A Review on Cloud Computing Security: Issues and Solutions

Amit R. Gadekar, Dr. M. V. Sarode

Abstract


The word Cloud came into focus from the graphic that was often used to show the heterogeneous networks and complex infrastructure. Cloud computing is the next generation networks which is soon going to revolutionize the computing world. Security in Cloud computing is an important issue and critical parameters, and has number of issues and problem related to it. Cloud service provider and the cloud service consumer should make sure that the cloud is safe enough from all the external threats so that the customer does not face any problem such as loss of data or data theft. There is also a chance where a misbehaviors user can affect the cloud by impersonating a legitimate user, thus creating problem to the entire cloud and affects many more customers who are sharing the affected cloud. This paper works on security issues in cloud computing as well as related security concerns suggested in literature.

Full Text:

PDF

References


The NIST Definition of Cloud Computing, version 15, by Peter Mell and Tim Grance, October 7, 2009, National Institute of Standards and Technology (NIST), Information Technology Laboratory (www.csrc.nist.gov)

Santosh Kumar and R. H. Goudar “Cloud Computing – Research Issues, Challenges, Architecture, Platforms and Applications: A Survey” in International Journal of Future Computer and Communication, Vol. 1, No. 4, December 2012.

Prince Jain “Security Issues and their Solution in Cloud Computing” in International Journal of Computing & Business Research.

Ali Gholami and Erwin Laure “SECURITY AND PRIVACY OF SENSITIVE DATA IN CLOUD COMPUTING: A SURVEY OF RECENT DEVELOPMENTS ” in Computer Science & Information Technology (CS & IT).

N. Santos, K. P. Gummadi, and R. Rodrigues, “Towards trusted cloud computing,” in Proceedings of the 2009 Conference on Hot Topics in Cloud Computing, HotCloud’09, (Berkeley, CA, USA), USENIX Association, 2009.

T. Garfinkel, B. Pfaff, J. Chow, M. Rosenblum, and D. Boneh, “Terra: A virtual machine-based platform for trusted computing,” in Proceedings of the Nineteenth ACM Symposium on Operating Systems Principles, SOSP ’03, (New York, NY, USA), pp. 193–206, ACM, 2003.

R. Velumadhava Rao and K. Selvamanib “Data Security Challenges and Its Solutions in Cloud Computing” in International Conference on Intelligent Computing, Communication & Convergence (ICCC-2014).

Manpreet Kaur and Hardeep Singh “ A REVIEW OF CLOUD COMPUTING SECURITY ISSUES” in International Journal of Advances in Engineering & Technology, June, 2015.

S. Venkata Krishna Kumar and S.Padmapriya “A Survey on Cloud Computing Security

ThreatsandVulnerabilities”in

INTERNATIONAL JOURNAL OF INNOVATIVE RESEARCH IN ELECTRICAL, ELECTRONICS, INSTRUMENTATION AND CONTROL ENGINEERING Vol. 2, Issue 1, January 2014.

Muhammad Kazim and Shao Ying Zhu “A survey on top security threats in cloud computing” in (IJACSA) International Journalof Advanced Computer Science and

Applications,Vol. 6, No. 3, 2015.

P. R. Jaiswal and A. W. Rohankar

“Infrastructure as a Service: Security Issues in Cloud Computing” in IJCSMC, Vol. 3, Issue. 3, March 2014, pg.707 – 711.

R. Chow, P. Golle, M. Jakobsson, E. Shi, J. Staddon, R. Masuoka, and J. Molina, “Controlling data in the cloud: outsourcing computation without outsourcing control,” in Proceedings of the 2009 ACM workshop on Cloud computing security. ACM, 2009, pp. 85–90.

T. Takebayashi, H. Tsuda, T. Hasebe, and R. Masuoka, “Data loss prevention technologies,” Fujitsu Scientific and Technical Journal, vol. 46, no. 1, pp. 47–55, 2010.

S. Roschke, F. Cheng, and C. Meinel, “Intrusion detection in the cloud,” in Dependable, Autonomic and Secure Computing, 2009. DASC’09. Eighth IEEE International Conference on. IEEE, 2009, pp. 729–734.

“Cloud controls matrix (ccm), cloud security alliance,” https://cloudsecurityalliance.org/research/ccm/, last Accessed: 2014-12-02.

S.O. Kuyoro, F. Ibikunle, and O. Awodele, “Cloud Computing Security Issues and Challenges,” in International Journal of Computer Networks, vol. 3, issue 5, pp. 247-255, 2011.

E. Nurmi, R. Wolski, C. Grzegorczyk, G. Obertelli, S. Soman, L. Youseff, and D. Zagorodnov, “The Eucalyptus Open-Source Cloud- Computing System,” Cluster Computing and the Grid, IEEE International Symposium on, vol. 0, pp. 124–131, 2009.

N. Mimura Gonzalez, M. Torrez Rojas, M. Maciel da Silva, F. Redigolo, T. Melo de Brito Carvalho, C. Miers, M. Naslund, and A. Ahmed, “A framework for authentication and authorization credentials in cloud computing,” in Trust, Security and Privacy in Computing and Communications (TrustCom), 2013 12th IEEE International Conference on, pp. 509–516, July 2013.

B. Tang, R. Sandhu, and Q. Li, “Multi-tenancy authorization models for collaborative cloud services,” in Collaboration Technologies and Systems (CTS), 2013 International Conference on, pp. 132–138, May 2013.

Manas M, Nagalakshmi and Shobha, “Cloud Computing Security Issues And Methods to Overcome,” in International Journal of Advanced Research in Computer and

Communication Engineering Vol. 3, Issue 4, April 2014.

N. Padia and M. Parekh, “Cloud Computing Security Issues, in Enterprise Architecture and Its Solutions,” International Journal of Computer Application, vol.2, issue 1, pp. 149-155, December 2011.

Cachin,C.Keidar,I. and Shraer,A. 2009.Trusting the cloud.SIGACT News 40,2,81-86.

Papamanthou, C., Tamassia, R., and Triandopoulos, N. 2008. Authenticated hash tables. In CCS ’08: Proceedings of the 15th ACM conference on Computer and communications security. ACM, New York,

NY, USA, 437–448. http://www.levelcloud.net/why-levelcloud/cloud -education-center/advantages-and-disadvantages -of-cloud-computing/

https://www.skyhighnetworks.com/cloud-securi ty-blog/11-advantages-of-cloud-computing-and-how-your-business-can-benefit-from-them/

https://www.lifewire.com/cloud-computing-exp lained-2373125


Refbacks

  • There are currently no refbacks.


Copyright © IJETT, International Journal on Emerging Trends in Technology