ABSTRACT
Cloud computing is a rising paradigm for large scale infrastructures. Cloud computing is a technology that being hugely adopted by many organizations like Google, Microsoft, Facebook, Amazon so that the resources are available to multiple users at a time over the internet on demand at any place and any time. Cloud computing opens up a new world of opportunities for entrepreneurships for small company to large company, but with these opportunities there are numerous security challenges that need to be considered and addressed prior to migrating to a cloud computing. Security and privacy issues present a strong barrier for users to use Cloud Computing systems. The security problem of cloud computing is very important and it can prevent the quick development of cloud computing. We have discussed the related work done by different author in cloud security[10]. This paper discusses security issues necessities and challenges that cloud service providers (CSP)and user face in cloud atmosphere, and we also assess how security, trust and privacy issues occur in the situation of cloud computing and discuss ways in which they may be addressed.
- P. Mell, T. Grance, "The NIST Definition of Cloud Computing", version 15, National Institute of Standards and Technology, October 7, 2009, http://csrc.nist.gov/groups/SNS/cloud-computing.Google Scholar
- Manabi-ing, The 2nd Cloud computing opinion poll, (in Japanese),http://cloud.manabing.jp/cloud-news/ing7048.html.Google Scholar
- Siani Pearson and Azzedine Benameur, Privacy, "Security and Trust Issues Arising from Cloud Computing" 2nd IEEE International Conference on Cloud Computing Technology and Science. Google ScholarDigital Library
- AmandeepVerma and SakshiKaushal "Cloud Computing Security Issues and Challenges: A Survey".Google Scholar
- MeikoJensen, Jorg Sehwenk et al., "On Technical Security, Issues in cloud Computing" IEEE International conference on cloud Computing, 2009. Google ScholarDigital Library
- M.Jensen, N.Gruschka et al., "The impact of flooding Attacks on network based services" IEEE International conference on Availability, Reliability and Security (ARES) 2008. Google ScholarDigital Library
- FlavioLombardi, Roberto DiPietro. "Transparent Security for Cloud" SAC '10: Proceedings of the 2010 ACM Symposium on Applied Computing, March 2010, pp 414--415. Google ScholarDigital Library
- RituikDubey et al., "Addressing Security issues in Cloud Computing" http://www.contrib.andrew.cmu.edu/~rdubey/index_files/cloud%20computing.pdfGoogle Scholar
- M. Okuhara et al., "Security Architecture for Cloud Computing", www.fujitsu.com/downloads/MAG/vol46-4/paper09.pdfGoogle Scholar
- "A Security Analysis of Cloud Computing" http://cloudcomputing.syscon.com/node/1203943Google Scholar
- "Cloud Security Questions? Here are some answers" http://cloudcomputing.sys-con.com/node/1330353Google Scholar
- "Cloud Computing and Security --A Natural Match", Trusted Computing Group(TCG) http://www.trustedcomputinggroup.orgGoogle Scholar
- "Controlling Data in the Cloud: Outsourcing Computation without outsourcing Control" http://www.parc.com/content/attachments/ControllingDataInTheCloud-CCSW-09.pdfGoogle Scholar
- "Amazon Web services: Overview of Security processes "September 2008 http://aws.amazon.comGoogle Scholar
- AlokTripathi, Abhinav Mishra "Cloud Computing Security Considerations"Google Scholar
- www.researchgate.net/publication/259072387_Cloud_Computing_Security_Issues_And_ChallengesGoogle Scholar
- Meiko Jensen, JorgSchwenk, Nils Gruschka, Luigi Lo Iacono," On Technical Security issues in Cloud Computing", 2009, IEEE, International Conference on Cloud Computing. Google ScholarDigital Library
- Nelson Gonzalez, Charles Miers, Fernando Redigolo, Marcos Simplicio, TerezaCarvalho, Mats Naslund and MakanPourzandi, "A quantitative analysis of current security concerns and solutions for cloud computing", Gonzalez er al. Journal of Cloud Computing: Advances, Systems and Application 2012, 1:11.Google Scholar
- Michael Factor, David Hadas, AnerHamama, NadavHar'el, Elliot K. Kolodner, AnilKurmusy, Alexandra Shulman-Peleg, Alessandro Sorniottiy Secure Logical Isolation for Multi-tenancy in Cloud Storage.Google Scholar
- http://www.forbes.com/sites/louiscolumbus/2014/12/26/kpmgs-2014-cloud-computing-survey-enterprises-quickly-moving-beyond-cost-reduction-to-customer-driven-results/Google Scholar
- RohitBhadauria, SugataSanyal "Survey on Security Issues in Cloud Computing andAssociated Mitigation Techniques".Google Scholar
- Alessandro Perilli, Claudio Criscione, "Securing thePrivate Cloud", Article on Secure Networks, Virtualization.info. http://virtualization.info/en/security/privatecloud.pdf.Google Scholar
- E. Mathisen, "Security Challenges and Solutions inCloud Computing", Proceedings of the 5th IEEEInternational Conference on Digital Ecosystems and Technologies (DEST), pp. 208--212, June, 2011, ISBN:978-1-4577-0871-8.Google Scholar
- P. Sharma, S. K. Sood, and S. Kaur, "Security Issuesin Cloud Computing", Proceedings of HighPerformance Architecture and Grid Computing,Google Scholar
- A. Verma and S. Kaushal, "Cloud Computing Security Issues and Challenges: A Survey", Proceedings ofAdvances in Computing and Communications.Google Scholar
- Daniele Catteddu, Giles Hogben, "Cloud Computing:Benefits, Risks and Recommendations for InformationSecurity", European Network and InformationSecurity Agency (ENISA), Nov, 2009. http://www.enisa.europa.eu/act/applicationsecurity/test/act/rm/files/deliverables/cloudcomputing-risk-assessment.Google Scholar
- B. R. Kandukuri, R. V. Paturi and A. Rakshit, "CloudSecurity Issues", 2009 IEEE International Conferenceon Services Computing, Bangalore, India, September 21-25, 2009. In Proceedings of IEEE SCC'2009. pp. 517--520, 2009. ISBN: 978-0-7695-3811-2. Google ScholarDigital Library
- Tim Mather, SubraKumaraswamy, ShahedLatif,"Cloud Security and Privacy: An Enterprise Edition onRisks and Compliance (Theory in Practice)", O'ReillyMedia, Sep. 2009; ISBN: 978-0596802769. http://oreilly.com/catalog/9780596802776. Google ScholarDigital Library
- L. Wang, GregorLaszewski, Marcel Kunze, JieTao,"Cloud Computing: A Perspective Study", NewGeneration Computing-Advances of DistributedInformation Processing, pp. 137--146, vol. 28, no. 2, 2008.Google Scholar
- Harold C. Lin, ShivnathBabu, Jeffrey S. Chase, SujayS. Parekh, "Automated Control in Cloud Computing:Opportunities and Challenges", Proc. of the 1stWorkshop on Automated control for data centres andclouds, New York, NY, USA, pp. 13--18, 2009, ISBN: 978-1-60558-585-7. Google ScholarDigital Library
- S. Bhardwaj, L. Jain, and S. Jain, "Cloud computing:A study of infrastructure as a service (IAAS)",International Journal of engineering and informationTechnology, 2(1):60--63, 2010.Google Scholar
- R. Gellman, "Privacy in the clouds: Risks to privacyand confidentiality from cloud computing", The WorldPrivacy Forum, 2009. http://www.worldprivacyforum.org/pdf/WPF_Cloud_Privacy_Report.pdf.Google Scholar
- Julisch, K., & Hall, M., "Security and control in thecloud", Information Security Journal: A Global Perspective, vol. 19, no. 6, pp. 299--309, 2010. Google ScholarDigital Library
- Cong Wang, Qian Wang, KuiRen, and WenjingLou,"Ensuring Data Storage Security in CloudComputing", 17th International workshop on Quality of Service, 2009, IWQoS, Charleston, SC, USA, pp. 1--9, July 13-15, 2009, ISBN: 978-1-4244-3875-4.Google Scholar
- S. Subashini, V. Kavitha, "A survey on security issuesin service delivery models of cloud computing", Journal of Network and Computer Applications, Vol. 34(1), pp 1--11, Academic Press Ltd., UK, 2011, ISSN: 1084--8045. Google ScholarDigital Library
- Char Sample, Senior Scientist, BBN Technologies, Diana Kelley, Partner, Security Curve, "Cloudcomputing security: Routing and DNS securitythreats". http://searchsecurity.techtarget.com/tip/0,289483,sid14_gci1359155_meml,00.html/Google Scholar
- Security, Privacy Issues and challenges In Cloud Computing: A Survey
Recommendations
Cloud Computing Security and Privacy
ICBDC '18: Proceedings of the 3rd International Conference on Big Data and ComputingCloud computing is an emerging technology that can provide organizations, enterprises and governments with cheaper, more convenient and larger scale computing resources. However, cloud computing will bring potential risks and threats, especially on ...
Cloud computing and security challenges
ACM-SE '12: Proceedings of the 50th Annual Southeast Regional ConferenceCloud Computing recently emerged as a promising solution to information technology (IT) management. IT managers look to cloud computing as a means to maintain a flexible and scalable IT infrastructure that enables business agility. In this paper Cloud ...
Open Challenges in Security of Cloud Computing
BDAW '16: Proceedings of the International Conference on Big Data and Advanced Wireless TechnologiesCloud Computing has been on the rise with the advent of Internet of Things and the whole Big Data revolution. There a numerous Cloud Computing Service Providers to choose from. However, the major concern of Cloud Computing is the Security and Privacy ...
Comments