A Survey on Security Threats for Cloud Computing

Cloud Computing provides an efficient and flexible way for services to meet escalating business needs. Cloudshared infrastructure and associated services make it cost effective alternative to traditional approaches. However, they may also introduce security breaches and privacy issues. As more cloud based applications keep evolving, the associated security threats are also growing. Many research works on cloud security exist in partial forms of either specifically on cloud issues or virtualization-related security issues. In this paper, an attempt has been made to consolidate the various security threats in a classified manner and to illustrate how cloud and virtualization vulnerabilities affect the different cloud service models.

[1]  Akhil Behl Emerging security challenges in cloud computing: An insight to cloud security challenges and their mitigation , 2011, 2011 World Congress on Information and Communication Technologies.

[2]  Rajkumar Buyya,et al.  Introduction to Cloud Computing , 2011, CloudCom 2011.

[3]  K. Popovic,et al.  Cloud computing security issues and challenges , 2010, The 33rd International Convention MIPRO.

[4]  S. Sujatha,et al.  Efficient access of Cloud Resources through virtualization techniques , 2012, 2012 International Conference on Recent Trends in Information Technology.

[5]  Ralf Steinmetz,et al.  Threat as a Service?: Virtualization's Impact on Cloud Security , 2012, IT Professional.

[6]  Sajjad Haider,et al.  Security threats in cloud computing , 2011, 2011 International Conference for Internet Technology and Secured Transactions.

[7]  Qiaoyan Wen,et al.  A View about Cloud Data Security from Data Life Cycle , 2010, 2010 International Conference on Computational Intelligence and Software Engineering.

[8]  Yin Hu,et al.  Analysis and Research about Cloud Computing Security Protect Policy , 2011, 2011 International Conference on Intelligence Science and Information Engineering.

[9]  Jinzhu Kong A Practical Approach to Improve the Data Privacy of Virtual Machines , 2010, 2010 10th IEEE International Conference on Computer and Information Technology.

[10]  Shaftab Ahmed,et al.  Tackling cloud security issues and forensics model , 2010, 7th International Symposium on High-capacity Optical Networks and Enabling Technologies.

[11]  M Hasan Islam,et al.  Cloud computing security auditing , 2011, The 2nd International Conference on Next Generation Information Technology.

[12]  Sushmita Ruj,et al.  Decentralized Access Control with Anonymous Authentication of Data Stored in Clouds , 2014, IEEE Transactions on Parallel and Distributed Systems.

[13]  Sugata Sanyal,et al.  A Survey on Security Issues in Cloud Computing , 2011, 1109.5388.

[14]  Guang Jin,et al.  Improve the information security pactice instruction with virtual machine techniques , 2011, 2011 International Conference on Electronics, Communications and Control (ICECC).

[15]  Zhuolin Yang,et al.  Virtualization security for cloud computing service , 2011, 2011 International Conference on Cloud and Service Computing.

[16]  O. KuyoroS.,et al.  Cloud computing security issues and challenges , 2011 .

[17]  Ruby B. Lee,et al.  A Case for Hardware Protection of Guest VMs from Compromised Hypervisors in Cloud Computing , 2011, 2011 31st International Conference on Distributed Computing Systems Workshops.

[18]  S Ramgovind,et al.  The management of security in Cloud computing , 2010, 2010 Information Security for South Africa.

[19]  Shoichi Hasegawa,et al.  A Two-Step Execution Mechanism for Thin Secure Hypervisors , 2009, 2009 Third International Conference on Emerging Security Information, Systems and Technologies.

[20]  Cong Wang,et al.  Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing , 2010, 2010 Proceedings IEEE INFOCOM.

[21]  Shubhashis Sengupta,et al.  Cloud Computing Security--Trends and Research Directions , 2011, 2011 IEEE World Congress on Services.

[22]  Subasish Mohapatra,et al.  Virtualization: A Survey on Concepts, Taxonomy and Associated Security Issues , 2010, 2010 Second International Conference on Computer and Network Technology.

[23]  Mark Ryan,et al.  Cloud computing security: The scientific challenge, and a survey of solutions , 2013, J. Syst. Softw..

[24]  Farzad Sabahi,et al.  Virtualization-level security in cloud computing , 2011, 2011 IEEE 3rd International Conference on Communication Software and Networks.

[25]  Markus Jakobsson,et al.  Controlling data in the cloud: outsourcing computation without outsourcing control , 2009, CCSW '09.

[26]  Vijay Varadharajan,et al.  TVDSEC: Trusted Virtual Domain Security , 2011, 2011 Fourth IEEE International Conference on Utility and Cloud Computing.

[27]  Kouichi Sakurai,et al.  Towards Countermeasure of Insider Threat in Network Security , 2011, 2011 Third International Conference on Intelligent Networking and Collaborative Systems.

[28]  Panagiotis Kalagiakos,et al.  Cloud Computing learning , 2011, 2011 5th International Conference on Application of Information and Communication Technologies (AICT).

[29]  Prashant Srivastava,et al.  An architecture based on proactive model for security in cloud computing , 2011, 2011 International Conference on Recent Trends in Information Technology (ICRTIT).

[30]  Ravi Pendse,et al.  Security in multi-tenancy cloud , 2010, 44th Annual 2010 IEEE International Carnahan Conference on Security Technology.

[31]  Qiang Zhang,et al.  The Characteristics of Cloud Computing , 2010, 2010 39th International Conference on Parallel Processing Workshops.

[32]  James A. Thom,et al.  Cloud Computing Security: From Single to Multi-clouds , 2012, 2012 45th Hawaii International Conference on System Sciences.

[33]  Ashutosh Saxena,et al.  Energy analysis of security for cloud application , 2011, 2011 Annual IEEE India Conference.

[34]  B. Joshi,et al.  Securing cloud computing environment against DDoS attacks , 2012, 2012 International Conference on Computer Communication and Informatics.

[35]  Helen J. Wang,et al.  Enabling Security in Cloud Storage SLAs with CloudProof , 2011, USENIX ATC.

[36]  Lin Yang,et al.  Virtualization Security Risks and Solutions of Cloud Computing via Divide-Conquer Strategy , 2011, 2011 Third International Conference on Multimedia Information Networking and Security.

[37]  Aman Bakshi,et al.  Securing Cloud from DDOS Attacks Using Intrusion Detection System in Virtual Machine , 2010, 2010 Second International Conference on Communication Software and Networks.

[38]  Wayne A. Jansen,et al.  Cloud Hooks: Security and Privacy Issues in Cloud Computing , 2011, 2011 44th Hawaii International Conference on System Sciences.

[39]  Che-Hung Liu,et al.  How to manage information security in cloud computing , 2011, 2011 IEEE International Conference on Systems, Man, and Cybernetics.

[40]  Omkhar Arasaratnam,et al.  Introduction to Cloud Computing , 2011 .

[41]  Kevin Curran,et al.  Cloud Computing Security , 2011, Int. J. Ambient Comput. Intell..

[42]  A. Volokyta,et al.  Secure virtualization in cloud computing , 2012, Proceedings of International Conference on Modern Problem of Radio Engineering, Telecommunications and Computer Science.

[43]  Wentao Liu,et al.  Research on cloud computing security problem and strategy , 2012, 2012 2nd International Conference on Consumer Electronics, Communications and Networks (CECNet).

[44]  Murat Kantarcioglu,et al.  Impact of security risks on cloud computing adoption , 2011, 2011 49th Annual Allerton Conference on Communication, Control, and Computing (Allerton).