Security Issues in Cloud Computing: A survey
2012, International Journal of Computer Applications
Abstract
Cloud computing is attracting great attention nowadays. The elastic nature of cloud makes it suitable for almost any type of organization. The major challenge faced by cloud users and providers are security concerns towards cloud services. These security issues acts as a barrier in the growth of cloud computing. The trust between provider and users is the most important factor to be considered for a cloud service and application. The notion of trust among the various cloud users is also essential to promote the reputation of various cloud providers and their offered services. Here we present an analysis of security issues in a cloud environment. Solution exists to a certain extent for various issues. There are trust based solutions available to provide security in various collaborative environments. Analysis of these solutions can be used to think about a trust based solution in a cloud computing environment.
References (37)
- REFERENCES
- Pearson, S. "Taking account of privacy when designing cloud computing services" Software Engineering Challenges of Cloud Computing, 2009, pages, 44 - 52, Vancouver, BC.
- Jensen, M. Schwenk, J. Gruschka, N. Iacono, "On technical security issues in Cloud" IEEE International Conference on Cloud Computing, 2009, pages 109-16, Germany.
- Arshad, J. Townend, P. Jie Xu , "Quantification of Security for compute Intensive Workloads in Clouds", 15th International Conference on Parallel and Distributed Systems, School of Computation, pages 478-486, Dec. 2009, UK.
- Saurabh, "Security issues in cloud Computing", http://serl.iiit.ac.in/cs6600/saurabh.ppt, 2009.
- David Sherry," Cloud Computing: Security Risks and Compliance Implications", http://media.techtarget.com/searchFinancialSecurity/downl oads/FISD09_Breakout_Session5_CloudComputing_Sherr y.pdf, June 2009, Brown University.
- Gartner "Seven Cloud Computing Security Risks", http://www.infoworld.com/d/security-central/gartner- seven-cloud-computing-security-risks-853?page=0,1, July 2008.
- Carl Almond, "A Practical Guide to Cloud Computing Security", http://www.avanade.com/Documents/Research%20anad%2 0Insights/practicalguidetocloudcomputingsecurity574834.p df, August 2009.
- Diana Kelley," Cloud computing security model overview: Network infrastructure issues", http://searchcloudsecurity.techtarget.com/tip/, 2009.
- Kevin Jackson, "Secure Cloud Computing: An Architecture Ontology Approach" http://sunset.usc.edu/gsaw/gsaw2009/s12b/jackson.pdf, DataLine, 2009.
- Ji Hu Klein, "A Benchmark of transparent data encryption for migration of web application in cloud", Eighth IEEE International Conference on Dependable, Autonomic and Secure Computing, 2009, pages 735 -740, Chengdu.
- Tetsuya, M. Kazuhiro, S. Hirotsugu, K. "A system for search, access restrictions and agents in the Clouds", Ninth Annual International Symposium on Applications and the Internet Cloud, 2009. Pages 201-204, Japan.
- Descher, M. Masser, P. Feilhauer, T. Tjoa, A.M. Huemer, D., "Retaining data control to the Client in Infrastructure Cloud", International Conference on Availability, Reliability and Security, 2009, pages 9-16, Dornbirn.
- Lalana Kagal, Tim Finin, and Anupam Joshi, "Trust-Based Security in Pervasive Computing Environments", Computing and Processing 2001, pages 154-157, Baltimore, MD.
- Naima Iltaf, Mahmud U, Kamran F "Security &Trust Enforcement in Pervasive Computing Environment", HONET 2006, pages 1-5, NUST Pakistan.
- Rui He; Jianwei Niu; Man Yuan; Jianping Hu; "A novel cloud-based trust model for pervasive computing", The Fourth International Conference on Computer and Information Technology,2004, pages 693 -700, China.
- Zhaoyu Liu and Daoxi Xiu, "Agent-based Automated Trust Negotiation for Pervasive Computing", Second International Conference on Embedded Software and Systems, 2005, pages,1-8, USA.
- J Basu and V Callaghan, "Towards A trust based Approach to Security and User Confidence in pervasive computing Systems", The IEE International Workshop on Intelligent Environments, 2005, pages 223 -229, UK.
- Tao Sun, Mieso K. Denko, "Distributed Trust Management Scheme in the Pervasive Computing Environment", Canadian Conference on Electrical and Computer Engineering 2007, pages 1219-22,Guelph.
- Shangyuan Guan, Xiaoshe Dong, Weiguo Wu, Yiduo Mei, Shihua Liao," Trust Management and Service Selection in Pervasive Computing Environments", International Conference on Computational Intelligence and Security Workshops 2007, China.
- Yan Yang, Liang He, Xueming Cai, "A Dynamic Trust Evaluation Algorithm based on Subjective Logic in pervasive computing Environment", 10 th International Conference on Automation, Robotics and Vision Hanoi, December 2008,pages 1078-83, Shanghai.
- Jing Wang, Zhimin Yang, Yunlei Chen, Weili Kou, Zengguang Zhang, "A Trust Model in Pervasive Computing", Third International Conference on Pervasive Computing and Applications, 2008, pages 370-74, China.
- Mieso K. Denko and Tao Sun," Probabilistic Trust Management in Pervasive Computing", IEEE/IFIP International Conference on Embedded and Ubiquitous Computing, 2008,page 610-15, Canada.
- J. Valarmathi ,Dr.V Rhymend Uthariaraj, G. Arjun Kumar, Praveen Subramanian, R Karthick, "A Novel Trust Management Scheme In Pervasive Computing", The 2nd IEEE International Conference on Information Management and Engineering, 2010, pages 141-45, Chennai, India.
- Zhong Dong, Zhu Yian, Lei Wanbao, Gu Jianhua, Wang Yunlan, "Multilevel Trust Management Framework for Pervasive Computing", Third International Conference on Knowledge Discovery and Data Mining, 2010, pages 159- 62, China.
- Pho Duc Giang, Le Xuan Hung, Riaz Ahmed Shaikh, Yonil Zhung, Sungyoung Lee, Young-Koo Lee and Heejo Lee, "A Trust-Based Approach to Control Privacy Exposure in Ubiquitous Computing Environments", IEEE International Conference on Pervasive Services, July 2007, pages 149 - 152, Korea.
- Huafei Zhu, Feng Bao, "Computing Trust in a Complex Environment", 18th Annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, 2007. Pages 1-5, Singapore.
- Gup Riccardo Scandariato, "Application-oriented trust in distributed computing", 3rd International Conference on Availability, Reliability and Security, 2008, pages 434-439, Leuven.
- Yin Zhixi, "A Secure Trust Model Based on Trusted Computing", International Conference on E-Business and Information System Security, 2009, pages 1 -7, Taiyuan.
- Yunzhao Wei,Yanxiang He, Liming Hao," An identity privacy enhanced trust model in fully distributed virtual computing environments", International Conference on Networks Security, Wireless Communications and Trusted Computing, 2009, pages 704-708, China.
- M Younas Javeed, Sidra Nawaz, Distributed Trust Based Access Control Architecture for Pervasive Computing", The 4 th International Conference on Ubiquitous Information Technologies & Applications, 2009, pages 1-6, Pakistan.
- Li Wen, Ping Lingdi, Lu Kuijun, Chen Xiaoping, "Trust Model of User behavior in Trustworthy Internet", International Conference on Information Engineering, 2009, pages 403-406, China.
- Nuno Santos Krishna P. Gummadi Rodrigo Rodrigues, "Towards Trusted Cloud Computing", Conference on Hot Topics in Cloud Computing 2009, pages 1-5, USA.
- Hyukho Kim, Hana Lee, Woongsup Kim, Yangwoo Kim, "A Trust Evaluation Model for QoS Guarantee in Cloud Systems", International Journal of Grid and Distributed Computing, March, 2010.
- Zhimin Yang at el, "A Collaborative Trust Model of Firewall-through based on Cloud Computing", 14th International Conference on Computer Supported Cooperative Work in Design, 2010, China.
- Mahbub Ahmed, "Above the Trust and Security in Cloud Computing: A Notion towards Innovation", IEEE/IFIP International Conference on Embedded and Ubiquitous Computing, 2010, Australia.
- Tian Li at el, "Evaluation of User Behavior Trust in Cloud Computing", International Conference on Computer Application and System Modeling -ICCASM 2010, China.