Security Issues and Challenges in Cloud Computing
Abstract
The cloud computing is a paradigm shift for online services where the cloud computing provides resources, programs and applications as a service via the Internet and according to the user’ request. It has the ability to make use of computing resources with minimal costs and at high speed. It can provide users with a range of services, applications, and infrastructure and storage of a large amount of data, including important information. Despite the capabilities of the cloud computing, there is a question mark on its security. Therefore, security has become one of the most important issues in the cloud computing. This paper introduces the concept of the cloud computing, its characteristics and models as well as the various security threats that threaten the cloud computing, It also sheds light on some security issues and challenges in the cloud.
References (22)
- SABAHI, F," CLOUD COMPUTING SECURITY THREATS AND RESPONSES", COMMUNICATION SOFTWARE AND NETWORKS (ICCSN), 2011 IEEE 3RD INTERNATIONAL CONFERENCE ON 27-29 MAY 2011.
- Barrie Sosinsky,"cloud computing bible", Copyright © 2011 by Wiley Publishing, Inc., Indianapolis, Indiana
- Peter Mell and Tim Grance, " The NIST Definition of Cloud Computing", Version 15, 10-7-09 ,National Institute of Standards and Technology, Information Technology Laboratory
- Ajith Singh. N,Vasanthi.V , M. Hemalatha, " A Brief Survey on Architecture, Challenges & Security Benefit in Cloud Computing", Volume 2 No. 2, February 2012 ISSN 2223-4985 International Journal of Information and Communication Technology Research, ©2012 ICT Journal. All rights reserved
- Y. Ghebghoub, S. Oukid, and O. Boussaid," A Survey on Security Issues and the Existing Solutions in Cloud Computing", International Journal of Computer and Electrical Engineering, Vol. 5, No. 6, December 2013
- Introduction to cloud computing www.dialogic.com/~/media/products/docs/whitepapers /12023-cloud-computing-wp.pdf
- CSA Cloud Security Alliance,Top Threats working Group, The Notorious Nine cloud computing top threats in 2013
- TED SAMSON ," 9 TOP THREATS TO CLOUD COMPUTING SECURITY", FEBRUARY 25, 2013, HTTP://WWW.INFOWORLD.COM/T/CLOUD-SECURITY/9-TOP-THREATS-C LOUD-COMPUTING-SECURITY-213428
- Kevin Hamlen, Murat Kantarcioglu," Security Issues for Cloud Computing", International Journal of Information Security and 4(2), 39-51, April-June 2010 .
- Ali Asghary Karahroudy," Security Analysis and Framework of Cloud Computing with Parity-Based Partially Distributed File System",July, 2011
- Rohit Bhadauria, Rituparna Chaki," A Survey on Security Issues in Cloud Computing",http://www.tifr.res.in/~sanyal/papers/Survey_on_Securit y_Issues_in_Cloud_Computing_and_Associated_Mitigation_Techni ques.pdf
- Issa M. Khalil 1,*, Abdallah Khreishah 2 and Muhammad Azeem 3," Cloud Computing Security: A Survey", Computers 2014, 3, 1-35; doi:10.3390/computers3010001
- Abdul Raouf Khan," ACCESS CONTROL IN CLOUD COMPUTING NVIRONMENT", VOL. 7, NO. 5, MAY 2012 ISSN 1819-6608 ARPN Journal of Engineering and Applied Sciences
- Tim Mather, Subra Kumaraswamy, Shahed Latif Cloud Security and Privacy : An Enterprise perspective of Risks and Compliance, O'Reilly Media, Inc., 2009.
- Savita Bhayal," A STUDY OF SECURITY IN CLOUD COMPUTING ", August 2011
- S.SUDHA1, V.MADHU VISWANATHAM2," ADDRESSING SECURITY AND PRIVACY ISSUES IN CLOUD COMPUTING", Journal of Theoretical and Applied Information Technology 20th February 2013. Vol. 48 No.2 © 2005 -2013 JATIT & LLS. All rights reserved.
- Siani Pearson," Taking Account of Privacy when Designing Cloud Computing Services", HP Laboratories HPL-2009-54
- Dimitrios Zissis , Dimitrios Lekkas," Addressing cloud computing security issues", Future Generation Computer Systems 28 (2012) 583-592
- Faith Shimba, "Cloud Computing:Strategies for Cloud Computing Adoption",Dublin Institute of Technology ARROW@DIT, 2010-09-01
- Md. Tanzim Khorshed, A.B.M. Shawkat Ali , Saleh A. Wasimi," A survey on gaps, threat remediation challenges and some thoughts for International Journal of Emerging Science and Engineering (IJESE) ISSN: 2319-6378, Volume-2, Issue-7, May 2014
- 26 Published By: Blue Eyes Intelligence Engineering & Sciences Publication Pvt. Ltd. proactive attack detection in cloud computing",Future Generation Computer Systems 28 (2012) 833-851.
- Sadie Creese and Paul Hopkins,"Global Security Challenges of Cloud Computing", International Digital Laboratory, WMG, University of Warwick, UK, Draft v0.7 -July 27