Security Issues in Cloud Computing - A Review

Security Issues in Cloud Computing A Review Irfan Hussain Department of Information Technology, University of Gujrat, Pakistan Email: im_qamar@yahoo.com Imran Ashraf Lecturer, Department of CS & IT, University of Gujrat, Pakistan Email: ashrafimran@live.com ----------------------------------------------------------------------ABSTRACT----------------------------------------------------------Cloud Computing is the most emerging trend in Information Technology now days. It is attracting the organizations due to its advantages of scalability, throughput, easy and cheap access and on demand up and down grading of SaaS, PaaS and IaaS. Besides all the salient features of cloud environment, there are the big challenges of privacy and security. In this paper, a review of different security issues like trust, confidentiality, authenticity, encryption, key management and resource sharing are presented along with the efforts made on how to overcome these issues.

[1]  Ian Foster,et al.  The Grid 2 - Blueprint for a New Computing Infrastructure, Second Edition , 1998, The Grid 2, 2nd Edition.

[2]  A. Behl,et al.  An analysis of cloud computing security issues , 2012, 2012 World Congress on Information and Communication Technologies.

[3]  Josef Kittler,et al.  Financial Cryptography and Data Security , 2012, Lecture Notes in Computer Science.

[4]  Said El Hajji,et al.  Homomorphic Encryption Applied to the Cloud Computing Security , 2012 .

[5]  Lingdi Ping,et al.  Trust Model to Enhance Security and Interoperability of Cloud Environment , 2009, CloudCom.

[6]  Randy H. Katz,et al.  A view of cloud computing , 2010, CACM.

[7]  P. Mell,et al.  SP 800-145. The NIST Definition of Cloud Computing , 2011 .

[8]  Reihaneh Safavi-Naini,et al.  Privacy preserving EHR system using attribute-based infrastructure , 2010, CCSW '10.

[9]  Tharam S. Dillon,et al.  SLA-Based Trust Model for Cloud Computing , 2010, 2010 13th International Conference on Network-Based Information Systems.

[10]  Cong Wang,et al.  Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing , 2010, 2010 Proceedings IEEE INFOCOM.

[11]  Kristin E. Lauter,et al.  Cryptographic Cloud Storage , 2010, Financial Cryptography Workshops.

[12]  Hai Jin,et al.  Efficient Password-based Two Factors Authentication in Cloud Computing , 2012 .

[13]  Robert E. Lyons,et al.  The Use of Triple-Modular Redundancy to Improve Computer Reliability , 1962, IBM J. Res. Dev..

[14]  Siani Pearson,et al.  Privacy, Security and Trust Issues Arising from Cloud Computing , 2010, 2010 IEEE Second International Conference on Cloud Computing Technology and Science.

[15]  Harit Shah,et al.  Security Issues on Cloud Computing , 2013, ArXiv.

[16]  B. B. Amberker,et al.  Efficient Query Processing on Outsourced Encrypted Data in Cloud with Privacy Preservation , 2012, 2012 International Symposium on Cloud and Services Computing.

[17]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[18]  Rajkumar Buyya,et al.  High Performance Cluster Computing , 1999 .

[19]  Jie Wu,et al.  Achieving fine‐grained access control for secure data sharing on cloud servers , 2011, Concurr. Comput. Pract. Exp..

[20]  Yan Bai,et al.  Design and Implementation of a Secure Healthcare Social Cloud System , 2012, 2012 12th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (ccgrid 2012).

[21]  R. V. van Nieuwpoort,et al.  The Grid 2: Blueprint for a New Computing Infrastructure , 2003 .

[22]  Christoph Meinel,et al.  Intrusion Detection in the Cloud , 2009, 2009 Eighth IEEE International Conference on Dependable, Autonomic and Secure Computing.

[23]  Eric Pardede,et al.  A New approach using redundancy technique to improve security in cloud computing , 2012, Proceedings Title: 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec).

[24]  P. Mell,et al.  The NIST Definition of Cloud Computing , 2011 .

[25]  Krishna P. Gummadi,et al.  Towards Trusted Cloud Computing , 2009, HotCloud.

[26]  Bu-Sung Lee,et al.  TrustCloud: A Framework for Accountability and Trust in Cloud Computing , 2011, 2011 IEEE World Congress on Services.

[27]  Elizabeth Chang,et al.  Conceptual SLA framework for cloud computing , 2010, 4th IEEE International Conference on Digital Ecosystems and Technologies.

[28]  Gail-Joon Ahn,et al.  Security and Privacy Challenges in Cloud Computing Environments , 2010, IEEE Security & Privacy.

[29]  Kai Hwang,et al.  Cloud Security with Virtualized Defense and Reputation-Based Trust Mangement , 2009, 2009 Eighth IEEE International Conference on Dependable, Autonomic and Secure Computing.

[30]  Siani Pearson,et al.  End-to-End Policy-Based Encryption and Management of Data in the Cloud , 2011, 2011 IEEE Third International Conference on Cloud Computing Technology and Science.