Cloud Computing Security: Abuse and Nefarious Use of Cloud Computing

Cloud computing is an emerging and promising computing model that provides on-demand computing services which eliminates the need of bearing operational costs associated with deploying servers and software applications. As with any technology, cloud computing presents its adopters with security and privacy concerns that arise from exposing sensitive business information to unauthorized access. This paper will explore and investigate the scope and magnitude of one of the top cloud computing security threats “abuse and nefarious use of cloud computing” and present some of the attacks specific to this top threat as it represents a major barrier for decision makers to adopting cloud computing model. Also, this paper aims to serve as an introductory research effort to warrant more extensive research into this top threat and help researchers to make recommendations to business organizations as to whether or not their data are vulnerable to such threat when deciding to join the cloud.

[1]  Kim-Kwang Raymond Choo Cloud computing: Challenges and future directions , 2010 .

[2]  G. Sahoo,et al.  Securing Software as a Service Model of Cloud Computing: Issues and Solutions , 2013, CloudCom 2013.

[3]  Daniele Catteddu and Giles Hogben Cloud Computing. Benefits, risks and recommendations for information security , 2009 .

[4]  Marjory S. Blumenthal Is Security Lost in the Clouds? , 2011 .

[5]  Yanpei Chen,et al.  What's New About Cloud Computing Security? , 2010 .

[6]  Hovav Shacham,et al.  Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds , 2009, CCS.

[7]  Clement E. Onime,et al.  A User Identity Management Protocol for Cloud Computing Paradigm , 2011, Int. J. Commun. Netw. Syst. Sci..

[8]  Muhammad Ali Babar,et al.  A tale of migration to cloud computing for sharing experiences and observations , 2011, SECLOUD '11.

[9]  Ed Tallent Hey! You! Get Off of My Cloud , 2012 .

[10]  V. Kavitha,et al.  A survey on security issues in service delivery models of cloud computing , 2011, J. Netw. Comput. Appl..

[11]  Syed M. Rahman,et al.  An Overview of the Security Concerns in Enterprise Cloud Computing , 2011, ArXiv.

[12]  Vinicius Cardoso Garcia,et al.  Systematic Mapping Study On Security Threats in Cloud Computing , 2013, ArXiv.

[13]  T. S. Raghu,et al.  The Information Assurance Practices of Cloud Computing Vendors , 2010, IT Professional.

[14]  Jörg Schwenk,et al.  On Technical Security Issues in Cloud Computing , 2009, 2009 IEEE International Conference on Cloud Computing.