Abstract
Cloud security and service assurance is a wide research area with an unrestrained amount of apprehensions, ensuring equipment and stage innovations, to secure information and asset access. In spite of the colossal advantages of Cloud computing paradigm, the security and service concerns have consistently been the center of various Cloud clients and obstruction to its extensive acceptance. The paper reports a meticulous review in the field of Cloud computing with a focus on the security risk assessment and service assurance. This effort will serve as a ready reckoner to the research aspirants to encompass a general thought of the risk factors in security and the service assurance in a Cloud environment.









Similar content being viewed by others
References
Abraham A, Thomas J, Ghinea G (2003) Mining network quality of service for human computer interaction using neural networks. In: Proceedings of the 10th International Conference on Human–Computer Interaction; 2003 Jun 23–27; Crete, Greece; p 1193–1197
Ayala L, Vega M, Vargas L (2013) Emerging threats, risk and attacks in distributed systems: Cloud computing. Lect Notes Electr Eng 152:37–52
Balepin I, Maltsev S, Rowe J, Levitt K (2003) Using specification-based intrusion detection for automated response. Lect Notes Comput Sci 2820:136–154
Barron C,Yu H, Zhan J (2013) Cloud computing security case studies and research. In: Proceedings of World Congress on Engineering, 2013 Jul 3–5; London, UK; pp 1–5
Bellovin S, Blaze M, Diffie W, Landau S, Neumann P, Rexford J (2008) Risking communications security: potential hazards of the protect America act. IEEE Secur Priv 6(1):24–33
Bisong A, Rahman S (2011) An overview of the security concerns in enterprise Cloud computing. Int J Netw Secur Appl 3(1):30–45
Brown E (2012) NIST issues Cloud computing guidelines for managing security and privacy: National Institute of Standards and Technology Special Publication; 2012. p. Report No.: 800-144
Chen D, Zhao H (2012) Data Security and privacy protection issues in Cloud computing. In: Proceedings of International Conference Computer Science and Electronics Engineering, 2012 Mar 23–25; Hangzhou; pp 647–651
Chhetri M, Vo Q, Kowalczyk R (2012) Policy-based automation of SLA establishment for Cloud computing services. 12th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing; 2012 May 13–16; Ottawa, Canada; pp 164–171
Cloud Security Alliance CSA: The Notorious Nine Cloud Computing Threats, 2013; pp 1–21. https://cloudsecurityalliance.org/ download/the-notorious-nine-Cloud-computing-top-threats-in-2013/
Cronin E, Sherr M, Blaze M (2008) On the (un)reliability of eavesdropping. Int J Secur Netw 3(2):103–113
Dahbur K, Mohammad B (2011) A survey of risks, threats and vulnerabilities in Cloud computing. In: Proceedings of International Conference on Intelligent Semantic Web-Services and Applications, 2011 Apr. 18–20; Amman, Jordan; pp 1–6
Debar H, Dacier M, Wespi A (1999) Towards a taxonomy of intrusion-detection systems. Comput Netw Int J Comput Telecommun Netw 31(8):805–822
Deshpande P, Sharma S. Peddoju S, Abraham A (2013) Distributed port scan attack in Cloud environment. In: Proceedings of the Fifth International Conference on Computational Aspects of Social Networks, 2013 Aug 12–14; Fargo, ND; pp 27–31
Deshpande P, Sharma S, Sateeshkumar P, Junaid S (2014a) HIDS: an host based intrusion detection system. Int J Syst Assur Eng Manag. doi:10.1007/s13198-014-0277-7
Deshpande P, Sharma S, Peddoju S (2014b) Implementation of a private Cloud: a case study. Adv Int Syst Comput 259:635–647
Goudarzi H, Ghasemazar M, Pedram M (2012) SLA-based optimization of power and migration cost in Cloud computing. 12th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing; 2012 May 13–16; Ottawa, Canada; pp 172–179
Harauz J, Kauifman M, Potter B (2009) Data security in the world of Cloud computing. IEEE Secur Priv 7(4):61–64
Hashizume K, Rosado D, Medina E, Fernandez E (2013) An analysis of security issues for Cloud computing. J Integr Serv Appl 4(5):1–13
Ho J, Woo P, Ho E, Myoung C (2011) Multi-level intrusion detection system and log management in Cloud computing. In: Proceedings of 13th International Conference on Advanced Communication Technology, 2011 Feb 13–16; Seoul; pp 552–555
Hou Q, Xie Q, Li S (2016) The model of information security risk assessment based on advanced evidence theory. Int J Syst Assur Eng Manag. doi:10.1007/s13198-016-0424-4
Iyengar S, Ganapathy G, Kumar M, Abraham A (2014) A multilevel thrust filtration defending mechanism against DDoS attacks in Cloud computing environment. Int J Grid Util Comput 5(4):236–248
Jansen W, Grance T (2011) Guidelines on security and privacy in public Cloud computing, 2011 Dec 09. p. NIST SP - 800-144
Julisch K, Hall M (2010) Security and control in the Cloud. Inf Secur J Glob Perspect 19(6):299–309
Kalyanaraman R (2007) A rule based static configuration validation technique in an autonomous distributed environment. In: Proceedings of Second International Conference on Systems, 2007 Apr 22–28; Martinique; p 53
Karlin J, Forrest S, Rexford J (2008) Autonomous security for autonomous systems. Comput Netw: Int J Comput Telecommun 52(15):2908–2923
Kaufman L (2009) Data security in the world of Cloud computing. IEEE Secur Priv 7(4):61–64
Khajeh A, Sommerville I, Bogaerts J, Teregowda P (2011) Decision support tools for Cloud migration in the enterprise. In: Proceedings of IEEE International Conference on Cloud Computing, 2011 July 4–9; Washington, DC; pp 541–548
Kim J, Tong L, Thomas R (2014) Data framing attack on state estimation. IEEE J Sel Areas Commun 32(7):1460–1470
Kruegel C, Valeur F, Vigna G (2005) Intrusion detection and correlation-challenges and solutions. Advances in information security. Springer, New York
Lo C, Huang C, Ku J (2010) A cooperative IDS framework for Cloud computing network. In: Proceedings of 39th International Conference on parallel processing workshops, 2010 Sep 13–16; San Diego, CA; pp 280–284
Noureddin A, Damodaran M (2008) Security in Web 2.0 application development. In: Proceedings of the 10th International Conference on Information Integration and Web-based Applications and Services, 2008 Nov 24–26; Linz, Austria; pp 681–685
Oberle K, Cherubini D, Cucinotta T (2013) End-to-end service quality for Cloud applications. Lect Notes Comput Sci 8193:228–243
Ostermann S, Iosup A, Yigitbasi N, Prodan R, Fahringer T, Eperna D (2010) A performance analysis of EC2 Cloud computing services for scientific computing. LNICST 34:115–131
Pengye X, Gary S (2010) Distributed joint optimization of traffic engineering and server selection. In: Proceedings of 18th International Packet Video Workshop, 2010 Dec 13–14; Hong Kong; pp 86–93
Rane P Securing SaaS applications: A Cloud security perspective for application providers [Internet]. http://www.Infosectoday.com/Articles/Securing_SaaS_Applications.htm
Ren K, Wang C, Wang Q (2012) Security challenges for the public Cloud. IEEE J Internet Comput 16(1):69–73
Rosado D, Gomez R, Mellado D, Medina E (2012) Security analysis in the migration to Cloud environment. J Future Internet 4(2):469–487
Shangguang W, Zhipiao L, Qibo S, Hua Z, Fangchun Y (2014) Towards an accurate evaluation of quality of Cloud service in service-oriented Cloud computing. J Intell Manuf 25(2):283–291
Shanmughaneethi S, Shyni S, Swamynathan S (2009) SBSQLID: Securing web applications with service based SQL injection detection. In: Proceedings of International Conference on Advances in Computing, Control, & Telecommunication Technologies, 2009 Dec 28–29; Tiruanantpuram, India; pp 702–704
Sklavos N, Koufopavlou O (2004) Computer network security: report from MMM-ACNS. IEEE Secur Priv 2(1):49–52
Subashini S, Kavitha V (2011) A survey on security issues in service delivery models of Cloud computing. J Netw Comput Appl 34(1):1–11
Takabi H, Joshi J, Ahn G (2010) Security and privacy challenges in Cloud computing environments. IEEE Secur Priv 8(6):24–31
Trabelsi Z, Rahemani H, Kamel K, Mounir M (2004) Malicious sniffing system detection platform. In: Proceedings of International Symposium on Applications and the Internet, 2004 Jan 26–30; Tokyo, Japan; pp 201–207
Tran H, Mellouk A, Perez J, Hoceini S, Zeadally S (2014) QoE-based server selection for content distribution networks. IEEE Trans Comput 63(11):2803–2815
Verwoerd T, Hunt R (2002) Intrusion detection techniques and approaches. Comput Commun 25(15):1356–1365
Vieira K, Schulter A, Westphall C, Westphall C (2010) Intrusion detection techniques for Grid and Cloud computing environment. IT Prof 12(4):38–43
Wang L, Tao J, Kunze M, Castellanos A, Kramer D, Karl W (2008) Scientific Cloud computing: Early definition and experience. In: Proceedings of 10th IEEE International Conference on High Performance Computing and Communication, 2008 Sept 25–27; Dalian, Chaina; pp 825–830
Web2.0/SaaS Security, Tokyo Research Laboratory, IBM Research[Internet]. http://www.trl.ibm.com/projects/web20sec/web20sec_e.htm date accessed?
Wu L, Garg S, Buyya R (2011) SLA-based resource allocation for software as a service provider (SaaS) in Cloud computing environments. In: Proceedings of 11th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing; 2011 May 23–26; Newport, CA, USA; pp 195–204
Xu J, Zhengnan L, Shuqin L, Bin Q, Gexu T (2015) A Cloud-user behavior assessment based dynamic access control model. Int J Syst Assur Eng Manag. doi:10.1007/s13198-015-0411-1
Yaar A, Perrig A, Song D (2006) StackPi: new packet marking and filtering mechanisms for DDoS and IP spoofing defense. IEEE J Sel Areas Commun 24(10):1853–1863
Youseff L, Seymour K, You H, Dongarra, J, Wolski R (2008) The impact of paravirtualized memory hierarchy on linear algebra computational kernels and software. In: Proceedings of the 17th International symposium on high performance distributed computing, 2008 Jun 23–27; Boston, MA; pp 141–152
Zhang X, Wuwong N, Hao L, Zhang X (2010) Information Security Risk Management Framework for the Cloud Computing Environments. In: Proceedings of 10th International Conference on Computer and Information Technology, 2010 Jul 1; Bradford; pp 1328–1334
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Deshpande, P., Sharma, S.C., Peddoju, S.K. et al. Security and service assurance issues in Cloud environment. Int J Syst Assur Eng Manag 9, 194–207 (2018). https://doi.org/10.1007/s13198-016-0525-0
Received:
Revised:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s13198-016-0525-0