Security issues in Networks Using SSL Algorithm in Cloud Computing

Authors

  • P. Mani  Department of MCA, SVIM, Tirupati, Andhra Pradesh, India
  • A. J. Rajasekhar  Assistant Professor, Department of MCA, SVIM, Tirupati, India

Keywords:

SaaS, IaaS, PaaS, Multi-tenant, Security, SSL.

Abstract

Cloud computing is a style of processing in which business gives application information and any sort of IT resource as a service to customer. To access services of cloud computing you just need Internet get to? Cloud computing is obviously one of the present most luring innovation territories because of its cost-efficiency and adaptability. Be that as it may, with this offices it isn't picking up as much prevalence as it must be, a large portion of the association are not have any desire to send cloud condition. Security is one of the real issues which lessens the development of cloud computing. In this paper we portray how the association can convey this processing condition without being stressed over security issues.

References

  1. Deep Vardhan Bhatt, Stefan Schulze, Gerhard P. Hancke( 2006) “Secure Internet Access to Gateway Using Secure Socket Layer” ieee transactions on instrumentation and measurement, vol. 55, no. 3.
  2. Meiko Jensen, Jorg Schwenk, Nils Gruschka, Luigi Lo Iacono (2009) “On Technical Security Issues in Cloud Computing” IEEE International Conference on Cloud Computing.
  3. Cong Wang, Qian Wang, and Kui Ren, Wenjing Lou (2009) “Ensuring Data Storage Security in Cloud Computing”.
  4. C. Coarfa, P. Druschel, and D. S. Wallach. Performance Analysis of TLS Web Servers. ACM Trans. Comput. Syst., 24(1):39–69, Feb. 2006.
  5. Common Vulnerabilities and Exposures. CVE-2014-0160. Available at: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0160.
  6. Comodo. Report of incident on 15-mar-2011. Technical report, March 2011. Available at: https://www.comodo.com/ Comodo-Fraud-Incident-2011-03-23.html.
  7. Crossbear Project. SSL Landscape - X.509 data sets. Available at: https://pki.net.in.tum.de/node/8.
  8. Subedari Mithila, P. Pradeep Kumar (2011) “Data Security through Confidentiality in Cloud Computing Environment” International Journal of Computer Science and Information Technologies, Vol. 2 (5), 1836-1840.
  9. M S.Bhiogade (2002) “Secure Socket Layer” Informing Science InSITE - “Where Parallels Intersect”.
  10. Amit Batra, Rajender Kumar, Arvind Kumar (2011) “A Review of Storage and Fault ToleranceApproaches Used in Cloud Computing” (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 2 (5), 2011, 1971-1978.
  11. J. Leyden. Step into the BREACH: HTTPS encrypted web cracked in 30 seconds. The Register, August 2013. Available at: www.theregister.co.uk/2013/08/02/breach crypto attack.
  12. E. Mills. Go Daddy-serviced Web sites go down; hacker takes credit. CNET, September 2012. Available at: http://www.cnet.com/news/godaddy-serviced-web-sites-go-down-hacker-takes-credit.
  13. Netcraft. Phishing Alerts for SSL Certificate Authorities. Available at: http://news.netcraft.com/archives/2012/08/22/phishing-on-sitesusing-ssl-certificates.html.
  14. Public Web Application Security Project. Testing for SSL-TLS (OWASP-CM-001). Available at: https://www.owasp.org/index.php/Testing for SSL-TLS (OWASPCM-001).
  15. P. Eckersley and J. Burns. An observatory for the SSLiverse, July 2010. Talk at DEFCON '18. Available at: https://www.eff.org/files/DefconSSLiverse.pdf.
  16. P. Eckersley and J. Burns. Is the SSLiverse a safe place, 2010. Talk at 27C3.

Downloads

Published

2018-04-30

Issue

Section

Research Articles

How to Cite

[1]
P. Mani, A. J. Rajasekhar, " Security issues in Networks Using SSL Algorithm in Cloud Computing, International Journal of Scientific Research in Science and Technology(IJSRST), Online ISSN : 2395-602X, Print ISSN : 2395-6011, Volume 4, Issue 7, pp.73-78, March-April-2018.