9 Paper Efficiency/Ranking For the efficiency analysis, we first need to standardize the efficiency measure for all paper of collected dataset published in recent years till May 2016. There is proposing the following equation to normalize the efficiency scores for all research articles of our dataset [2]: E = C/ (18-PM) Where,

E = Efficiency of the paper C = Citation of the paper PM = Published Months of that particular paper

This following derived equation helps us find efficiency of the individual papers. The citation of the papers are divided by

the value obtained by excluding published months from total number of months till the papers published(Till month of May of year 2016) . 1 month of 2014, 12 months of 2015 and month of January to May of year 2016 that led us to a total of 18 months. This results into accurate result that is derived from above given equation in three categories by its efficiency score: i. High Efficiency ii. Medium Efficiency iii. Low Efficiency Here in two tables we show the high efficiency and medium efficiency for each related papers. As shows the efficiency, high efficiency contains >1 and medium is =1. Other papers are of the low efficiency which we have not mentioned in the table.

Table 1: High Efficiency Papers Papers

Month, year

Citations

Efficiency

A secure and dynamic multi keyword ranked search scheme over encrypted cloud

2,2016

83

27.666

Cloud computing adoption framework: A security frameworks for Business clouds

4,2016

25

25

Towards achieving data security with the cloud computing adoption framework

2,2016

25

8.333

A Hybrid Cloud Approach for secure Authorized Deduplication

5,2015

63

5.25

Context-Aware vehicular cyber-physical systems with cloud supports architecture challenges and solutionc

8,2014

76

3.619

Identity-based Encryption with Outsourced Revocation in Cloud Computing

2,2015

39

2.6

EMC: Emotion-Aware Mobile Cloud Computing in 5G

3,2015

36

2.571

A full lifecycle privacy protection scheme for sensitive data in cloud computing

11,2015

13

2.166

Towards a Big Data System Disaster Recovery in a Private Cloud

7,2015

20

2

PSMPA: Patient Self-controllable and Multi-level Privacy-preserving Cooperative Authentication in Distributed m-Healthcare Cloud Computing System

6,2015

22

2

biometric

10,2015

11

1.571

A security framework in G-Hadoop for big data computing across distributed cloud data centers

8,2014

33

1.571

Mobile Device Data Security: A Cryptographic Approach by Outsourcing Mobile Data to Cloud

12,2015

4

1.33

A Hybride approach for scalable sub-tree anonymization over big data using MapReduce on cloud

8,2014

26

1.238

Trust Model for Measuring Security Strength of Cloud Computing Service

12,2015

6

1.2

CloudID: Trustworthy identification

cloud-based

and

cross-enterprise

Table 2: Medium Efficiency Papers Papers

Month, year

Citations

Efficiency

A lightweight attribute-based encryption scheme for the Internet of Things

8,2015

9

1

A cloud computing framework on demand side management game in smart

1,2015

16

1

22

Circulation in Computer Science, Vol.1, No.2, pp: (19-23), Dec 2016 www.ccsarchive.org

energy hubs SDN and NFV Integration in Generalized Mobile Network Architecture

7,2015

10

1

Control Cloud Data Access Privilege and Anonymity With Fully Anonymous Attribute Based Encryption

1,2015

16

1

DDoS attack protection in the era of cloud computing and Software-Defined Networking

2,2015

15

1

3. THEORETICAL BACKGROUND

4. CONCLUSION

Cloud computing has proved to be promising innovation and more suitable for storing data and applications remotely. Its usage is limited due to the security of data. With the help of some processing or solutions makes cloud services more reliable [3].

The research conducted a systematic analysis of various fields in cloud computing. It provides interpretation and implication of the most recent finding which concludes the following results for researchers, authors and educators.

As per our study, maximum number of paper work has focus on security on cloud computing services. Security on data storage, security in network, reduces time and reduces cost, protection against attacks such as DOS and DDoS attack, energy consumptions, and others. For improving the formerly explained limitations, many researchers have shown their efforts by proposing different protocols, algorithms, error bounded solutions, describe or explain their analysis based on improving performance.

3.1 Security in data Storage Recent year, cloud computing has been one of the popular technologies. Take cloud storage services as an example; Dropbox, Google Drive, ASUS CLOUD, SkyDrive,etc., allow users to store their data in cloud storage and access them remotely later. Cloud storage has become essential in our daily lives. User and enterprises may require storing sensitive and costly information in cloud storage. Encryption or decryption method, used for provide security for storage data on cloud [4].

3.2 Personal Security in Network Use the concept of Network Virtualization technology OpenStack which is the most popular and widely adopted open source platform implementing the Infrastructure as a Service (IaaS) cloud paradigm can work. OpenStack provides cloud manager to control a cluster of hosting servers and to manage the required storage facilities and virtual network infrastructure [4].

3.3 Personal Security and Privacy Providers ensure that all critical and personal data are masked or encrypted and that data can only accessed by authorized users. Moreover, digital identities and credentials must be protected as should any data that the provider collects or produces about customer activity in the cloud.

3.4 Reduce Time and Reduce Cost New cloud services are being developed to support a wide variety of real-life applications such as Industrial Automation as a cloud service, which simplifies automation system design and saves time and cost [6].

In this paper show conclusions that: Initially, the most trending topics till May 2016 were related to security in network, security in data storage, big data, privacy and private data, reduce time and reduce cost which is referred in our study. Secondly, the countries which plays enormous role in research in cloud computing are India, USA, China, UK, Span followed by other countries across the world. As per study conclude the maximum research paper published by IEEE till 2016 compare to other well known publishers. Concluding from the graph, the maximum citations were attached in field of security in network. Other side there is shows the graph of objective citations and objectives wise frequency, in that graph the maximum frequency is for security in data storage. There is also show which publishers have numbers of citations for each research paper. In collected dataset highest China country published maximum papers. Number of conferences and journals also represents as graph. We conclude that maximum numbers of research paper works are limited simulation, while 40% out of all research paper works have carried out real-world implementations. Looking ahead through the amount of work carried out for improving carious performance metrics in cloud computing, it shows superior potential for additional research in this area.

5. REFERENCES [1] A Vouk, Mladel. “Cloud computing- Issues, Research and Implementation”. CIT. Journal of Computing and Information technology 16.4(2008):235-246. [2] Uddin, Shahadat, et al. "Trend and efficiency analysis of co-authorship network." Scientometrics 90.2 (2011): 687-699. [3] Bapat, Devavrat, et al. “ A Cloud Computing Security Solution Based on Fully Homomorphic Encryption.” [4] S. M. Metev and V. P. Veiko, “Laser Assisted Microtechnology”, 2nd ed., R. M. Osgood, Jr., Ed. Berlin, Germany: Springer-Verlag, 1998. [5] V Callegati,Franco, et al. “Performance of Network Virtualization in cloud computing infrastructures: The OpenStack case.” Cloud Networking (CloudNet), 2014 IEEE 3rd International Conference on. IEEE, 2014. [6] Hegazy, Tamir, and Mohamed Hefeeda. “Industrial automation as a cloud service.” Parallel and Distributed Systems, IEEE Transactions on 26.10 (2015): 27502763.

23 CCS | 2016 | ISSN 2456-3692 Published by: CSL Press, USA

Suggest Documents