Academia.eduAcademia.edu

Outline

Security Issues and Challenges in Cloud Computing

2015, IARJSET

https://doi.org/10.17148/IARJSET.2015.21225

Abstract

Cloud computing is a promising technology to facilitate the development of large-scale, on-demand, flexible computing infrastructures. Cloud computing has formed the conceptual and infrastructural basis for tomorrow's computing. Cloud based services and service providers are being evolved which has resulted in a new business trend based on cloud technology. But without security embedded into innovative technology that supports cloud computing, businesses are setting themselves up for a fall. The trend of frequently adopting this technology by the organization automatically introduced new risk on top of existing risk. Obviously, putting everything into a single box i.e. into the cloud will only make it easier for hacker. Cloud service provider and the cloud service consumer should make sure that the cloud is safe enough from all the external threats so that the customer does not face any problem such as loss of data or data theft. This paper presents an overview and the study of the cloud computing along with several securities and challenging issues.

References (13)

  1. Barrie Sosinsky -Cloud Computing Bible: Wiley Publishing, Inc.
  2. Ronald L.Krutz and Russell Dean Vines -Cloud Security: A Comprehensive Guide to Secure Cloud Computing.
  3. Christian Baun, Marcel Kunze, Jens Nimis and Stefan Tai -Cloud Computing: Web-based Dynamic IT Services.
  4. Rajkumar Buyya, James Broberg, Andrzej Goscinski -Cloud Computing: Principles and Paradigms.
  5. A.Agarwal -The Security Risks Associated with Cloud Computing -International Journal of Computer Applications in Engineering Sciences, 2012.
  6. Mahbub Ahmed, "Above the Trust and Security in Cloud Computing: A Notion towards Innovation" - IEEE International Conference on Embedded and Ubiquitous Computing, 2013.
  7. Michael glas and paul Andres, "An Oracle white paper in enterprise architectureachieving the cloud computing vision", CA-U.S.A, Oct 2010.
  8. Kevin Hamlen, Murat Kantarcioglu, Latifur Khan, Bhavani Thuraisingham, Security Issues for Cloud Computing, International Journal of Information Security and Privacy, 4(2), 39-51, University of Texas, USA, April-June 2010.
  9. Joachim Schaper, 2010, "Cloud Services", 4th IEEE International Conference on DEST,Germany.
  10. Dr. Gurdev Singh, Shanu Sood, Amit Sharma, "CM-Measurement Facets for Cloud Performance", IJCA, , Lecturer, Computer science & Engineering, Eternal University, Baru Sahib (India), Volume 23 No.3, June 2011.
  11. R. Gellman, "Privacy in the clouds: Risks to privacy and confidentiality from cloud computing," The World Privacy Forum, 2009. http://www.worldprivacyforum.org/pdf/WPF_Cloud_ Privacy_Report.pdf.
  12. Dukaric, R. and Juric, M.B. (2013). Towards a unified taxonomy and architecture of cloud frameworks. Future Generation Computer Systems, 29, 1196-1210. doi:10.1016/j.future.2012.09.006
  13. Emam, A.H.M. (2013). Additional Authentication and Authorization using Registered Email-ID for Cloud Computing. International Journal of Soft Computing and Engineering, 3(2), 110-113.