Security Problems in Cloud Computing
2016, International Journal of Recent Contributions from Engineering, Science & IT (iJES)
https://doi.org/10.3991/IJES.V4I4.6538Abstract
Cloud is a pool of computing resources which are distributed among cloud users. Cloud computing has many benefits like scalability, flexibility, cost savings, reliability, maintenance and mobile accessibility. Since cloud-computing technology is growing day by day, it comes with many security problems. Securing the data in the cloud environment is most critical challenges which act as a barrier when implementing the cloud. There are many new concepts that cloud introduces, such as resource sharing, multi-tenancy, and outsourcing, create new challenges for the security community. In this work, we provide a comparable study of cloud computing privacy and security concerns. We identify and classify known security threats, cloud vulnerabilities, and attacks.
References (36)
- National Institute of Standards and Technology's web site, last seen 28/12/2015.http://www.nist.gov/itl/cloud,
- B. Rex Cyril1, DR. S. Britto Ramesh Kumar2, July-2015Cloud Computing Data Security Issues, Challenges, Architecture and Methods-A Survey, International Research Journal of Engineer- ing and Technology (IRJET), Volume: 02 Issue: 04 |
- Ruchi U. Samudre, Prof. Vaishali R. Patel, Special Issue Septem- ber 2015Department of Information Technology SVM Institute of Technology Bharuch 392-001, Gujarat, India, A Survey on Secure Access and Storage of Data in Cloud Computing, International PAPER SECURITY PROBLEMS IN CLOUD COMPUTING Journal of Engineering Technology Science and Research IJETS R www.ijetsr.com ISSN 2394 -3386 Volume 2,
- Gonzalez, N.; Miers, C.; Redigolo, F.; Carvalho, T.; Simplicio, M.; Naslund, M.; Pourzandi, M. 1989.A quantitative analysis of current security concerns and solutions for cloud computing. In Proceedings of the 2011 IEEE Third International Conference on Cloud Computing Technology and Science (CloudCom), Athens, Greece, 29 November-1 December 2011; pp. 231-238.Science,
- Tripathi, A.; Mishra, A. Cloud computing security considerations. In Proceedings of the 2011 IEEE International Conference on Sig- nal Processing, Communications and Computing (ICSPCC), Xi'an, China, 14-16 September 2011; pp. 1-5 https://doi.org/10.1109/ICSPCC.2011.6061557
- Jain, P.; Rane, D.; Patidar, S. 2011A survey, and analysis of cloud model-based security for computing secure cloud bursting and ag- gregation in renal environment. In Proceedings of the World Con- gress on Information and Communication Technologies (WICT), Mumbai, India, 11-14 December 2011; pp. 456-461.
- Lv, H.; Hu, Y. 20-21 August 2011Analysis and research about cloud computing security protect policy. In Proceedings of the 2011 International Conference on Intelligence Science and Infor- mation Engineering (ISIE), Wuhan, China,; pp. 214-216. https://doi.org/10.1109/ISIE.2011.16
- Bhardwaj, A.; Kumar, V. 22-24 December 2011Cloud security assessment and identity management. In Proceedings of the 2011 14th International Conference on Computer and Information Technology (ICCIT), Dhaka, Bangladesh,; pp. 387-392., https://doi.org/10.1109/iccitechn.2011.6164819
- Mahmood, Z. 7-9 September 2011Data location and security issues in cloud computing. In Proceedings of the 2011 Internation- al Conference on Emerging Intelligent Data and Web Technolo- gies (EIDWT), Tirana, Albania,;
- 49-54. https://doi.org/10.1109/EIDWT.2011.16
- Karnwal, T.; Sivakumar, T.; Aghila, G. 1-2 March 2012A comber approach to protect cloud computing against XML DDoS and HTTP DDoS attack. In Proceedings of the 2012 IEEE Students' Conference on Electrical, Electronics and Computer Science (SCEECS), Bhopal, India,; pp. 1-5.
- Tripathi, A.; Mishra, 14-16 September 2011A. Cloud computing security considerations. In Proceedings of the 2011 IEEE Interna- tional Conference on Signal Processing, Communications and Computing (ICSPCC), Xi'an, China;
- 1-5. https://doi.org/10.1109/ICSPCC.2011.6061557
- Sengupta, S.; Kaulgud, V.; Sharma, V.S. USA, 4-9 July 2011Cloud computing security-Trends and research directions. In Proceedings of the 2011 IEEE World Congress on Services (SERVICES), Washington, DC; pp. 524-531. https://doi.org/10.1109/SERVICES.2011.20
- Chen, Z.; Yoon, J5-10 July 2010. IT auditing to assure a secure cloud computing. In Proceedings of the 2010 6th World Congress on Services (SERVICES-1), Miami, FL, USA,; pp. 253-259.
- Popovic, O.; Jovanovic, Z.; Jovanovic, N.; Popovic, R. 5-8 Octo- ber 2011;A comparison and security analysis of the cloud compu- ting software platforms. In Proceedings of the 2011 10th Interna- tional Conference on Telecommunication in Modern Satellite Ca- ble and Broadcasting Services (TELSIKS), Nis, Serbia, Volume 2, pp. 632-634. https://doi.org/10.1109/telsks.2011.6143192
- Holloway, I.; Todres, L. 2003The status of method: Flexibility, consistency and coherence. Qual. Res., 3, 345-357. https://doi.org/10.1177/1468794103033004
- Top Threats to Cloud Computing V1.0; Cloud Security Alliance: March 2010.
- Grosse, E.; Howie, J.; Ransome, J.; Reavis, J.; Schmidt, S. 2010Cloud computing roundtable. IEEE Secur. Priv., 8, 17-23. https://doi.org/10.1109/MSP.2010.173
- Bishop, M. Computer Security: Art and Science; Addison-Wesley, 2002, MA,USA,.
- Leandro, M.A.P.; Nascimento, T.J.; dos Santos, D.R.; Westphall, C.M.; Westphall, C.B2012. Multitenancy authorization system with federated identity for cloud-based environments using shib- boleth. In Proceedings of the Eleventh International Conference on Networks,; pp. 88-93.
- Sanchez, R.; Almenares, F.; Arias, P.; Diaz-Sanchez, D.; Marin, 2012A. Enhancing privacy and dynamic federation in IdM for consumer cloud computing. IEEE Trans. Consum. Electron., 58, 95-103 https://doi.org/10.1109/TCE.2012.6170060
- Jin Li, Jingwei Li, Xiaofeng Chen, Chunfu Jia and Wenjing Lou, 2013 Identity-based Encryption with Outsourced Revocation in Cloud Computing, IEEE
- Gul, I.; ur Rehman, A.; Islam, M.H. Cloud computing security auditing. In Proceedings of 2011 The 2nd International Confer- ence on Next Generation Information Technology (ICNIT), Gyeongju, Korea, 21-23 June 2011; pp. 143-148.
- Kandukuri, B.R.; Paturi, V.R.; Rakshit, 21-25 September 2009A. Cloud security issues. In Proceedings of the IEEE International Conference on Services Computing, 2009 (SCC '09), Bangalore, India,; pp. 517-520.
- Apoorva Rathi and Nilesh Parmar, 2014Secure Cloud Data Com- puting with Third Party Auditor Control, Springer International Publishing Switzerland 2015 S.C. Satapathy et al. (eds.), Proc. of the 3rd Int. Conf. on Front. of Intell. Comput. (FICTA),Vol. 2, Advances in Intelligent Systems and Computing 328, https://doi.org/10.1007/978-3-319-12012-6_17
- Thombare Kishor V1, Suryawanshi Nilesh D2, Patil Ganesh S3, April 2014Data Integrity Proof in Cloud Storage, International Journal of Emerging Technology and Advanced Engineering 2008 Certified Journal, Volume 4, Issue 4,),
- Zongmin Cui, Haitao Lv, Chao Yin, Guangyong Gao, Caixue Zhou 2015School of Information Science and Technology, Ef!cient key management for IOT owner in the cloud, IEEE Fifth International Conference on Big Data and Cloud Computing
- Shweta Mahajan#1 and Sachin Mahajan, MARCH 2015, Security in cloud computing, International Journal of Emerging Technolo- gy in Computer Science & Electronics (IJETCSE) ISSN: 0976- 1353 Volume 13 Issue 3.
- Ruchi U. Samudre1, Prof. Vaishali R. Patel2, September 2013,A Survey on Secure Access and Storage of Data in Cloud Compu- ting, International Journal of Engineering Technology Science and Research IJETSRwww.ijetsr.com ISSN 2394 -3386 Volume 2, Special Issue
- Meer Soheil Abolghasemi, Mahdi Mokarrami Sefidab, Reza Ebrahimi Atani, 2013. "Using Location Based Encryption to Im- prove the Security of Data Access in Cloud Computing", IEEE conference on Advances in Computing, Communications and In- formatics,
- Lo'aiTawalbeh,Nour S. Darwazeh, Raad S. AlQassas and Fahd AlDosari, 2015, "A Secure Cloud Computing Model based on Da- ta Classification", ELSEVIER.
- Sarika Gupta Sangita Rani Satapathy Piyush Mehta Anupam Tripathy, 2012, "A Secure and Searchable Data Storage in Cloud Computing", IEEE on International Advance Computing Confer- ence,.
- Mythili.K, Anandakumar.H, 2013, "Trust Management Approach for Secure and Privacy Data Access in Cloud Computing", IEEE conference on Green Computing, Communication and Conserva- tion of Energy,
- M. Sowmiya, M. Adimoolam, 2013 ,"Secure Cloud Storage Model with Hidden Policy Attribute based Access Control", IEEE conference on Recent Trends in Information Technolo
- Rola Motawie, Mahmoud M. El Kholy, Maged Heussien, Addres- ing security issue in cloud computing. European Journal of Scien- tific Research, Volume 138 Issue 2