Academia.eduAcademia.edu

Outline

Security Issues On Cloud Computing

2014

Abstract

Cloud Computing has emerged as a new technique for delivering services over the internet. It is earning popularity over traditional information processing system for storing and processing huge volume of data. The cloud makes it possible for users to access their information from anywhere at any time. This is especially helpful for business that can't afford the same amount of hardware and storage space as a bigger company. Small companies can store their information in the cloud, removing the cost of purchasing and storing memory devices. The organization who uses cloud to store their private data, they are concerned about the security, trust and privacy issues related to its adoption. In this paper we recognize the roles of security and trust in cloud computing environments from the viewpoint of organization who would hand over their private information to the cloud computing provider.

References (12)

  1. Iyer, B. & Henderson, J.C. (2010). Preparing for the future: understanding the seven capabilities of cloud computing. MIS Quarterly Executive, 9, 117-131.
  2. R. R.Buyya, R.Ranjan, Intercloud: Utility-oriented federation of cloud computing environments for scaling of application services, in: ICA3PP 2010, Part I, LNCS 6081., 2010, pp. 13-31.
  3. Thomas Ristenpart, Eran Tromer, Hovav Shacham, Stefan Savage, "Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds," presented at the Proceedings of the 16th ACM conference on Computer and communications security, Chicago, Illinois, USA, 2009.
  4. G. Reese, Cloud Application Architectures: Building Applications and Infrastructure in the Cloud, in: Theory in Practice, O'Reilly Media, 2009.
  5. B. Rajkumar, C. Yeo, S. Venugopal, S. Malpani, Cloud computing and emerging IT platforms: vision, hype, and reality for delivering computing as the 5 th utility, Future Generation Computer Systems (2009).
  6. National Institute of Standards and Technology, The NIST Definition of Cloud Computing, Information Technology Laboratory, 2009.
  7. Cloud Security Alliance. Top threats to cloud computing, Cloud Security Alliance, 2010.
  8. R. Sherman, Distributed systems security, Computers & Security 11 (1) (1992).
  9. D. Polemi, Trusted third party services for health care in Europe, Future Generation Computer Systems 14 (1998) 51-59.
  10. S. Castell, Code of practice and management guidelines for trusted third party services, INFOSEC Project Report S2101/02, 1993.
  11. Commission of the European Community. Green paper on the security of information systems, ver. 4.2.1, 1994.
  12. International Telecommunication Union, X-509 | ISO/IEC 9594-8, The directory: Public-key and attribute certificate frameworks, ITU, X-Series, 2001.