Skip to main content

On Cloud Computing Security Issues

  • Conference paper
Book cover Intelligent Information and Database Systems (ACIIDS 2012)

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 7197))

Included in the following conference series:

Abstract

The cloud is a next generation platform that provides dynamic resource pools, virtualization, and high availability. The concept of cloud computing is using a virtual centralization. This means, in one part, we have a full control on data and processes in his computer. On the other part, we have the cloud computing where the service and data maintenance is provided by vendors. The client or customers usually unaware about the place where processes are running or the data is stored. So, logically speaking, the client has no control over it. This is the reason cloud computing facing so many security challenge. In this paper, we presented selection issues in cloud computing and focus on the security issues. There are four cloud computing security issues that will be focused, namely XML signature, browser security, cloud integrity and binding issues and flooding attacks. Data security on the cloud side is not only focused on the process of data transmission, but also the system security and data protection for those data stored on the storages of the cloud side. There are some considerations that need to be focused in order to achieve better safe environment in cloud computing such as storage and system protection and data protection. In order to achieve better performance in security, cloud computing needs to fulfill five goals which are availability, confidentiality, data integrity, control and audit. By implementing these goals, we hope data security in cloud computing will be more secure. We also hope that cloud computing will have a bright future with arise of a large number of enterprises and will bring an enormous change in the Internet since it is a low-cost supercomputing to provide services.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Armbrust, M., Fox, A., Griffith, R., Joseph, A.D., Katz, R.H., Konwinski, A., Lee, G., Patterson, D.A., Rabkin, D., Stoica I., Zaharia, M.: Above the clouds: A Berkeley view of cloud computing. Technical report UC Berkeley Reliable Adaptive Distributed Systems Laboratory (2009)

    Google Scholar 

  2. Minqi, Z., Rong, Z., Wei, X., Weining, Q., Aoying, Z.: Security and Privacy in Cloud Computing: A Survey. In: The Proceeding of Sixth International Conference of Semantics Knowledge and Grid (SKG 2010), pp. 105–112 (2010)

    Google Scholar 

  3. Chang-Lung, T., Uei-Chin, L., Chang, A.Y., Chun-Jung, C.: Information security issue of enterprises adopting the application of cloud computing. In: The Proceeding of Sixth International Conference Networked Computing and Advanced Information Management (NCM 2010), pp. 645–649 (2010)

    Google Scholar 

  4. Tharam, D., Chen, W., Elizabeth, C.: Cloud computing: issues and challenges. In: The Proceeding of 24th IEEE International Conference on Advanced Information Networking and Applications AINA, pp. 27–33 (2010)

    Google Scholar 

  5. http://searchcloudcomputing.techtarget.com/definition/cloud-computing

  6. Pooja, T.: Demystifying Cloud Computing, http://www.technology-digital.com/blogs/editor/demystifying-cloud-computing (retrieved on January13, 2011)

  7. Jianfeng, Y., Zhibin, C.: Cloud Computing Research and Security Issues. In: The Proceeding of International Conference on Computational Intelligence and Software Engineering (CiSE), pp. 1–3 (2010)

    Google Scholar 

  8. Brockmeier, J.: Eucalyptus Completes Amazon Web Services Specs with Latest Release, http://ostatic.com/blog/eucalyptus-completesamazon-web-services-specs-with-latest-release (retrieved on January 17, 2011)

  9. Open Cloud Consortium, http://opencloudconsortium.org/home/ (retrieved on January 17, 2011)

  10. Bardin, J.: Security Guidance for Critical Areas of Focus in Cloud Computing, www.cloudsecurityalliance.org/guidance/csaguide.pdf (retrieved on January 13, 2011)

  11. Brodkin, J.: Gartner: Seven cloud-computing security risks, http://www.infoworld.com/d/security-central/gartner-seven-cloud-computingsecurity-risks-853 (retrieved on January 11, 2011)

  12. Gantz, J.F., Chute, C., Manfrediz, A., Minton, S., Reinsel, D., Schlichting, W., Toncheva, A.: The diverse and exploding digital universe, IDC Future Report, 1–12 (2008)

    Google Scholar 

  13. Jensen, M., Schwenk, J., Gruschka, N., Iacono, L.L.: On Technical Security Issues in Cloud Computing Cloud Computing. In: The Proceeding of IEEE International Conference on Cloud Computing CLOUD 2009, pp. 109–116 (2009)

    Google Scholar 

  14. Somani, U., Lakhani, K., Mundra, M.: Implementing digital signature with RSA encryption algorithm to enhance the Data Security of cloud in Cloud Computing. In: The Proceeding of 1st International Conference on Parallel Distributed and Grid Computing (PDGC 2010), pp. 211–216 (2010)

    Google Scholar 

  15. Wood, K., Pereira, E.: An investigation into cloud configuration and security. In: The Proceeding of International Conference Internet Technology and Secured Transactions (ICITST), pp. 1–6 (2010)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Che Fauzi, A.A., Noraziah, A., Herawan, T., Mohd. Zin, N. (2012). On Cloud Computing Security Issues. In: Pan, JS., Chen, SM., Nguyen, N.T. (eds) Intelligent Information and Database Systems. ACIIDS 2012. Lecture Notes in Computer Science(), vol 7197. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-28490-8_58

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-28490-8_58

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-28489-2

  • Online ISBN: 978-3-642-28490-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics