Skip to main content

Factors Influencing Security Issues in Cloud Computing

  • Conference paper
  • First Online:
Advanced Communication and Intelligent Systems (ICACIS 2022)

Abstract

Computing is a new computing paradigm that enables firms to do this without making a huge initial investment. Despite the potential advantages of cloud technology, modeling security remains a worry, limiting cloud model adoption. Additional factors such as prototype model, multi-tenancy, adaptability, and the tiered dependency stacking have been introduced to the problem scope beneath the cloud model, increasing the complexity of the security threat. In this work, we examine the cloud security challenge in depth. We investigated the issue from the standpoint of a cloud system, cloud service delivery models, computing stakeholders, and cloud stakeholders.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 99.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 129.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Mell, P., Grance, T.: The NIST definition of cloud computing. National Institute of Standards and Technology. Information Technology Laboratory, Version, 15(10.07) (2009)

    Google Scholar 

  2. Gens, F., Mahowald, R.P., Richard, L.: Villars. 2009. IDC Cloud Computing 2010 (2010)

    Google Scholar 

  3. Almorsy, M., Grundy, J., Müller, I.: An analysis of the cloud computing security problem. arXiv preprint arXiv:1609.01107 (2016)

  4. Enisa, C.C.: Benefits, risks and recommendations for information security. Eur. Netw. Inform. Secur. 23, 1–6 (2009)

    Google Scholar 

  5. Stavinoha, K.E.: What is Cloud Computing and Why Do We Need It (2010). Retrieved 18 Sep 2015

    Google Scholar 

  6. Kandukuri, B.R., Rakshit, A.: Cloud security issues. In: 2009 IEEE International Conference on Services Computing, pp. 517–520. IEEE (2009)

    Google Scholar 

  7. Popović, K., Hocenski, Ž.: Cloud computing security issues and challenges. In: The 33rd International Convention Mipro, pp. 344–349. IEEE (2010)

    Google Scholar 

  8. Jensen, M., Schwenk, J., Gruschka, N., Iacono, L.L.: On technical security issues in cloud computing. In: 2009 IEEE International Conference on Cloud Computing, pp. 109–116. IEEE (2009)

    Google Scholar 

  9. Grobauer, B., Walloschek, T., Stocker, E.: Understanding cloud computing vulnerabilities. IEEE Secur. Priv. 9(2), 50–57 (2010)

    Article  Google Scholar 

  10. Subashini, S., Kavitha, V.: A survey on security issues in service delivery models of cloud computing. J. Netw. Comput. Appl. 34(1), 1–11 (2011)

    Article  Google Scholar 

  11. Ristenpart, T., Tromer, E., Shacham, H., Savage, S.: Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds. In: Proceedings of the 16th ACM conference on Computer and communications security, pp. 199–212 (2009)

    Google Scholar 

  12. Zhang, W., et al.: A comprehensive study of co-residence threat in multi-tenant public PaaS clouds. In: Lam, K.-Y., Chi, C.-H., Qing, S. (eds.) ICICS 2016. LNCS, vol. 9977, pp. 361–375. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-50011-9_28

    Chapter  Google Scholar 

  13. Tajadod, G., Batten, L., Govinda, K.: Microsoft and Amazon: a comparison of approaches to cloud security. In: 4th IEEE International Conference on Cloud Computing Technology and Science Proceedings, pp. 539–544. IEEE (2012)

    Google Scholar 

  14. Holstein, D.K., Stouffer, K.: Trust but verify critical infrastructure cyber security solutions. In: 2010 43rd Hawaii International Conference on System Sciences, pp. 1–8. IEEE (2010)

    Google Scholar 

  15. Zhang, W.: Integrated security framework for secure web services. In: 2010 Third International Symposium on Intelligent Information Technology and Security Informatics, pp. 178–183. IEEE (2010)

    Google Scholar 

  16. Bin, W., Yuan, H.H., Xi, L.X., Min, X.J.: Open identity management framework for SaaS ecosystem. In: 2009 IEEE International Conference on e-Business Engineering, pp. 512–517. IEEE (2009)

    Google Scholar 

  17. Fong, E., Okun, V.: Web application scanners: definitions and functions. In: 2007 40th Annual Hawaii International Conference on System Sciences (HICSS’07), pp. 280b–280b. IEEE (2007)

    Google Scholar 

  18. Vaibhav, A., Shukla, D., Das, S., Sahana, S., Johri, P.: Security challenges, authentication, application and trust models for vehicular ad hoc network-a survey. IJ Wireless Microw. Technol. 3, 36–48 (2017)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Subrata Sahana .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Maheshwari, V., Sahana, S., Das, S., Das, I., Ghosh, A. (2023). Factors Influencing Security Issues in Cloud Computing. In: Shaw, R.N., Paprzycki, M., Ghosh, A. (eds) Advanced Communication and Intelligent Systems. ICACIS 2022. Communications in Computer and Information Science, vol 1749. Springer, Cham. https://doi.org/10.1007/978-3-031-25088-0_31

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-25088-0_31

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-25087-3

  • Online ISBN: 978-3-031-25088-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics