Security Threats with Associated Mitigation Techniques in Cloud Computing

Cloud Computing emerges as one of the hottest topic in the field of information technology. Nowadays not just large organizations, but even small and medium size businesses are looking forward to adopt an economical computing resource for their business application, i.e. by introducing a new concept of cloud computing in their environment. Basically it’s a new concept of providing virtualized resources to the consumers. Cloud Computing is a set of IT services that are provided to a customer over a network on a leased basis and with the ability to scale up or down their service requirements. Usually Cloud Computing services are delivered by a third party provider who owns the infrastructure.Consumers can request a cloud for services, applications, solutions and can store large amount of data from different location. Cloud Computing holds the potential to eliminate the requirements for setting up of high-cost computing infrastructure for ITbased solutions and services that theindustry uses. It promises to provide a flexible IT architecture; accessible through internet from lightweight portable devices.This would allow multi-fold increase in the capacity and capabilities of the existing and new software. This new economic model for computing has found fertile ground and is attracting massive global investment. Many industries, such as banking, healthcare and education are moving towards the cloud due to the efficiency of services provided by the pay-per-use pattern based on the resources such as processing power used, transactions carried out, bandwidth consumed, data transferred, or storage space occupied etc. Despite the potential gains achieved from the cloud computing, the organizations are slow in accepting it due to security issues and challenges associated with it. Security in Cloud Computing is an importantand critical aspect, and has numerous issues and problem related to it. Cloud service provider and the cloudservice consumer should make sure that the cloud is safe enough from all the external threats so that thecustomer does not face any problem such as loss of data or data theft. There is also a possibility where amalicious user can penetrate the cloud by impersonating a legitimate user, thus infecting the entire cloud andaffects many customers who are sharing the infected cloud. This research paper outlines what cloud computing is, the various cloud models and the parameters that affect thesecurity of the cloud. This extensive research also aims to elaborate the possible security attacks and the security issues that arise in a cloud computing frame work. It focuses on technical security issues arising from the usage of cloud services and also provides an overview of key security issues related to cloud computing with the view of a secure cloud architecture environment.

[1]  Abhinav Mishra,et al.  Cloud computing security considerations , 2011, 2011 IEEE International Conference on Signal Processing, Communications and Computing (ICSPCC).

[2]  R. Lua,et al.  Mitigating DDoS attacks with transparent and intelligent fast-flux swarm network , 2011, IEEE Network.

[3]  Robert L. Grossman,et al.  The Case for Cloud Computing , 2009, IT Professional.

[4]  Levent Ertaul,et al.  Security Challenges in Cloud Computing , 2010, Security and Management.

[5]  Yushi Shen,et al.  Cloud Computing Overview , 2014 .

[6]  Thomas Sandholm,et al.  What's inside the Cloud? An architectural map of the Cloud landscape , 2009, 2009 ICSE Workshop on Software Engineering Challenges of Cloud Computing.

[7]  Florin Ogigau-Neamtiu,et al.  CLOUD COMPUTING SECURITY ISSUES , 2012 .

[8]  Aman Bakshi,et al.  Securing Cloud from DDOS Attacks Using Intrusion Detection System in Virtual Machine , 2010, 2010 Second International Conference on Communication Software and Networks.

[9]  Christof Weinhardt,et al.  Business Models in the Service World , 2009, IT Professional.

[10]  Joachim Schaper,et al.  Cloud Services , 2010, 4th IEEE International Conference on Digital Ecosystems and Technologies.

[11]  Jeffrey S. Chase,et al.  Automated control in cloud computing: challenges and opportunities , 2009, ACDC '09.

[12]  Xuejie Zhang,et al.  Information Security Risk Management Framework for the Cloud Computing Environments , 2010, 2010 10th IEEE International Conference on Computer and Information Technology.

[13]  Cong Wang,et al.  Ensuring data storage security in Cloud Computing , 2009, 2009 17th International Workshop on Quality of Service.

[14]  Brian Hayes,et al.  What Is Cloud Computing? , 2019, Cloud Technologies.

[15]  Rich Maggiani Cloud computing is changing how we communicate , 2009, 2009 IEEE International Professional Communication Conference.

[16]  Sugata Sanyal,et al.  A Survey on Security Issues in Cloud Computing , 2011, 1109.5388.

[17]  Gadadhar Sahoo,et al.  Cloud Computing: Future Framework for e-Governance , 2010 .

[18]  Ian Lumb,et al.  A Taxonomy and Survey of Cloud Computing Systems , 2009, 2009 Fifth International Joint Conference on INC, IMS and IDC.

[19]  Sonal Anand,et al.  Semantic Cloud for Mobile Technology , 2010 .

[20]  Yi Ding,et al.  Network security for virtual machine in cloud computing , 2010, 5th International Conference on Computer Sciences and Convergence Information Technology.

[21]  Jian Huang,et al.  SaaAS - The mobile agent based service for cloud computing in internet environment , 2010, 2010 Sixth International Conference on Natural Computation.

[22]  Mohsin Nazir,et al.  Cloud Computing: Overview & Current Research Challenges , 2012 .

[23]  Balachandra Reddy Kandukuri,et al.  Cloud Security Issues , 2009, 2009 IEEE International Conference on Services Computing.

[24]  Chris Rose,et al.  A Break in the Clouds: Towards a Cloud Definition , 2011 .

[25]  P. Mell,et al.  The NIST Definition of Cloud Computing , 2011 .

[26]  Marta Mattoso,et al.  Towards a Taxonomy for Cloud Computing from an e-Science Perspective , 2010, Cloud Computing.

[27]  Chonho Lee,et al.  A survey of mobile cloud computing: architecture, applications, and approaches , 2013, Wirel. Commun. Mob. Comput..

[28]  Rabiah Ahmad,et al.  Communications in Computer and Information Science , 2010 .

[29]  Jörg Schwenk,et al.  On Technical Security Issues in Cloud Computing , 2009, 2009 IEEE International Conference on Cloud Computing.

[30]  Gurdev Singh,et al.  CM Measurement Facets for Cloud Performance , 2011 .

[31]  Roberto Bifulco,et al.  Integrating a network IDS into an open source Cloud Computing environment , 2010, 2010 Sixth International Conference on Information Assurance and Security.

[32]  Zhenyu Zhang,et al.  Modeling and testing of cloud applications , 2009, 2009 IEEE Asia-Pacific Services Computing Conference (APSCC).

[33]  Ujwal A. Lanjewar,et al.  Implementation of Cloud Computing on Web Application , 2010 .

[34]  W. Marsden I and J , 2012 .

[35]  Hiroyuki Sato,et al.  A Cloud Trust Model in a Security Aware Cloud , 2010, 2010 10th IEEE/IPSJ International Symposium on Applications and the Internet.

[36]  Huaglory Tianfield Security issues in cloud computing , 2012, 2012 IEEE International Conference on Systems, Man, and Cybernetics (SMC).

[37]  Krishnashree Achuthan,et al.  Preventing Insider Attacks in the Cloud , 2011, ACC.

[38]  Carla Merkle Westphall,et al.  Intrusion Detection for Grid and Cloud Computing , 2010, IT Professional.

[39]  Matthew Metheny,et al.  Security and Privacy in Public Cloud Computing , 2013, CloudCom 2013.

[40]  Timothy Grance,et al.  Guidelines on Security and Privacy in Public Cloud Computing | NIST , 2012 .

[41]  V. Kavitha,et al.  A survey on security issues in service delivery models of cloud computing , 2011, J. Netw. Comput. Appl..

[42]  Rituparna Chaki,et al.  Handling Write Lock Assignment in Cloud Computing Environment , 2011, CISIM.

[43]  Yong Zhao,et al.  Cloud Computing and Grid Computing 360-Degree Compared , 2008, GCE 2008.

[44]  Kevin W. Hamlen,et al.  Security Issues for Cloud Computing , 2010, Int. J. Inf. Secur. Priv..

[45]  Sakshi Kaushal,et al.  Cloud Computing Security Issues and Challenges: A Survey , 2011, ACC.

[46]  K. Popovic,et al.  Cloud computing security issues and challenges , 2010, The 33rd International Convention MIPRO.

[47]  Dieter Gollmann,et al.  Securing Web applications , 2008, Inf. Secur. Tech. Rep..

[48]  Prashant J. Shenoy,et al.  The Case for Enterprise-Ready Virtual Private Clouds , 2009, HotCloud.

[49]  Eystein Mathisen,et al.  Security challenges and solutions in cloud computing , 2011, 5th IEEE International Conference on Digital Ecosystems and Technologies (IEEE DEST 2011).

[50]  Eduardo S. Ogasawara,et al.  Is Cloud Computing the Solution for Brazilian Researchers , 2010 .

[51]  Manas Ranjan Patra,et al.  Cloud Computing: Security Issues and Research Challenges , 2011 .