ADDRESSING SECURITY AND PRIVACY ISSUES IN CLOUD COMPUTING

Cloud computing offers a new way to deliver service s while significantly changing the cost structure underlying those services. This new technical and p ricing opportunities change in the way the business operate. It combines the features of traditional co mputing technology like grid, parallel and distribu ted computing and so on. The aim of cloud computing is to provide a high performance computing system to the customer with the low cost without relying on t heir own infrastructure. The cloud offers the vario us levels of services like Software-as-a-Service (SaaS ), Platform-as-a-Service (PaaS) & Infrastructure-as -aService (IaaS) to the customers over the internet. Since all the services are offered over the interne t, there is a great deal of uncertainty about security and priv acy at various levels are arises. This extensive su rvey article aims to address security and privacy issues threatening the cloud computing adoption at the en d user at the various levels (network, host, and applicati on and data levels).

[1]  Alfred Basta,et al.  Computer Security and Penetration Testing , 2007 .

[2]  Chittaranjan Hota,et al.  Capability-based Cryptographic Data Access Control in Cloud Computing , 2011 .

[3]  Robert H. Deng,et al.  HASBE: A Hierarchical Attribute-Based Solution for Flexible and Scalable Access Control in Cloud Computing , 2012, IEEE Transactions on Information Forensics and Security.

[4]  Wahyu Kusuma,et al.  Journal of Theoretical and Applied Information Technology , 2012 .

[5]  A. Volokyta,et al.  Secure virtualization in cloud computing , 2012, Proceedings of International Conference on Modern Problem of Radio Engineering, Telecommunications and Computer Science.

[6]  Judith Hurwitz,et al.  Cloud Computing for Dummies , 2009 .

[7]  Cong Wang,et al.  Efficient verifiable fuzzy keyword search over encrypted data in cloud computing , 2013, Comput. Sci. Inf. Syst..

[8]  G. Geetha Kumari,et al.  API access control in cloud using the Role Based Access Control Model , 2010, Trendz in Information Sciences & Computing(TISC2010).

[9]  Ei Ei Mon,et al.  The privacy-aware access control system using attribute-and role-based access control in private cloud , 2011, 2011 4th IEEE International Conference on Broadband Network and Multimedia Technology.

[10]  Robert L. Grossman,et al.  The Case for Cloud Computing , 2009, IT Professional.

[11]  Mudhakar Srivatsa,et al.  Mitigating application-level denial of service attacks on Web servers: A client-transparent approach , 2008, TWEB.

[12]  V. Kavitha,et al.  A survey on security issues in service delivery models of cloud computing , 2011, J. Netw. Comput. Appl..

[13]  Paul England,et al.  Resource management for isolation enhanced cloud services , 2009, CCSW '09.

[14]  Derek Atkins,et al.  Threat Analysis of the Domain Name System (DNS) , 2004, RFC.

[15]  Zhuoqing Morley Mao,et al.  Practical defenses against BGP prefix hijacking , 2007, CoNEXT '07.