Cloud computing can and does mean different things to different people. The common characteristics most share are on-demand scalability of highly available and reliable pooled computing resources, secure access to metered services from nearly anywhere, and dislocation of data from inside to outside the organization. Se curity continues to be a major challenge for data security lifecycle in cloud computing. Most technological means of securing non-cloud computing systems can be either applied directly or modified to secure a cloud; how ever, no integrated model-based methodology is yet available to analyze cloud security requirements and develop policy to deal with both internal and external secu rity challenges. The idea of handing over important data to another company is worrisome; such that the consumers need to be vigilant in understanding the risks of data breaches in this new environment. Thi s paper introduces a detailed analysis of the cloud computing data security life issues and challenges focusing on the cloud computing types and the servi ce delivery types.
[1]
John W. Rittinghouse,et al.
Cloud Computing: Implementation, Management, and Security
,
2009
.
[2]
P. Mell,et al.
The NIST Definition of Cloud Computing
,
2011
.
[3]
Balachandra Reddy Kandukuri,et al.
Cloud Security Issues
,
2009,
2009 IEEE International Conference on Services Computing.
[4]
Victor Delgado,et al.
Exploring the limits of cloud computing
,
2010
.
[5]
Won Kim.
Cloud computing architecture
,
2013,
Int. J. Web Grid Serv..
[6]
John Viega,et al.
Cloud Computing and the Common Man
,
2009,
Computer.
[7]
Shyhtsun Felix Wu,et al.
BANDS: An Inter-domain Internet Security Policy Management System for IPSec/VPN
,
2003,
Integrated Network Management.
[8]
Jörg Schwenk,et al.
On Technical Security Issues in Cloud Computing
,
2009,
2009 IEEE International Conference on Cloud Computing.