Analyzing Cloud Computing Security Issues and Challenges

Cloud computing is the model of computing based on Internet. This is used for completing the computer’s need by providing necessary data and computer resources. Most of the companies use cloud computing for avoiding the purchasing cost of servers. Therefore, it becomes essential to study various issues associated with cloud computing. One of major issues that industries face is security issue. In this paper, we aim to study various key attributes of cloud computing, important characteristics of cloud model. Further, the paper discusses security issues, limitations of existing approach, and possible solutions associated with cloud computing approach.

[1]  Paul Rodrigues,et al.  State-of-the-art cloud computing security taxonomies: a classification of security challenges in the present cloud computing environment , 2012, ICACCI '12.

[2]  Rajkumar Buyya,et al.  Cost of Virtual Machine Live Migration in Clouds: A Performance Evaluation , 2009, CloudCom.

[3]  Nabil Ahmed Sultan,et al.  International Journal of Information Management , 2010 .

[4]  Wolter Pieters,et al.  Privacy Penetration Testing: How to Establish Trust in Your Cloud Provider , 2012, European Data Protection.

[5]  Michael Kretzschmar,et al.  Security management interoperability challenges for Collaborative Clouds , 2010, 2010 4th International DMTF Academic Alliance Workshop on Systems and Virtualization Management.

[6]  Hassan Takabi,et al.  Semantic-based policy management for cloud computing environments , 2012, Int. J. Cloud Comput..

[7]  Cong Wang,et al.  Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing , 2009, ESORICS.

[8]  P. Mell,et al.  The NIST Definition of Cloud Computing , 2011 .

[9]  Randy H. Katz,et al.  A view of cloud computing , 2010, CACM.

[10]  Andrew B. Whinston,et al.  Understanding the Service Component of Application Service Provision: An Empirical Analysis of Satisfaction with ASP Services , 2003, MIS Q..

[11]  Te-Shun Chou,et al.  SECURITY THREATS ON CLOUD COMPUTING VULNERABILITIES , 2013 .

[12]  Bo Wang,et al.  The application of cloud computing in education informatization , 2011, 2011 International Conference on Computer Science and Service System (CSSS).

[13]  Dan Lin,et al.  Preventing Information Leakage from Indexing in the Cloud , 2010, 2010 IEEE 3rd International Conference on Cloud Computing.

[14]  Farzad Sabahi,et al.  Cloud computing security threats and responses , 2011, 2011 IEEE 3rd International Conference on Communication Software and Networks.

[15]  Rania Fahim El-Gazzar,et al.  A Literature Review on Cloud Computing Adoption Issues in Enterprises , 2014, TDIT.

[16]  Shufen Zhang,et al.  Cloud Computing Research and Development Trend , 2010, 2010 Second International Conference on Future Networks.

[17]  Thomas Gross,et al.  Defense-in-Depth Against Malicious Insiders in the Cloud , 2013, 2013 IEEE International Conference on Cloud Engineering (IC2E).

[18]  Isaac Agudo,et al.  BlindIdM: A privacy-preserving approach for identity management as a service , 2014, International Journal of Information Security.

[19]  F. Richard Yu,et al.  Software-Defined Networking (SDN) and Distributed Denial of Service (DDoS) Attacks in Cloud Computing Environments: A Survey, Some Research Issues, and Challenges , 2016, IEEE Communications Surveys & Tutorials.

[20]  Luis Miguel Vaquero Gonzalez,et al.  Locking the sky: a survey on IaaS cloud security , 2010, Computing.

[21]  Manpreet Kaur,et al.  A Review of Cloud Computing Security Issues , 2015 .

[22]  Nikolay Borissov,et al.  Cloud Computing – A Classification, Business Models, and Research Directions , 2009, Bus. Inf. Syst. Eng..