SURVEY ON SECURITY ISSUES IN CLOUD COMPUTING
Sri Vasavi College, Erode Self-Finance Wing, 3rd February 2017. National Conference on Computer and Communication, NCCC’17. International Journal of Computer Science (IJCS) Published by SK Research Group of Companies (SKRGC)
Download this PDF format
Abstract
Cloud computing is architecture for providing computing service via the internet on demand and pay per use access to a pool of shared resources, without physically acquiring them. So it saves managing cost and time for organizations. Cloud Computing holds the potential to eliminate the requirements for setting up of high-cost computing infrastructure for the IT-based solutions and services that the industry uses. Many industries, such as banking, healthcare and education are moving towards the cloud due to the efficiency of services provided by the pay-per-use pattern based on the resources such as processing power used, transactions carried out, bandwidth consumed, data transferred, or storage space occupied etc. It promises to provide a flexible IT architecture, accessible through internet for lightweight portable devices. Security is one of the major issues which hamper the growth of cloud. The idea of handing over important data to another company is worrisome;such that the consumers need to be vigilant in understanding the risks of data breaches in this new environment. This paper introduces a detailed analysis of the cloud computing security issues and challenges.
References
[1] A. Kundu, C. D. Banerjee, P. Saha, ?Introducing New Services in Cloud Computing Environment?, International Journal of Digital Content Technology and its Applications, AICIT, Vol. 4, No. 5, pp. 143-152, 2010.
[2] Lizhe Wang, Jie Tao, Kunze M., Castellanos A.C., Kramer D., Karl W., ?Scientific Cloud Computing: Early Definition and Experience,? 10th IEEE Int. Conference on High Performance Computing and Communications, pp. 825-830, Dalian, China, Sep. 2008, ISBN: 978-0-7695-3352-0.
[3] R. L Grossman, ?The Case for Cloud Computing,? IT Professional, vol. 11(2), pp. 23-27, 2009, ISSN: 1520-9202.
[4] B. R. Kandukuri, R. Paturi V, A. Rakshit, ?Cloud Security Issues?, In Proceedings of IEEE International Conference on Services Computing, pp. 517-520, 2009.
[5] Meiko Jensen, JorgSchwenk, Nils Gruschka, Luigi Lo Iacon, ?On technical Security Issues in Cloud Computing,? Proc. of IEEE International Conference on Cloud Computing (CLOUD-II, 2009), pp. 109-116, India, 2009.
[6] F. Gens. (2009, Feb.). ?New IDC IT Cloud Services Survey: Top Benefits and hallenges?, IDC eXchange, Available: [Feb. 18, 2010].
[7] J. Brodkin. (2008, Jun.). ?Gartner: Seven cloud-computing security risks.? Infoworld, Available: [Mar. 13, 2009].
[8] Cloud Computing Use Case Discussion Group. "Cloud Computing UseCases Version 3.0," 2010.L.J. Zhang and Qun Zhou, ?CCOA: Cloud Computing Open Architecture,? ICWS 2009: IEEE International Conference on Web Services, pp. 607-616. July 2009. DOI: 10.1109/ICWS.2009.144.
[9]. K. Vieira, A. Schulter, C. B. Westphall, and C. M. Westphall, ?Intrusion detection techniques for Grid and Cloud Computing Environment,? IT Professional, IEEE Computer Society, vol. 12, issue 4, pp. 38-43, 2010. DOI: 10.1109/MITP.2009.89.
[10]. ?Amazon ec2 sip brute force attacks on rise?, https://www.voiptechchat.com/voip/457/amazon-ec2-sipbrute- force-attacks-on-rise/.
[11] Gartner: Seven cloud-computing security risks, 02 July 2008, https://www.infoworld.com/d/security-central/gartner-seven-cloud-computing-security-risks-853?page=0,0
[12] D. Catteddu, Giles Hogben: European Network and Information Security Agency, November 2009, https://www.enisa.europa.eu/act/rm/files/deliverables/cloud-computing-risk-assessment
[13] Cloud Security Alliance, Security Guidance for Critical Areas of Focus in Cloud Computing V2.1, https://www.cloudsecurityalliance.org/, December 2009
Keywords
Security Issues, Cloud Security, Cloud Architecture, Data Protection, Cloud Platform, Grid Computing, Software as a Service (SaaS), Platform as a Service (PaaS), Infrastructure as a Service (IaaS), Interoperability, Denial of Service (DoS), Distributed Denial of Service (DDoS), Mobile Cloud Computing (MCC)