skip to main content
10.1145/2905055.2905253acmotherconferencesArticle/Chapter ViewAbstractPublication PagesictcsConference Proceedingsconference-collections
research-article

Security, Privacy Issues and challenges In Cloud Computing: A Survey

Authors Info & Claims
Published:04 March 2016Publication History

ABSTRACT

Cloud computing is a rising paradigm for large scale infrastructures. Cloud computing is a technology that being hugely adopted by many organizations like Google, Microsoft, Facebook, Amazon so that the resources are available to multiple users at a time over the internet on demand at any place and any time. Cloud computing opens up a new world of opportunities for entrepreneurships for small company to large company, but with these opportunities there are numerous security challenges that need to be considered and addressed prior to migrating to a cloud computing. Security and privacy issues present a strong barrier for users to use Cloud Computing systems. The security problem of cloud computing is very important and it can prevent the quick development of cloud computing. We have discussed the related work done by different author in cloud security[10]. This paper discusses security issues necessities and challenges that cloud service providers (CSP)and user face in cloud atmosphere, and we also assess how security, trust and privacy issues occur in the situation of cloud computing and discuss ways in which they may be addressed.

References

  1. P. Mell, T. Grance, "The NIST Definition of Cloud Computing", version 15, National Institute of Standards and Technology, October 7, 2009, http://csrc.nist.gov/groups/SNS/cloud-computing.Google ScholarGoogle Scholar
  2. Manabi-ing, The 2nd Cloud computing opinion poll, (in Japanese),http://cloud.manabing.jp/cloud-news/ing7048.html.Google ScholarGoogle Scholar
  3. Siani Pearson and Azzedine Benameur, Privacy, "Security and Trust Issues Arising from Cloud Computing" 2nd IEEE International Conference on Cloud Computing Technology and Science. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. AmandeepVerma and SakshiKaushal "Cloud Computing Security Issues and Challenges: A Survey".Google ScholarGoogle Scholar
  5. MeikoJensen, Jorg Sehwenk et al., "On Technical Security, Issues in cloud Computing" IEEE International conference on cloud Computing, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. M.Jensen, N.Gruschka et al., "The impact of flooding Attacks on network based services" IEEE International conference on Availability, Reliability and Security (ARES) 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. FlavioLombardi, Roberto DiPietro. "Transparent Security for Cloud" SAC '10: Proceedings of the 2010 ACM Symposium on Applied Computing, March 2010, pp 414--415. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. RituikDubey et al., "Addressing Security issues in Cloud Computing" http://www.contrib.andrew.cmu.edu/~rdubey/index_files/cloud%20computing.pdfGoogle ScholarGoogle Scholar
  9. M. Okuhara et al., "Security Architecture for Cloud Computing", www.fujitsu.com/downloads/MAG/vol46-4/paper09.pdfGoogle ScholarGoogle Scholar
  10. "A Security Analysis of Cloud Computing" http://cloudcomputing.syscon.com/node/1203943Google ScholarGoogle Scholar
  11. "Cloud Security Questions? Here are some answers" http://cloudcomputing.sys-con.com/node/1330353Google ScholarGoogle Scholar
  12. "Cloud Computing and Security --A Natural Match", Trusted Computing Group(TCG) http://www.trustedcomputinggroup.orgGoogle ScholarGoogle Scholar
  13. "Controlling Data in the Cloud: Outsourcing Computation without outsourcing Control" http://www.parc.com/content/attachments/ControllingDataInTheCloud-CCSW-09.pdfGoogle ScholarGoogle Scholar
  14. "Amazon Web services: Overview of Security processes "September 2008 http://aws.amazon.comGoogle ScholarGoogle Scholar
  15. AlokTripathi, Abhinav Mishra "Cloud Computing Security Considerations"Google ScholarGoogle Scholar
  16. www.researchgate.net/publication/259072387_Cloud_Computing_Security_Issues_And_ChallengesGoogle ScholarGoogle Scholar
  17. Meiko Jensen, JorgSchwenk, Nils Gruschka, Luigi Lo Iacono," On Technical Security issues in Cloud Computing", 2009, IEEE, International Conference on Cloud Computing. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Nelson Gonzalez, Charles Miers, Fernando Redigolo, Marcos Simplicio, TerezaCarvalho, Mats Naslund and MakanPourzandi, "A quantitative analysis of current security concerns and solutions for cloud computing", Gonzalez er al. Journal of Cloud Computing: Advances, Systems and Application 2012, 1:11.Google ScholarGoogle Scholar
  19. Michael Factor, David Hadas, AnerHamama, NadavHar'el, Elliot K. Kolodner, AnilKurmusy, Alexandra Shulman-Peleg, Alessandro Sorniottiy Secure Logical Isolation for Multi-tenancy in Cloud Storage.Google ScholarGoogle Scholar
  20. http://www.forbes.com/sites/louiscolumbus/2014/12/26/kpmgs-2014-cloud-computing-survey-enterprises-quickly-moving-beyond-cost-reduction-to-customer-driven-results/Google ScholarGoogle Scholar
  21. RohitBhadauria, SugataSanyal "Survey on Security Issues in Cloud Computing andAssociated Mitigation Techniques".Google ScholarGoogle Scholar
  22. Alessandro Perilli, Claudio Criscione, "Securing thePrivate Cloud", Article on Secure Networks, Virtualization.info. http://virtualization.info/en/security/privatecloud.pdf.Google ScholarGoogle Scholar
  23. E. Mathisen, "Security Challenges and Solutions inCloud Computing", Proceedings of the 5th IEEEInternational Conference on Digital Ecosystems and Technologies (DEST), pp. 208--212, June, 2011, ISBN:978-1-4577-0871-8.Google ScholarGoogle Scholar
  24. P. Sharma, S. K. Sood, and S. Kaur, "Security Issuesin Cloud Computing", Proceedings of HighPerformance Architecture and Grid Computing,Google ScholarGoogle Scholar
  25. A. Verma and S. Kaushal, "Cloud Computing Security Issues and Challenges: A Survey", Proceedings ofAdvances in Computing and Communications.Google ScholarGoogle Scholar
  26. Daniele Catteddu, Giles Hogben, "Cloud Computing:Benefits, Risks and Recommendations for InformationSecurity", European Network and InformationSecurity Agency (ENISA), Nov, 2009. http://www.enisa.europa.eu/act/applicationsecurity/test/act/rm/files/deliverables/cloudcomputing-risk-assessment.Google ScholarGoogle Scholar
  27. B. R. Kandukuri, R. V. Paturi and A. Rakshit, "CloudSecurity Issues", 2009 IEEE International Conferenceon Services Computing, Bangalore, India, September 21-25, 2009. In Proceedings of IEEE SCC'2009. pp. 517--520, 2009. ISBN: 978-0-7695-3811-2. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. Tim Mather, SubraKumaraswamy, ShahedLatif,"Cloud Security and Privacy: An Enterprise Edition onRisks and Compliance (Theory in Practice)", O'ReillyMedia, Sep. 2009; ISBN: 978-0596802769. http://oreilly.com/catalog/9780596802776. Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. L. Wang, GregorLaszewski, Marcel Kunze, JieTao,"Cloud Computing: A Perspective Study", NewGeneration Computing-Advances of DistributedInformation Processing, pp. 137--146, vol. 28, no. 2, 2008.Google ScholarGoogle Scholar
  30. Harold C. Lin, ShivnathBabu, Jeffrey S. Chase, SujayS. Parekh, "Automated Control in Cloud Computing:Opportunities and Challenges", Proc. of the 1stWorkshop on Automated control for data centres andclouds, New York, NY, USA, pp. 13--18, 2009, ISBN: 978-1-60558-585-7. Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. S. Bhardwaj, L. Jain, and S. Jain, "Cloud computing:A study of infrastructure as a service (IAAS)",International Journal of engineering and informationTechnology, 2(1):60--63, 2010.Google ScholarGoogle Scholar
  32. R. Gellman, "Privacy in the clouds: Risks to privacyand confidentiality from cloud computing", The WorldPrivacy Forum, 2009. http://www.worldprivacyforum.org/pdf/WPF_Cloud_Privacy_Report.pdf.Google ScholarGoogle Scholar
  33. Julisch, K., & Hall, M., "Security and control in thecloud", Information Security Journal: A Global Perspective, vol. 19, no. 6, pp. 299--309, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. Cong Wang, Qian Wang, KuiRen, and WenjingLou,"Ensuring Data Storage Security in CloudComputing", 17th International workshop on Quality of Service, 2009, IWQoS, Charleston, SC, USA, pp. 1--9, July 13-15, 2009, ISBN: 978-1-4244-3875-4.Google ScholarGoogle Scholar
  35. S. Subashini, V. Kavitha, "A survey on security issuesin service delivery models of cloud computing", Journal of Network and Computer Applications, Vol. 34(1), pp 1--11, Academic Press Ltd., UK, 2011, ISSN: 1084--8045. Google ScholarGoogle ScholarDigital LibraryDigital Library
  36. Char Sample, Senior Scientist, BBN Technologies, Diana Kelley, Partner, Security Curve, "Cloudcomputing security: Routing and DNS securitythreats". http://searchsecurity.techtarget.com/tip/0,289483,sid14_gci1359155_meml,00.html/Google ScholarGoogle Scholar
  1. Security, Privacy Issues and challenges In Cloud Computing: A Survey

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Other conferences
      ICTCS '16: Proceedings of the Second International Conference on Information and Communication Technology for Competitive Strategies
      March 2016
      843 pages
      ISBN:9781450339629
      DOI:10.1145/2905055

      Copyright © 2016 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 4 March 2016

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article
      • Research
      • Refereed limited

      Acceptance Rates

      Overall Acceptance Rate97of270submissions,36%

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader