A Review of Challenges and Security Risks of Cloud Computing

Cloud computing has been an attention in the new era of the IT technologies as there is an increase demand in the services or utility computing all over the wide world web. Security risk resulting from resource sharing throughout the cloud computing becomes one of the most challenging concerns in providing powerful processing and storage as on-demand services. Taking the advantage of low cost derived from the increase in efficiency and performance facilitated by cloud computing, governments and organizations around the globe are motivated to build or migrate to the cloud. However, there are still many technical issues relating to the features of cloud computing and the provision of quality service, leading to a delay in adopting cloud computing. This review paper highlights the security risks and challenges of cloud computing and study the security requirements for cloud computing. The primary aim of this review is to classify the security risks and challenges related to the different forms of cloud computing (SaaS, PaaS and IaaS).

[1]  Madjid Merabti,et al.  Secure Cloud Computing for Critical Infrastructure: A Survey , 2012 .

[2]  B. Loganayagi,et al.  Cloud computing in Stax Platform , 2011, 2011 International Conference on Computer, Communication and Electrical Technology (ICCCET).

[3]  Rajkumar Buyya,et al.  Power‐aware provisioning of virtual machines for real‐time Cloud services , 2011, Concurr. Comput. Pract. Exp..

[4]  Chuan Wang,et al.  A Dependability Model to Enhance Security of Cloud Environment Using System-Level Virtualization Techniques , 2010, 2010 First International Conference on Pervasive Computing, Signal Processing and Applications.

[5]  Henry E. Schaffer,et al.  X as a Service, Cloud Computing, and the Need for Good Judgment , 2009, IT Prof..

[6]  Issa M. Khalil,et al.  Cloud Computing Security: A Survey , 2014, Comput..

[7]  Ana Cristina Oliveira,et al.  Efficient network service level agreement monitoring for cloud computing systems , 2014, 2014 IEEE Symposium on Computers and Communications (ISCC).

[8]  Muttukrishnan Rajarajan,et al.  A survey of intrusion detection techniques in Cloud , 2013, J. Netw. Comput. Appl..

[9]  Te-Shun Chou,et al.  SECURITY THREATS ON CLOUD COMPUTING VULNERABILITIES , 2013 .

[10]  Dimitrios Zissis,et al.  Addressing cloud computing security issues , 2012, Future Gener. Comput. Syst..

[11]  Sungyoung Lee,et al.  Adoption issues for cloud computing , 2009, iiWAS.

[12]  Lei Ren,et al.  Cloud manufacturing: a new manufacturing paradigm , 2014, Enterp. Inf. Syst..

[13]  Raouf Boutaba,et al.  Cloud computing: state-of-the-art and research challenges , 2010, Journal of Internet Services and Applications.

[14]  Muttukrishnan Rajarajan,et al.  A survey on security issues and solutions at different layers of Cloud computing , 2012, The Journal of Supercomputing.

[15]  S. Sujatha,et al.  Creating virtual platform for cloud computing , 2010, 2010 IEEE International Conference on Computational Intelligence and Computing Research.

[16]  Xiaolei Dong,et al.  Security and privacy for storage and computation in cloud computing , 2014, Inf. Sci..

[17]  Mikyung Kang,et al.  Heterogeneous Cloud Computing , 2011, 2011 IEEE International Conference on Cluster Computing.

[18]  B. Loganayagi,et al.  Enhanced Cloud Security by Combining Virtualization and Policy Monitoring Techniques , 2012 .

[19]  Nils Gruschka,et al.  A survey of attacks on web services , 2009, Computer Science - Research and Development.

[20]  Rajkumar Buyya,et al.  Power-aware provisioning of Cloud resources for real-time services , 2009, MGC '09.

[21]  Xiaofeng Liao,et al.  Cloud computing privacy & security global issues, challenges, & mechanisms , 2011, 2011 6th International ICST Conference on Communications and Networking in China (CHINACOM).

[22]  Lori M. Kaufman,et al.  Data Security in the World of Cloud Computing , 2009, IEEE Security & Privacy.

[23]  Rubén S. Montero,et al.  Key Challenges in Cloud Computing: Enabling the Future Internet of Services , 2013, IEEE Internet Computing.

[24]  Jean-Paul Van Belle,et al.  Management Issues with Cloud Computing , 2013, ICCC.

[25]  Andreas Mladenow,et al.  Value Creation Using Clouds: Analysis of Value Drivers for Start-Ups and Small and Medium Sized Enterprises in the Textile Industry , 2012, 2012 26th International Conference on Advanced Information Networking and Applications Workshops.

[26]  Thirunavukarasu Ramkumar,et al.  Enhanced Survey and Proposal to secure the data in Cloud Computing Environment , 2013 .

[27]  A. B. M. Shawkat Ali,et al.  A survey on gaps, threat remediation challenges and some thoughts for proactive attack detection in cloud computing , 2012, Future Gener. Comput. Syst..

[28]  Zahid Raza,et al.  Cloud Computing: Issues & Challenges , 2013 .