Different facets of security in the cloud

Cloud computing is a long fantasized visualization of computing as a utility, where data owners can remotely store and access their data in the cloud anytime and from anywhere. Using a shared pool of configurable resources, users can be relieved from the burden of local data storage and upkeep. The security of cloud computing has always been an important aspect of quality of service from cloud service providers. However, cloud computing poses many new security challenges which have not been well investigated. This paper provides an analysis of cloud computing, cloud data storage security, the security risks that involve using the cloud, security policies, physical security, and software security pertaining to the cloud. Our research work indicates that cloud computing combined with a trusted computing platform can provide some important security services, including authentication, confidentiality, and integrity.

[1]  Peter J. Denning,et al.  Data Security , 1979, CSUR.

[2]  Zhidong Shen,et al.  The security of cloud computing system enabled by trusted computing technology , 2010, 2010 2nd International Conference on Signal Processing Systems.

[3]  Cong Wang,et al.  Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing , 2010, 2010 Proceedings IEEE INFOCOM.

[4]  Saira Begum,et al.  Potential of cloud computing architecture , 2011, 2011 International Conference on Information and Communication Technologies.

[5]  Balachandra Reddy Kandukuri,et al.  Cloud Security Issues , 2009, 2009 IEEE International Conference on Services Computing.

[6]  Jiann-Min Yang,et al.  Analysis on Cloud-Based Security Vulnerability Assessment , 2010, 2010 IEEE 7th International Conference on E-Business Engineering.

[7]  M. Roberts Masillamani,et al.  Design and auditing of Cloud computing security , 2010, 2010 Fifth International Conference on Information and Automation for Sustainability.

[8]  Paula Kotzé,et al.  Secure cloud computing: Benefits, risks and controls , 2011, 2011 Information Security for South Africa.

[9]  Eystein Mathisen,et al.  Security challenges and solutions in cloud computing , 2011, 5th IEEE International Conference on Digital Ecosystems and Technologies (IEEE DEST 2011).

[10]  Gary Mcgraw Software security , 2004, IEEE Security & Privacy Magazine.

[11]  Yin Hu,et al.  Analysis and Research about Cloud Computing Security Protect Policy , 2011, 2011 International Conference on Intelligence Science and Information Engineering.

[12]  Lori M. Kaufman,et al.  Data Security in the World of Cloud Computing , 2009, IEEE Security & Privacy.