International Journal of Advanced Innovative Technology in Engineering (IJAITE)



Review on Security Threats of Cloud Environment

Shruti A. Jari, Dr. R. R. Keole, Prof. T. R. Mahore

Abstract :

Recently, data can be safely shared or stored using the infrastructure of cloud computing in various fields. However, issues such as data security and privacy affect cloud environments. Thus, a variety of security technologies are required, one of them is security technology using CP-ABE. Research into the CP-ABE scheme is currently ongoing, but the existing CP-ABE schemes can pose security threats and are inefficient. In terms of security, the CP-ABE approach should be secure against user collusion attacks and masquerade attacks. In addition, in a dynamic cloud environment where users are frequently added or removed, they must eliminate user access when they leave, and so users will not be able to access the cloud after removal. A user who has left should not be able to access the cloud with the existing attributes, and secret key that had been granted. In addition, the existing CP-ABE scheme increases the size of the ciphertext according to the number of attributes specified by the data owner. This leads to inefficient use of cloud storage space and increases the number of operations carried out by the user, which becomes excessive when the number of attributes is large. The main emphasis of this paper is on the recent research carried out in the field of Cyber Security in a Cloud environment.

Keywords :

Full Text :

Download PDF

DOI :

Cite this paper :

References :