A Review Study on Cloud Computing Issues
Journal of Physics: Conference Series
https://doi.org/10.1088/1742-6596/1018/1/012006Abstract
Cloud computing is the most promising current implementation of utility computing in the business world, because it provides some key features over classic utility computing, such as elasticity to allow clients dynamically scale-up and scale-down the resources in execution time. Nevertheless, cloud computing is still in its premature stage and experiences lack of standardization. The security issues are the main challenges to cloud computing adoption. Thus, critical industries such as government organizations (ministries) are reluctant to trust cloud computing due to the fear of losing their sensitive data, as it resides on the cloud with no knowledge of data location and lack of transparency of Cloud Service Providers (CSPs) mechanisms used to secure their data and applications which have created a barrier against adopting this agile computing paradigm. This study aims to review and classify the issues that surround the implementation of cloud computing which a hot area that needs to be addressed by future research.
References (73)
- References
- M. Armbrust, A. Fox, R. Griffith, A. Joseph, R. Katz, A. Konwinski, G. Lee, D. Patterson, A. Rabkin, and I. Stoica, "A View of Cloud Computing," Commun. ACM, vol. 53, no. 4, pp. 50- 58, 2010.
- K. Jakimoski, "Security Techniques for Protecting Data in Cloud Computing," Int. J. Grid Distrib. Comput., vol. 9, no. 1, pp. 49-56, 2016.
- Z. Hong-lie, L. Xin, L. I. U. Yan-ju, and L. Cheng, "Research on Cloud Resource Section Method for the Multi-layer Ontology," Int. J. Grid Distrib. Comput., vol. 9, no. 1, pp. 193- 200, 2016.
- A. N. Khan, M. L. Mat Kiah, S. U. Khan, and S. A. Madani, "Towards secure mobile cloud computing: A survey," Futur. Gener. Comput. Syst., vol. 29, no. 5, pp. 1278-1299, 2013.
- A. M.-H. Kuo, "Opportunities and Challenges of Cloud Computing to Improve Health Care Services," J. Med. Internet Res., vol. 13, no. 3, p. e67, 2011.
- L. M. Kaufman, "Data security in the world of cloud computing," IEEE Secur. Priv., vol. 7, no. 4, pp. 61-64, 2009.
- M. B. Mollah, M. A. K. Azad, and A. Vasilakos, "Security and privacy challenges in mobile cloud computing: Survey and way ahead," Journal of Network and Computer Applications, vol. 84. pp. 38-54, 2017.
- D. Sarddar, P. Sen, and M. K. Sanyal, "Central Controller Framework for Mobile Cloud Computing," Int. J. Grid Distrib. Comput., vol. 9, no. 4, pp. 233-240, 2016.
- Z. Gao, Y. Li, H. Tang, and Z. Zhu, "Management Process Based Cloud Service," in International Conference on Cyberspace Technology (CCT 2013), 2013, pp. 278-281.
- A. Botta, W. de Donato, V. Persico, and A. Pescapé., "Integration of cloud computing and 7 1234567890 ''"" 1st International Conference on Big Data and Cloud Computing (ICoBiC) 2017 IOP Publishing IOP Conf. Series: Journal of Physics: Conf. Series 1018 (2018) 012006 doi :10.1088/1742-6596/1018/1/012006 internet of things: a survey.," Futur. Gener. Comput. Syst., vol. 56, p. 684-700, 2016.
- D. A. B. Fernandes, L. F. B. Soares, J. V. Gomes, M. M. Freire, and P. R. M. Inácio, "Security issues in cloud environments: a survey," Int. J. Inf. Secur., vol. 13, no. 2, pp. 113-170, 2014.
- V. Inukollu, S. Arsi, and S. Ravuri, "Security Issues Associated With Big Data in Cloud Computing," Int. J. Netw. Secur. Its Appl., vol. 6, no. 3, pp. 45-56, 2014.
- H. Rasheed, "Data and infrastructure security auditing in cloud computing environments," Int. J. Inf. Manage., vol. 34, no. 3, pp. 364-368, 2014.
- N. Fernando, S. W. Loke, and W. Rahayu, "Mobile cloud computing: A survey," Futur. Gener. Comput. Syst., vol. 29, no. 1, pp. 84-106, 2013.
- C. LLP, W. Chan, E. Leung, and H. Pili, "Enterprise Risk Management for Cloud Computing," 2012.
- A. Tuli, N. Hasteer, M. Sharma, and A. Bansal, "Exploring Challenges in Mobile Cloud Computing: An Overview," Confluence 2013: The Next Generation Information Technology Summit (4th International Conference). p. 6, 2013.
- NSTAC, "NSTAC Report to the President on Cloud Computing," 2012.
- F. Al-anzi, S. Yadav, and J. Soni, "Cloud Computing: Security Model Comprising Governance, Risk Management and Compliance," in 2014 International Conference on Data Mining and Intelligent Computing (ICDMIC), 2014, pp. 1-6.
- R. Matt, "Cybersecurity and Cloud Computing in the Health Care and Energy Sectors: Perception and Reality of Risk Management," 2013.
- E. Takamura, C. Gomez-rosa, K. Mangum, and F. Wasiak, "MAVEN Information Security Governance , Risk Management , and Compliance ( GRC ): Lessons Learned," in 2014 IEEE Aerospace Conference, 2014, pp. 1-12.
- J. Adjei, "Explaining The Role of Trust in Cloud Service Acquisition," in 2014 2nd IEEE International Conference on Mobile Cloud Computing, Services, and Engineering, 2014, pp. 283-288.
- S.-T. Lai and F.-Y. Leu, "A Security Threats Measurement Model for Reducing Cloud Computing Security Risk," in 2015 9th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2015, pp. 414-419.
- P. Anand, J. Ryoo, H. Kim, and E. Kim, "Threat Assessment in the Cloud Environment -A Quantitative Approach for Security Pattern Selection," in IMCOM '16, 2016, p. 8.
- E. Cayirci, "Modeling and Simulation as A Cloud Service: A Survey," in Proceedings of the 2013 Winter Simulation Conference, 2013, pp. 389-400.
- A. Michalas, N. Paladi, and C. Gehrmann, "Security Aspects of e-Health Systems Migration to the Cloud," in 2014 IEEE 16th International Conference on e-Health Networking, Applications and Services (Healthcom) Security, 2014, pp. 212-218.
- P. Hazarika, V. Baliga, and S. Tolety, "The Mobile-Cloud Computing (MCC) Roadblocks," in 2014 Eleventh International Conference on Wireless and Optical Communications Networks (WOCN), 2014, pp. 1-5.
- M. Bamiah, S. Brohi, and S. Chuprat, "Cloud Implementation Security Challenges," in Proceedings of 20l21ntemational of Cloud Computing, Technologies, Applications & Management, 2012, pp. 174-178.
- F. Al-Musawi, A. H. Al-Badi, and S. Ali, "A Road Map to Risk Management Framework for Successful Implementation of Cloud Computing in Oman," in 2015 International Conference on Intelligent Networking and Collaborative Systems, 2015, pp. 417-422.
- J. K. Ganlea, K. Afriyie, and A. Y. Segbefia, "Microcredit: Empowerment and Disempowerment of Rural Women in Ghana," World Dev., p. Pages 335-345, 2015. 1234567890 ''"" 1st International Conference on Big Data and Cloud Computing (ICoBiC) 2017 IOP Publishing IOP Conf. Series: Journal of Physics: Conf. Series 1018 (2018) 012006 doi :10.1088/1742-6596/1018/1/012006
- E. Aruna, A. Shri, and A. Lakkshmanan, "Security Concerns and Risk at Different Levels in Cloud Computing," in 2013 International Conference on Green Computing, Communication and Conservation of Energy (ICGCE), 2013, pp. 743-746.
- B. Shanthini and S. Swamynathan, "Genetic-based biometric security system for wireless sensor-based health care systems," in Proceedings of the 2012 International Conference on Recent Advances in Computing and Software Systems, RACSS 2012, 2012, pp. 180-184.
- G. Ahammed, R. Banu, and N. Fathima, "An Approach to Secure Communication in IoT (Internet of Things)," in CONFERENCE ON INTERNET OF THINGS, 2016, no. February, p. 315.
- C. Klein, "Cloudy Confidentiality : Clinical and Legal Implications of Cloud Computing in Health Care," Anal. Comment., vol. 39, no. 4, pp. 571-578, 2011.
- A. Wadhawan and A. Bhatia, "Neural Network Based Intelligent Retrieval System for Verifying Dynamic Signatures," Int. J. Adv. Sci. Technol., vol. 83, no. 2015, pp. 27-40, 2015.
- M. Alhomidi and M. Reed, "Security Risk Analysis as a Service," in 2013 8th International Conference for Internet Technology and Secured Transactions, ICITST 2013, 2013, pp. 156- 161.
- A. Khan, M. Fayaz, A. S. Shah, and F. Wahid, "Critical Analysis of Cloud Computing Software Development Process Models," Int. J. Softw. Eng. Its Appl., vol. 10, no. 11, pp. 451- 466, 2016.
- E. Arianyan, M. Ahmadi, and D. Maleki, "A Novel Taxonomy and Comparison Method for Ranking Cloud Computing Software Products," Int. J. Grid Distrib. Comput., vol. 9, no. 3, pp. 173-190, 2016.
- M. Carroll, A. Merwe, and P. Kotzé, "Secure Cloud Computing: Benefits, Risks and Controls," in Information Security for South Africa -2011, 2011, pp. 1-9.
- J. S. Sengar and R. Sharma, "Review : Ad-Hoc Cloud Architecture & Modern Cryptography," Int. J. Grid Distrib. Comput., vol. 9, no. 6, pp. 45-50, 2016.
- H. Rajaei and J. Wappelhorst, "Clouds & Grids: A Network and Simulation Perspective," in Conference: 2011 Spring Simulation Multi-conference, SpringSim '11, Boston, MA, USA, 2011, pp. 143-150.
- C. O. Rolim, F. L. Koch, C. B. Westphall, J. Werner, A. Fracalossi, and G. S. Salvador, "A Cloud Computing Solution for Patient ' s Data Collection in Health Care Institutions," no. ii, pp. 95-99, 2010.
- J. S. Sengar, "SURVEY : Reputation and Trust Management in VANETs," Int. J. Grid Distrib. Comput., vol. 8, no. 4, pp. 301-306, 2015.
- S. Bouchenak, G. Gheorghe, G. Chockler, H. Chockler, and A. Shraer, "Verifying Cloud Services: Present and Future," ACM SIGOPS Oper. Syst. Rev., vol. 27, no. 2, pp. 6-19, 2013.
- N. Sasikaladevi, "Trust Based Cloud Service Composition Framework," Int. J. Grid Distrib. Comput., vol. 9, no. 1, pp. 99-104, 2016.
- V. Saranya, S. Ramya, R. Kumar, and T. Nalini, "Efficient and Parallel Data Processing and Resource Allocation in the Cloud by u sing Nephele ' s Data Processing Framework," Int. J. Grid Distrib. Comput., vol. 9, no. 3, pp. 33-40, 2016.
- M. Irfan, M. Usman, Y. Zhuang, and S. Fong, "A Critical Review of Security Threats in Cloud Computing," in 2015 3rd International Symposium on Computational and Business Intelligence (ISCBI), 2015, pp. 105-111.
- P. Senthil, N. Boopal, and R. Vanathi, "Improving the Security of Cloud Computing using Trusted Computing Technology," Int. J. Mod. Eng. Res., vol. 2, no. 1, pp. 320-325, 2012.
- F. S. Al-anzi, A. A. Salman, and N. K. Jacob, "New Proposed Robust, Scalable and Secure Network Cloud Computing Storage Architecture," no. May, pp. 347-353, 2014.
- 9 1234567890 ''"" 1st International Conference on Big Data and Cloud Computing (ICoBiC) 2017 IOP Publishing IOP Conf. Series: Journal of Physics: Conf. Series 1018 (2018) 012006 doi :10.1088/1742-6596/1018/1/012006
- V. Akshaya and T. Purusothaman, "Business Intelligence as a Service in Analysis of Academic Courses," Int. J. Appl. Eng. Res., vol. 11, no. 4, pp. 2458-2467, 2016.
- S. Kai, T. Shigemoto, T. Kito, S. Takemoto, and T. Kaji, "Development of Qualification of Security Status Suitable for Cloud Computing System," in Proceedings of the 4th international workshop on Security measurements and metrics -MetriSec '12, 2012, p. 17.
- M. M. A. Ghosh, R. R. Atallah, and S. S. A. Naser, "Secure Mobile Cloud Computing for Sensitive Data: Teacher Services for Palestinian Higher Education Institutions," Int. J. Grid Distrib. Comput., vol. 9, no. 2, pp. 17-22, 2016.
- K.-F. Ho, H. Hirai, Y.-H. Kuo, H. Meng, and K. Tsoi, "Indoor Air Monitoring Platform and Personal Health Reporting System: Big Data Analytics for Public Health Research," in 2015 IEEE International Congress on Big Data, 2015, no. 2, pp. 309-312.
- A. Priya, T. Meena, and M. Devi, "Efficient Approach for Data Retrievability on Cloud Storage Systems," IJSRSET, vol. 2, no. 2, pp. 408-412, 2016.
- H. Suo, Z. Liu, J. Wan, and K. Zhou, "Security and Privacy in Mobile Cloud Computing," in 2013 9th International Wireless Communications and Mobile Computing Conference (IWCMC), 2013, pp. 655-659.
- R. Kumar and S. Rajalakshmi, "Mobile Cloud Computing: Standard Approach to Protecting and Securing of Mobile Cloud Ecosystems," in Proceedings -2013 International Conference on Computer Sciences and Applications, CSA 2013, 2013, pp. 663-669.
- P. Srivastava, "Multiple Key Based Architecture to Secure Cloud Database," vol. 4, no. September, pp. 1-7, 2015.
- N. Ahmed and A. Abraham, "Modeling Security Risk Factors in a Cloud Computing Environment," J. Inf. Assur. Secur., vol. 8, no. 2013, pp. 279-289, 2013.
- S. Mazur, E. Blasch, Y. Chen, and V. Skormin, "Mitigating Cloud Computing security risks using a self-monitoring defensive scheme," Aerosp. Electron. Conf. (NAECON), Proc. 2011 IEEE Natl., pp. 39-45, 2011.
- P. Rohmeyer and T. Ben-zvi, "Managing Cloud Computing Risks in Financial Services Institutions," in 2015 Proceedings of PICMET '15: Management of the Technology Age, 2015, pp. 519-526.
- K. Hashizume, D. Rosado, E. Fernández-Medina, and E. Fernandez, "An analysis of security issues for cloud computing," J. Internet Serv. Appl., vol. 4, no. 5, pp. 1-13, 2013.
- D. G. Rosado, R. Gómez, D. Mellado, and E. Fernández-Medina, "Security Analysis in the Migration to
- Kashyap Rajesh and Sarika Sharma, "Security Challenges and Issues in Cloud Computing - The Way Ahead," Int. J. Innov. Res. Adv. Eng., vol. 2, no. 9, pp. 32-35, 2015.
- B. S. Al-Attab and H. S. Fadewar, "Security Issues and Challenges in Cloud Computing," Int. J. Emerg. Sci. Eng., vol. 2, no. 7, pp. 22-26, 2014.
- H. T. Dinh, C. Lee, D. Niyato, and P. Wang, "A Survey of Mobile Cloud Computing : Architecture , Applications , and Approaches," Wirel. Commun. Mob. Comput. -, no. Cc, pp. 1-38, 2013.
- M. Vermaat, S. Sebok, S. Freund, J. Campbell, and M. Frydenberg, Discovering Computers 2016: Tools, Apps, Devices, and the Impact of Technology. 2016.
- M. I. M. Hanifah, R. C. Omar, N. H. N. Khalid, A. Ismail, I. S. Mustapha, I. N. Z. Baharuddin, R. Roslan, and W. M. Z. Zalam, "Integrated Geo Hazard Management System in Cloud Computing Technology," IOP Conf. Ser. Mater. Sci. Eng., vol. 160, p. 12081, 2016.
- A. A. Soofi and M. I. Khan, "Encryption Techniques for Cloud Data Confidentiality," Int. J. Grid Distrib. Comput., vol. 7, no. 4, pp. 11-20, 2014. 10 1234567890 ''"" 1st International Conference on Big Data and Cloud Computing (ICoBiC) 2017 IOP Publishing IOP Conf. Series: Journal of Physics: Conf. Series 1018 (2018) 012006 doi :10.1088/1742-6596/1018/1/012006
- D. Tse, "Challenges on Privacy and Reliability in Cloud Computing Security," in International Conference on Information Science, Electronics and Electrical Engineering (ISEEE), 2014, 2014, pp. 1181-1187.
- L. Xu and J. Li, "Building Efficient Resource Management Systems in the Cloud : Opportunities and Challenges," Int. J. Grid Distrib. Comput., vol. 9, no. 3, pp. 157-172, 2016.
- B. Al-shargabi and O. Sabri, "A study of Adopting Cloud Computing from Enterprise Perspective using Delone and Mclean IS Success Model," Int. J. Comput. Sci. Inf. Secur., vol. 14 S1, no. February, p. 5500, 2016.
- A. Khrisna and Harlili, "Risk Management Framework with COBIT 5 and Risk Management Framework for Cloud Computing Integration," in 2014 International Conference of Advanced Informatics: Concept, Theory and Application (ICAICTA) Risk, 2014, pp. 103-108.